Author of the publication

A Smart City System Architecture based on City-level Data Exchange Platform.

, , , , and . J. Inf. Technol. Res., 8 (4): 1-25 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints., , , , , , and . Inf. Sci., (2021)One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction., , , , , and . IEEE Trans. Reliab., 68 (4): 1404-1428 (2019)A Deep End-to-End Model for Transient Stability Assessment With PMU Data., , , , , , and . IEEE Access, (2018)Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing., , , and . IEEE Access, (2019)Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments., , , and . IEEE Trans. Smart Grid, 12 (2): 1541-1551 (2021)Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders., , , , , and . IEEE Trans. Smart Grid, 10 (4): 4401-4410 (2019)A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain., , , and . J. Sens. Actuator Networks, 11 (4): 86 (2022)An automated framework for evaluating open-source web scanner vulnerability severity., , , , and . Serv. Oriented Comput. Appl., 14 (4): 297-307 (2020)An approach of security testing for third-party component based on state mutation., , , , and . Secur. Commun. Networks, 9 (15): 2827-2842 (2016)BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network., , , , , and . J. Syst. Softw., (October 2023)