Author of the publication

Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework.

, , , , , and . Entropy, 22 (8): 894 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards More Powerful Multi-column Convolutional Network for Crowd Counting., , , , , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 381-392. Springer, (2021)FaceRSA: RSA-Aware Facial Identity Cryptography Framework., , , , , and . AAAI, page 7423-7431. AAAI Press, (2024)Multi-Attentional Deepfake Detection., , , , , and . CVPR, page 2185-2194. Computer Vision Foundation / IEEE, (2021)Construction Scheme of Meteorological Application Grid (MAG)., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 213-216. Springer, (2003)Measuring the Consistency and Diversity of 3D Face Generation., , , , , , and . IEEE J. Sel. Top. Signal Process., 17 (6): 1208-1220 (November 2023)A Task Assignment Algorithm for Multiple Aerial Vehicles to Attack Targets With Dynamic Values., , , , , and . IEEE Trans. Intell. Transp. Syst., 14 (1): 236-248 (2013)M2SPL: Generative multiview features with adaptive meta-self-paced sampling for class-imbalance learning., , , and . Expert Syst. Appl., (2022)Language universal font watermarking with multiple cross-media robustness., , , , and . Signal Process., (2023)CAAD 2018: Iterative Ensemble Adversarial Attack., , and . CoRR, (2018)PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition., , , , , , , and . CoRR, (2022)