Search

Your search keyword '"Kunrui Cao"' showing total 24 results

Search Constraints

Start Over You searched for: Author "Kunrui Cao" Remove constraint Author: "Kunrui Cao" Topic computer science Remove constraint Topic: computer science
24 results on '"Kunrui Cao"'

Search Results

1. Securing Transmission for UAV Swarm-Enabled Communication Network

2. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems

3. Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles

4. Security enhancement of UAV swarm enabled relaying systems with joint beamforming and resource allocation

5. Deep Learning Driven 3D Robust Beamforming for Secure Communication of UAV Systems

6. Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems

7. TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber–Physical Systems

8. Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

9. Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection

10. Threat model and construction strategy on ADS‐B attack data

11. On the Security Enhancement of Uplink NOMA Systems With Jammer Selection

12. Secrecy precoding in MIMOME wireless communication system under partial CSI

13. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users

14. Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping

15. CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems

16. Coordinated cyber‐physical attacks considering DoS attacks in power systems

17. Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks

18. Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems

19. Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems

20. ADS-B Data Attack Detection Based on Generative Adversarial Networks

21. Stealthy and Sparse False Data Injection Attacks Based on Machine Learning

22. Dynamic temporal ADS-B data attack detection based on sHDP-HMM

23. Online sequential attack detection for ADS-B data based on hierarchical temporal memory

24. Wireless information and power transfer in interference-limited two-way relaying system

Catalog

Books, media, physical & digital resources