Author of the publication

Customized Attack Detection Under Power Industrial Control System.

, , , , and . SGIoT, volume 324 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 96-106. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-leader Harris hawk optimization based on differential evolution for feature selection and prediction influenza viruses H1N1., , and . Artif. Intell. Rev., 55 (4): 2675-2732 (2022)Group Sparse Space Information Network With Joint Virtual Network Function Deployment and Maximum Flow Routing Strategy., , , and . IEEE Trans. Wirel. Commun., 22 (8): 5291-5305 (August 2023)Maximum Flow Routing Strategy With Dynamic Link Allocation for Space Information Networks Under Transceiver Constraints., , , , , and . IEEE Trans. Veh. Technol., 71 (9): 9993-10000 (2022)Intelligent detect for substation insulator defects based on CenterMask., , , , , and . CoRR, (2022)Space Information Network With Joint Virtual Network Function Deployment and Flow Routing Strategy With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 41 (6): 1737-1756 (June 2023)Learning to Cluster Faces with Mixed Face Quality., , , , and . PRCV (2), volume 13535 of Lecture Notes in Computer Science, page 576-587. Springer, (2022)Discovering Interpretable Latent Space Directions of GANs Beyond Binary Attributes., , , , , and . CVPR, page 12177-12185. Computer Vision Foundation / IEEE, (2021)Layout Generation as Intermediate Action Sequence Prediction., , , and . AAAI, page 10762-10770. AAAI Press, (2023)Fast and High Quality Suggestive Contour Generation with L0 Gradient Minimization., , , , , , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 484-491. Springer, (2015)Customized Attack Detection Under Power Industrial Control System., , , , and . SGIoT, volume 324 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 96-106. Springer, (2019)