Author of the publication

Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks.

, , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Accurate ECO Leakage Optimization Framework With GNN and Bidirectional LSTM., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 31 (9): 1413-1424 (September 2023)Magnetization and Giant Magnetoimpedance Effect of Co-Rich Microwires under Different Driven Currents., , , and . J. Sensors, (2016)Regulating the use of big data: Justifications, perspectives and the Chinese way forward., and . Comput. Law Secur. Rev., (2022)A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation., , and . IEEE Trans. Inf. Forensics Secur., (2022)Reinforcement Learning-Based Detection for State Estimation Under False Data Injection., , , , , and . IEEE Access, (2021)PivotNet: Vectorized Pivot Learning for End-to-end HD Map Construction., , , and . ICCV, page 3649-3659. IEEE, (2023)MachMap: End-to-End Vectorized Solution for Compact HD-Map Construction., , , , , , and . CoRR, (2023)End-to-End Vectorized HD-map Construction with Piecewise Bezier Curve., , , and . CoRR, (2023)Complex Spatial-Temporal Attention Aggregation For Video Person Re-Identification., , , and . ICIP, page 2441-2445. IEEE, (2020)GRM: Gradient Rectification Module for Visual Place Retrieval., , , and . ICRA, page 4040-4047. IEEE, (2023)