ORCID as entered in ROS

Select Publications
2023, A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments, http://dx.doi.org/10.48550/arxiv.2308.09734
,2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, http://dx.doi.org/10.1109/OJCS.2022.3199755
,2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, http://arxiv.org/abs/2207.00587v1
,2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, http://arxiv.org/abs/2206.12885v1
,2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, http://dx.doi.org/10.1109/JIOT.2022.3204246
,2022, Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems, http://dx.doi.org/10.48550/arXiv.2203.16730
,2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, http://arxiv.org/abs/2003.05071v1
,2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, http://dx.doi.org/10.48550/arxiv.2003.05088
,2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, http://dx.doi.org/10.1109/TGRS.2020.2976855
,2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, http://dx.doi.org/10.1109/TGRS.2019.2953181
,2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, http://dx.doi.org/10.48550/arxiv.1810.03323
,2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, http://dx.doi.org/10.48550/arxiv.1809.07912
,2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, http://dx.doi.org/10.48550/arxiv.1703.10355
,