Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids., , , , , and . IEEE Internet Things J., 4 (6): 2260-2274 (2017)An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging., , , , , and . IEEE Internet Things J., 6 (2): 2907-2921 (2019)On data integrity attacks against optimal power flow in power grid systems., , , , , and . CCNC, page 1008-1009. IEEE, (2017)LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging., , , , and . Future Gener. Comput. Syst., (2020)A leader-following paradigm based deep reinforcement learning method for multi-agent cooperation games., , and . Neural Networks, (2022)Bayesian-Based Inference Attack Method and Individual Differential Privacy-Based Auction Mechanism for Double Auction Market., , , , and . IEEE Trans Autom. Sci. Eng., 20 (2): 950-968 (April 2023)Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures., , , and . IEEE Trans Autom. Sci. Eng., 19 (3): 1631-1644 (2022)Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach., , , and . IEEE Access, (2019)A Location-Privacy-Aware Taxi-Hailing System: Adaptive Differential Privacy-Based Dynamic Incentive Method., , , and . IEEE Internet Things J., 11 (1): 914-930 (January 2024)On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures., , , , , and . IEEE Trans. Parallel Distributed Syst., 25 (3): 717-729 (2014)