Author of the publication

A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems.

, , , , and . ICII, page 62-65. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis for the Influence of Individual Node Base on the Network Community., , and . Int. J. Interdiscip. Telecommun. Netw., 6 (4): 15-23 (2014)Selective Learning Confusion Class for Text-Based CAPTCHA Recognition., , , , and . IEEE Access, (2019)Scale Correction of Two-Band Ratio of Red to Near-Infrared Using Imagery Histogram Approach: A Case Study on Indian Remote Sensing Satellite in Yellow River Estuary., , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 5 (2): 663-668 (2012)Deep Feature Representation via Multiple Stack Auto-Encoders., , , , , , and . PCM (1), volume 9314 of Lecture Notes in Computer Science, page 275-284. Springer, (2015)Out-of-Stock Detection Based on Deep Learning., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 228-237. Springer, (2019)The GluN2B subunit represents a major functional determinant of NMDA receptors in human induced pluripotent stem cell-derived cortical neurons, , , , , , , , , and . Stem Cell Research, (2018)A Secchi Depth Algorithm Considering the Residual Error in Satellite Remote Sensing Reflectance Data., , , and . Remote Sensing, 11 (16): 1948 (2019)Interpretable fuzzy modeling using multi-objective immune-inspired optimization algorithms., and . FUZZ-IEEE, page 1-8. IEEE, (2010)An End-to-End Demonstration for 5G Network Slicing., , , , , , , and . VTC Spring, page 1-5. IEEE, (2019)On the sum rate of vector Gaussian multiterminal source coding., and . ISIT, page 46-50. IEEE, (2010)