From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection., , , , , и . IEEE Wirel. Commun. Lett., 9 (10): 1734-1737 (2020)Threat model and construction strategy on ADS-B attack data., , , , и . IET Inf. Secur., 14 (5): 542-552 (2020)CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems., , , , и . IEEE Access, (2020)Online sequential attack detection for ADS-B data based on hierarchical temporal memory., , , , и . Comput. Secur., (2019)Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT., , , , и . ICCT, стр. 952-956. IEEE, (2022)Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems., , , , , , и . WCSP, стр. 801-806. IEEE, (2020)Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers., , , , и . CyberC, стр. 295-300. IEEE, (2023)Secure RIS Deployment Strategies for Wireless-Powered Multi-UAV Communication., , , , , и . IEEE Internet Things J., 11 (10): 18154-18166 (мая 2024)Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems., , , , , и . SmartGridComm, стр. 1-6. IEEE, (2019)ADS-B Data Attack Detection Based on Generative Adversarial Networks., , , , и . CSS (1), том 11982 из Lecture Notes in Computer Science, стр. 323-336. Springer, (2019)