Author of the publication

Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm.

, , , , and . J. Cyber Secur. Mobil., 13 (2): 239-264 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: New scheme for measurement-device-independent quantum key distribution., , , , and . Quantum Inf. Process., 18 (1): 12 (2019)A Combination of Joint Sparse Form and Frobenius Map in Scalar Multiplication of Elliptic Curve over GF(2^mn )., , , , and . DBTA, page 707-710. IEEE Computer Society, (2009)Speeding Scalar Multiplication of Elliptic Curve over GF(2mn)., , , , and . Int. J. Netw. Secur., 11 (2): 70-77 (2010)A generalization of parameterized inexact Uzawa method for generalized saddle point problems., and . Appl. Math. Comput., 215 (2): 599-607 (2009)On HSS-based constraint preconditioners for generalized saddle-point problems., , and . Numer. Algorithms, 57 (2): 273-287 (2011)On the Benefits of Two Dimensional Metric Learning., , , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (2): 1909-1921 (2023)Hybrid Reinforcement Learning for Optimizing Pump Sustainability in Real-World Water Distribution Networks., , , , and . CoRR, (2023)Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing., , , , , and . CoRR, (2024)Advancing Incremental Few-shot Semantic Segmentation via Semantic-guided Relation Alignment and Adaptation., , , , , and . CoRR, (2023)How Can Government Promote Technology Diffusion in Manufacturing Paradigm Shift? Evidence From China., , and . IEEE Trans. Engineering Management, 70 (4): 1547-1559 (April 2023)