Author of the publication

A Novel Revocable Lightweight Authentication Scheme for Resource-Constrained Devices in Cyber-Physical Power Systems.

, , , , and . IEEE Internet Things J., 10 (6, March 15): 5280-5292 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple event-triggered H2/H∞ filtering for hybrid wired-wireless networked systems with random network-induced delays., , , and . Inf. Sci., (2015)Decentralized event-triggering communication scheme for large-scale systems under network environments., , , and . Inf. Sci., (2017)An isolation principle based distributed anomaly detection method in wireless sensor networks., , and . Int. J. Autom. Comput., 12 (4): 402-412 (2015)An online anomaly detection method for stream data using isolation principle and statistic histogram., , and . Int. J. Model. Simul. Sci. Comput., 6 (2): 1550017:1-1550017:22 (2015)Anomaly behavior detection and reliability assessment of control systems based on association rules., , , , , and . Int. J. Crit. Infrastructure Prot., (2018)Secure Control of Networked Control Systems Using Dynamic Watermarking., , , , , and . IEEE Trans. Cybern., 52 (12): 13609-13622 (2022)Real-Time H∞ Control of Networked Inverted Pendulum Visual Servo Systems., , , , , , and . IEEE Trans. Cybern., 50 (12): 5113-5126 (2020)Editorial: Neural learning in life system and energy system., , , , and . Neurocomputing, (2019)A Novel State Estimation Method for Smart Grid Under Consecutive Denial of Service Attacks., , , , , and . IEEE Syst. J., 17 (1): 513-524 (March 2023)Stealthy Measurement-Aided Pole-Dynamics Attacks with Nominal Models., , , , and . CoRR, (2022)