Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Power System Control Architecture for Improved Distribution System Resiliency., , , , , , , , , and 11 other author(s). IEEE Access, (2019)Privacy-Driven Electricity Group Demand Response in Smart Cities Using Particle Swarm Optimization., , and . ICTAI, page 946-953. IEEE Computer Society, (2016)Learning-from-signals on edge devices., and . IEEE Instrum. Meas. Mag., 15 (2): 40-44 (2012)4G Security Using Physical Layer RF-DNA with DE-Optimized LFS Classification., , , and . JCM, 6 (9): 671-681 (2011)An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications., , and . ICMLA (2), page 54-59. IEEE, (2013)978-0-7695-5144-9.Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers., , , , and . IJCIP, (2015)High performance FFT on multicore processors., , , , , , and . CrownCom, page 1-6. ICST / IEEE, (2010)Software-defined intelligent grid research integration and development platform., , , , , , , , , and 1 other author(s). ISGT, page 1-5. IEEE, (2016)Using differential evolution to optimize 'learning from signals' and enhance network security., , , and . GECCO, page 1811-1818. ACM, (2011)