Author of the publication

A polynomial-time method to find the sparsest unobservable attacks in power networks.

, , and . ACC, page 276-282. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Establishing the Isolated Standard Model, , and . Physical Review D, (Feb 22, 2017)Analysis on influencing factors of consumers' purchasing behavior online for furniture: a case study on furniture malls and business centers in Harbin., , and . ICEC, page 3:1-3:8. ACM, (2016)Identification of Multi-dimensional System based on a Novel Criterion., , and . ICINCO-SPSMC, page 143-148. INSTICC Press, (2008)Cost Based Local Forwarding Transmission Schemes for Two-Hop Cellular Networks., , , , , , , , and . VTC Spring, page 1-5. IEEE, (2010)Model of the Emergencies Risk Transmission in Price-driven Supply Chain., and . ICEIS (1), page 405-411. SciTePress, (2011)A new two-photon-sensitive block copolymer nanocarrier., , , , , and . Angew Chem Int Ed Engl, 48 (18): 3329--3332 (2009)The Relationship between Online Attention and Share Prices., , and . WHICEB, page 2. Association for Information Systems, (2014)Stem Water Content for Crape Myrtle in Response to Drought, Cold, and Disease Stress., , and . J. Sensors, (2020)基于MapReduce的改进的Apriori算法及其应用研究 (Improved Apriori Algorithm and Its Application Based on MapReduce)., , and . 计算机科学, 44 (6): 250-254 (2017)Discovering overlapping communities in ego-nets using friend intimacy., , , , , and . J. Intell. Fuzzy Syst., 36 (6): 5167-5175 (2019)