From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models., , , , , и . Secur. Commun. Networks, (2021)Event-Triggered Adaptive Control for Networked Euler-Lagrange Systems with External Disturbances., , , и . ICITEE, стр. 539-543. ACM, (2022)基于EMD的电厂网络流量异常检测方法 (EMD-based Anomaly Detection for Network Traffic in Power Plants)., , , , , и . 计算机科学, 46 (11A): 464-468 (2019)MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation., , , , , и . Inf. Sci., (февраля 2024)SQL Injection Detection Based on Deep Belief Network., , , , , и . CSAE, стр. 20:1-20:6. ACM, (2019)Preliminary Analysis of The Application and Development of Big Data, Cloud Computing, IoT, Mobile Internet, AI, and Blockchain In The Power Scene., , и . ICITEE, стр. 526-530. ACM, (2020)Research on Cybersecurity in Power Systems., , , , и . ICITEE, стр. 382-387. ACM, (2022)Abnormal Electromagnetic Signal Detection Based on Time Series Analysis., , , , , и . CSAE, стр. 76:1-76:5. ACM, (2019)Review of Illegal Network Channel Isolation Technology Based on PowerPlant., , , и . ICITEE, стр. 243-245. ACM, (2020)Overview of Network Security Defense Technologies for Power Systems., , , и . ICITEE, стр. 377-381. ACM, (2022)