Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and application of distributed co-simulation platform for cyber physical power system based on the concepts of software bus and middleware., , , and . IET Cyper-Phys. Syst.: Theory & Appl., 5 (1): 71-79 (2020)Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks., , , and . IEEE Access, (2019)Review of the false data injection attack against the cyber-physical power system., , , and . IET Cyper-Phys. Syst.: Theory & Appl., 4 (2): 101-107 (2019)File Relation Graph Based Malware Detection Using Label Propagation., , , , and . WISE (2), volume 9419 of Lecture Notes in Computer Science, page 164-176. Springer, (2015)Internet-Based Manufacturing Scheduling: Architecture and Implementation., , , and . ICRA, page 1107-1112. IEEE, (2002)Weighted sparse representation for face recognition., , , and . Neurocomputing, (2015)Developed Density Peak Clustering With Support Vector Data Description for Access Network Intrusion Detection., , , and . IEEE Access, (2018)An inventory control policy for maintenance networks., , , and . IROS, page 1238-1244. IEEE, (2004)L0-norm sparse representation based on modified genetic algorithm for face recognition., , , , and . J. Vis. Commun. Image Represent., (2015)EvoRSR: an integrated system for exploring evolution of RNA structural robustness., , , , and . BMC Bioinform., (2009)