Author of the publication

Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure.

, , , and . CODASPY, page 35-45. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE., , , , , , , , , and . ASE, page 152:1-152:4. ACM, (2022)Scaling up Superoptimization., , , and . ASPLOS, page 297-310. ACM, (2016)Just-in-time code duplicates extraction., , , , , , , , , and . Inf. Softw. Technol., (June 2023)GreenThumb: superoptimizer construction framework., , , and . CC, page 261-262. ACM, (2016)Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure., , , and . CODASPY, page 35-45. ACM, (2017)Efficient ResNets: Residual Network Design., , and . CoRR, (2023)Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks., , and . AsiaCCS, page 173-185. ACM, (2018)Cooperative crug isolation., , , and . WODA, page 35-41. (2009)Analogy-making as a Core primitive in the software engineering toolbox., and . Onward!, page 101-121. ACM, (2020)Abstract Neural Networks., and . SAS, volume 12389 of Lecture Notes in Computer Science, page 65-88. Springer, (2020)