Search

Your search keyword '"Buhong Wang"' showing total 128 results

Search Constraints

Start Over You searched for: Author "Buhong Wang" Remove constraint Author: "Buhong Wang"
128 results on '"Buhong Wang"'

Search Results

1. Efficient and secure service function chain deployment method for delay optimization in air traffic information network

2. DBI-Attack:Dynamic Bi-Level Integrated Attack for Intensive Multi-Scale UAV Object Detection

3. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management

4. Urban building extraction from high-resolution remote sensing imagery based on multi-scale recurrent conditional generative adversarial network

5. Adversarial attack and defense methods for neural network based state estimation in smart grid

6. Coherence optimised subarray partition for hybrid MIMO phased array radar

7. TCFLTformer: TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs

8. Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement

9. Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor Attacks

10. A Cascading Failure Model of the Air Traffic Control Network Based on the Theory of Interdependent Networks

11. Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction

12. CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems

13. Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation

14. Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems

15. Hybrid MIMO Phased Array Radar With Center-Spanned Subarrays

16. Thinned Virtual Array for Cramer Rao Bound Optimization in MIMO Radar

17. An algorithm for fragment-aware virtual network reconfiguration.

18. P2P Botnet Detection Based on Nodes Correlation by the Mahalanobis Distance

19. A Feature Extraction Method for P2P Botnet Detection Using Graphic Symmetry Concept

20. Virtual Network Embedding Based on Topology Potential

21. Design of Wideband Multifunction Antenna Array Based on Multiple Interleaved Subarrays

38. Securing Transmission for UAV Swarm-Enabled Communication Network

39. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems

40. Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles

42. Secure Transmission of mmWave NOMA UAV-Assisted Relay System against Randomly Located Eavesdroppers

43. Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement

Catalog

Books, media, physical & digital resources