Author of the publication

Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reinforcement learning approach to map reduce auto-configuration under networked environment., , , and . Int. J. Secur. Networks, 12 (3): 135-140 (2017)An Improved Hollander's Distribution-Free Test for Parallelism., and . Communications in Statistics - Simulation and Computation, 36 (6): 1263-1273 (2007)Limited Feedback Unitary Precoding for MIMO Full Stream Transmission., , , , and . IEEE Trans. Vehicular Technology, 63 (8): 4092-4096 (2014)Indoor Navigation Leveraging Gradient WiFi Signals., , , , and . SenSys, page 48:1-48:2. ACM, (2017)A Method to Remotely Track a Magnetic Target Using a Scalar Magnetometer Array., , , , , and . J. Sensors, (2017)A Fast Integrated Planning and Control Framework for Autonomous Driving via Imitation Learning., , , and . CoRR, (2017)Real-Time Continuous Image Registration Enabling Ultraprecise 2-D Motion Tracking., and . IEEE Trans. Image Processing, 22 (5): 2081-2090 (2013)Learning-Based Computation Offloading for IoT Devices With Energy Harvesting., , , , , and . IEEE Trans. Vehicular Technology, 68 (2): 1930-1941 (2019)Generative Tensor Network Classification Model for Supervised Machine Learning., , , , and . CoRR, (2019)Distributed sparse channel estimation for OFDM systems with high mobility., , , , , and . ICC, page 4951-4956. IEEE, (2013)