Search

Your search keyword '"Kunrui Cao"' showing total 48 results

Search Constraints

Start Over You searched for: Author "Kunrui Cao" Remove constraint Author: "Kunrui Cao" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
48 results on '"Kunrui Cao"'

Search Results

1. CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems

2. Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems

3. RIS-Assisted Multi-Antenna AmBC Signal Detection Using Deep Reinforcement Learning

17. Securing Transmission for UAV Swarm-Enabled Communication Network

18. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems

20. Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles

22. Secure Transmission of mmWave NOMA UAV-Assisted Relay System against Randomly Located Eavesdroppers

26. Security enhancement of UAV swarm enabled relaying systems with joint beamforming and resource allocation

27. Deep Learning Driven 3D Robust Beamforming for Secure Communication of UAV Systems

28. Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems

29. TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber–Physical Systems

30. Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

31. Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection

32. Threat model and construction strategy on ADS‐B attack data

33. On the Security Enhancement of Uplink NOMA Systems With Jammer Selection

34. Secrecy precoding in MIMOME wireless communication system under partial CSI

35. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users

36. Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping

37. CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems

38. Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication

40. Coordinated cyber‐physical attacks considering DoS attacks in power systems

41. Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks

42. Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems

43. Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems

44. ADS-B Data Attack Detection Based on Generative Adversarial Networks

45. Stealthy and Sparse False Data Injection Attacks Based on Machine Learning

46. Dynamic temporal ADS-B data attack detection based on sHDP-HMM

47. Online sequential attack detection for ADS-B data based on hierarchical temporal memory

48. Wireless information and power transfer in interference-limited two-way relaying system

Catalog

Books, media, physical & digital resources