Author of the publication

Multi-Agent Graph-Attention Deep Reinforcement Learning for Post-Contingency Grid Emergency Voltage Control.

, , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (3): 3340-3350 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Hyperspectral Image by CNN Based on Shadow Area Enhancement Through Dynamic Stochastic Resonance., , , and . IEEE Access, (2019)Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance., , and . J. Softw., 9 (7): 1854-1861 (2014)Resource Allocation for Energy Harvesting-Aided Device-to-Device Communications: A Matching Game Approach., , , and . IEEE Access, (2019)Bayesian Belief Network Model Quantification Using Distribution-Based Node Probability and Experienced Data Updates for Software Reliability Assessment., , , , , , , and . IEEE Access, (2018)Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network., , , , and . IEEE Access, (2020)Signal Temporal Logic Neural Predictive Control., and . CoRR, (2023)Mitigation measures of collusive interest flooding attacks in named data networking., , , , and . Comput. Secur., (2020)DDoS: Flood vs. Shrew., , , and . J. Comput., 9 (6): 1426-1435 (2014)Low-Rate DoS Attacks Detection Based on Network Multifractal., , and . IEEE Trans. Dependable Secur. Comput., 13 (5): 559-567 (2016)Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model., , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2285-2300 (2021)