Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Control Model Based on Petri Net for Industrial IoT., , , , , and . ICII, page 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , and . ICII, page 152-155. IEEE, (2019)An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing., , , , , and . ICNC, page 782-786. IEEE, (2019)A Task-Type-Based Algorithm for the Energy-Aware Profit Maximizing Scheduling Problem in Heterogeneous Computing Systems., , , and . CCGRID, page 1107-1110. IEEE Computer Society, (2015)Research on Security Estimation and Control of Cyber-Physical System., , , , , and . IPCCC, page 1-5. IEEE, (2020)A sensor attack detection method based on fusion interval and historical measurement in CPS., , , , , and . IPCCC, page 1-4. IEEE, (2020)Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing., , , , , and . IPCCC, page 1-5. IEEE, (2020)Hotel Classification Based on Online Review Data., , , and . ICNC-FSKD, page 264-270. IEEE, (2018)A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems., , , , and . ICII, page 62-65. IEEE, (2019)A Dynamic Security Control Architecture for Industrial Cyber-Physical System., , , , and . ICII, page 148-151. IEEE, (2019)