Author of the publication

Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks.

, , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 441-452. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cell nuclei segmentation in divergent images using deep learning and stochastic processing., , , and . Medical Imaging: Digital Pathology, volume 10956 of SPIE Proceedings, page 1095616. SPIE, (2019)Instruction Tuning Text-to-SQL with Large Language Models in the Power Grid Domain., , , , , , and . CCRIS, page 59-63. ACM, (2023)Rotating Objects via in-Hand Pivoting Using Vision, Force and Touch., , , , and . IROS, page 8792-8799. (2023)A Compton scattering suppression based image reconstruction method for Digital Breast Tomosynthesis., and . GENSiPS, page 190-193. IEEE, (2011)"It would probably turn into a social faux-pas": Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes., , , , and . CHI, page 404:1-404:13. ACM, (2022)Crafting with a Robot Assistant: Use Social Cues to Inform Adaptive Handovers in Human-Robot Collaboration., , , , and . HRI, page 252-260. ACM, (2023)How Pairing by Code Similarity Influences Discussions in Peer Learning., , and . CHI Extended Abstracts, page 161:1-161:6. ACM, (2023)Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 441-452. Springer, (2022)A heterogeneous graph neural network with automatic discovery of effective metapaths for drug-target interaction prediction., , , , , , , and . Future Gener. Comput. Syst., (2024)