Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
User-centric view of unmanned aerial vehicle transmission against smart attacks
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish
and subjective end-users and use smart radio devices to change their attack types and …
and subjective end-users and use smart radio devices to change their attack types and …
Game-theoretic electric vehicle charging management resilient to non-ideal user behavior
In this paper, an electric vehicle (EV) charging competition, among EV aggregators that
perform coordinated EV charging, is explored while taking into consideration potential non …
perform coordinated EV charging, is explored while taking into consideration potential non …
Prospect theoretic analysis of energy exchange among microgrids
The energy exchange between microgrids (MGs) that are capable of generating power from
renewable energy sources in smart grids is investigated. As MGs are autonomous and have …
renewable energy sources in smart grids is investigated. As MGs are autonomous and have …
Attacker-centric view of a detection game against advanced persistent threats
L **ao, D Xu, NB Mandayam… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
Cloud storage defense against advanced persistent threats: A prospect theoretic study
L **ao, D Xu, C **e, NB Mandayam… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker
launches stealthy, continuous, and targeted attacks on storage devices. In this paper …
launches stealthy, continuous, and targeted attacks on storage devices. In this paper …
User-centric view of jamming games in cognitive radio networks
L **ao, J Liu, Q Li, NB Mandayam… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Jamming games between a cognitive radio enabled secondary user (SU) and a cognitive
radio enabled jammer are considered, in which end-user decision making is modeled using …
radio enabled jammer are considered, in which end-user decision making is modeled using …
Dynamic spectrum management in 5G wireless networks: A real-life modeling approach
In this paper a novel dynamic spectrum management scheme for 5G Non Orthogonal
Multiple Access (NOMA) wireless networks is proposed, where users are offered the option …
Multiple Access (NOMA) wireless networks is proposed, where users are offered the option …
Toward a consumer-centric grid: A behavioral perspective
Active consumer participation is seen as an integral part of the emerging smart grid.
Examples include demand-side management programs, incorporation of consumer-owned …
Examples include demand-side management programs, incorporation of consumer-owned …
A secure and efficient data sharing scheme for UAV networks: Integration of blockchain and prospect theory
Empowered by crowdsensing technology, unmanned aerial vehicles (UAVs) equipped with
rich sensors can perform sensing tasks in extreme scenarios. However, due to the …
rich sensors can perform sensing tasks in extreme scenarios. However, due to the …
Load shifting in the smart grid: To participate or not?
Demand-side management (DSM) has emerged as an important smart grid feature that
allows utility companies to maintain desirable grid loads. However, the success of DSM is …
allows utility companies to maintain desirable grid loads. However, the success of DSM is …