Author of the publication

False Data Injection Attack Against Cyber-Physical Systems Protected by a Watermark.

, , , , , and . GLOBECOM, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized Cloud-SDN Architecture in Smart Grid: A Dynamic Pricing Model., , and . IEEE Trans. Ind. Informatics, 14 (3): 1220-1231 (2018)Fog-Computing-Based Energy Storage in Smart Grid: A Cut-Off Priority Queuing Model for Plug-In Electrified Vehicle Charging., , and . IEEE Trans. Ind. Informatics, 16 (5): 3470-3482 (2020)Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks., and . J. Networks, 4 (2): 148-161 (2009)A Fuzzy Petri Nets QoS Model for Wireless AD Hoc Networks., and . INTELLCOMM, volume 190 of IFIP, page 147-156. Springer, (2005)FuzzyCCG: a fuzzy logic QoS approach for congestiosn control in wireless ad hoc networks., and . Q2SWinet, page 105-111. ACM, (2005)MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain., , and . IEEE Trans. Netw. Sci. Eng., 10 (4): 1985-2001 (July 2023)An Evolutionary Game Approach Towards Energy-Activated Cooperative Spectrum Sensing., , and . VTC Fall, page 1-5. IEEE, (2018)Decentralized Reputation Model based on Bayes' Theorem in Vehicular Networks., , and . ICC, page 1-6. IEEE, (2021)Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol., , , and . ICC Workshops, page 1259-1264. IEEE, (2023)A reputation system for detection of black hole attack in vehicular networking., , , , and . SSIC, page 1-5. IEEE, (2015)