Author of the publication

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems.

, , , and . IEEE Open J. Comput. Soc., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (2): 331-346 (2019)Privacy-preserving identity-based file sharing in smart city., , , , and . Pers. Ubiquitous Comput., 21 (5): 923-936 (2017)Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation., , , , and . Concurr. Comput. Pract. Exp., (2022)Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach., and . Pattern Recognit., 45 (12): 4129-4137 (2012)Design of alignment-free cancelable fingerprint templates via curtailed circular convolution., and . Pattern Recognit., 47 (3): 1321-1329 (2014)Pair-polar coordinate-based cancelable fingerprint templates., , and . Pattern Recognit., 44 (10-11): 2555-2564 (2011)A Cloud Security Assessment System Based on Classifying and Grading., , , and . IEEE Cloud Comput., 2 (2): 58-67 (2015)Feature extraction and learning approaches for cancellable biometrics: A survey., , , , and . CAAI Trans. Intell. Technol., 9 (1): 4-25 (February 2024)Lifetime optimization for reliable broadcast and multicast in wireless ad hoc networks., , , and . Wirel. Commun. Mob. Comput., 14 (2): 221-231 (2014)Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks., , and . IEEE Trans. Computers, 64 (6): 1670-1679 (2015)