Author of the publication

Analyzing Attack Strategies Through Anti-goal Refinement.

, , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 75-90. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LCL type grid-connected converter no startup inrush current control method based on capacitor branch voltage feedforward., , , , , and . IECON, page 1471-1476. IEEE, (2015)A Self-Supervised Learning Manipulator Grasping Approach Based on Instance Segmentation., , , , and . IEEE Access, (2018)A New Strategy to Design Microstrip Antenna Array With Low Side-Lobe Level and High Gain., , , , , , , and . IEEE Access, (2019)Tracking Multiple Target Cows' Ruminant Mouth Areas Using Optical Flow and Inter-Frame Difference Methods., , , , and . IEEE Access, (2019)Harden Tamper-Proofing to Combat MATE Attack., , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 98-108. Springer, (2018)Composing Software Evolution Process Component., and . APPT, volume 4847 of Lecture Notes in Computer Science, page 684-692. Springer, (2007)A New Algorithm of Frequency Estimation for Frequency-Hopping Signal., , and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 410-417. Springer, (2013)Differentially private Naive Bayes learning over multiple data sources., , , , and . Inf. Sci., (2018)构件系统建模及其动态演化一致性验证方法 (Dynamic Evolution Consistency Verification Method for Component System Modeling)., , , , , and . 计算机科学, 44 (11): 80-86 (2017)SDBD: A Hierarchical Region-of-Interest Detection Approach in Large-Scale Remote Sensing Image., , , and . IEEE Geosci. Remote. Sens. Lett., 14 (5): 699-703 (2017)