Author of the publication

Cascading Failure Attacks in the Power System: A Stochastic Game Perspective.

, , , , and . IEEE Internet Things J., 4 (6): 2247-2259 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense., , , , and . IEEE Trans. Mob. Comput., 14 (6): 1203-1217 (2015)Optimal Scheduling for Multi-Radio Multi-Channel Multi-Hop Cognitive Cellular Networks., , , , , and . IEEE Trans. Mob. Comput., 14 (1): 139-154 (2015)A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data., , , and . IEEE Access, (2016)Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks., , , and . IEEE Trans. Parallel Distributed Syst., 26 (6): 1547-1559 (2015)Multi-Objective Optimal Energy Consumption Scheduling in Smart Grids., , and . IEEE Trans. Smart Grid, 4 (1): 341-348 (2013)Privacy-preserving energy theft detection in smart grids., , and . SECON, page 605-613. IEEE, (2012)Efficient Privacy-Preserving Large-Scale CP Tensor Decompositions., , and . GLOBECOM, page 1-6. IEEE, (2018)POLYLLA: Polygonal meshing algorithm based on terminal-edge regions., , , and . CoRR, (2022)Dynamic Energy Management for the Smart Grid With Distributed Energy Resources., , , and . IEEE Trans. Smart Grid, 4 (4): 2139-2151 (2013)Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations., , , , and . IEEE Trans. Big Data, 4 (1): 26-39 (2018)