Author of the publication

Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.

, , , , , and . ACM Trans. Embed. Comput. Syst., 16 (1): 18:1-18:21 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation Scheduling of a Hydrothermal System Considering Multiple Provincial Peak-Shaving Demands., , , , and . IEEE Access, (2019)A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2162-2171. IOS Press, (2014)An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems., , , , , and . J. Ambient Intell. Humaniz. Comput., 7 (3): 427-443 (2016)The Motion Controller Based on Neural Network S-Plane Model for Fixed-Wing UAVs., , , , and . IEEE Access, (2021)A penalized method of alternating projections for weighted low-rank hankel matrix optimization., , , and . Math. Program. Comput., 14 (3): 417-450 (2022)Compression Sensing Signal Detection Algorithm Based on Orthogonal Matching Pursuit., , , and . Int. J. Wirel. Inf. Networks, 27 (2): 271-279 (2020)Secure data uploading scheme for a smart home system., , , , , and . Inf. Sci., (2018)Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage., , , , and . IEEE Access, (2019)Outsourced data modification algorithm with assistance of multi-assistants in cloud computing., , , , and . Int. J. Sens. Networks, 24 (1): 62-73 (2017)Short Cycles in Digraphs with Local Average Outdegree at Least Two.. Electron. J. Comb., (2003)