Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , and . IEEE Access, (2018)Vague color image enhancement on fractional differential and improved retinex., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9395 of SPIE Proceedings, page 93950Q. SPIE, (2015)Fuzzy games with communication networks., , , and . GAMENETS, page 1-4. IEEE, (2014)Fast multicast scheme with secure network coding in cloud data centers., , , , , and . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)An Alternating Direction Method of Multipliers Based Approach for PMU Data Recovery., , , , , and . IEEE Trans. Smart Grid, 10 (4): 4554-4565 (2019)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition., , , , and . CoRR, (2020)