[PDF][PDF] Ing-Wen Tsai's 1983 LSE PhD Thesis: An Annotation

JC Liu - Journal of Sciences & Humanities, 2020 - academia.edu
… With the existence of pre-liberalization monopoly power, absolute free trade can be … those
countries reluctant to give up their revenue from the use of optimum tariffs; [註14] or there is an …

[PDF][PDF] The Authenticity and Nature of the Analects of Confucius

C Harbsmeier - Journal of Chinese Studies, 2019 - cuhk.edu.hk
… He had appropriated it and transposed it as best he could into his own literary, very English
literary, anglophone mode, complete with London cockney accents for the servants and all …

Meta-functional Equivalent Translation of Chinese Folk Song

Y Yang - Springer Nature Singapore. DOI, 2021 - Springer
… silent until it meets a thrush and tries its best to make sounds to attract the thrush. “Four-line
folksong with seven lexemes in each line” differs from “four-line folksong with five lexemes in …

[PDF][PDF] Genomic surveillance

E Dirks, J Leibold - Australian Strategic Policy Institute, June, 2020 - cms2.dijitalhafiza.com
… 3 Like other such databases, it contains samples taken from criminal offenders and suspects.
However, since 2013, Chinese authorities have collected DNA samples from entire ethnic …

智慧電網狀態估計之匿蹤攻擊與防護

韓松俯, 蘇育德 - 2013 - ir.lib.nycu.edu.tw
power system monitoring is carried out. In particular, we introduce the (network) state estimation
problem and solution which is vital for power … way to obtain optimal attack vector so that …

针对电力系统蓄意攻击的简要技术分析

闫茹, 费敏锐, 杜大军 - 系统仿真学报, 2017 - china-simulation.com
Power system state estimation with false data injection attack (FDIA) can effectively avoid …
power system safe and reliable operation into a huge threat. The attacker obtains the power

智能配用电系统的网络攻击检测与保护控制技术: 发展与挑战

曾嵘, 李勇, 曹一家, 谢李为, 邵霞 - 电气工程学报, 2023 - cjeecmp.cn
Optimal DoS attack policy against remote state estimation[C]//52nd IEEE Conference on …
DoS attack power allocation against remote state estimation via a block fading channel[C]//2018 …

基于机器学习的信息物理系统安全控制

刘坤, 马书鹤, 马奥运, 张淇瑞, 夏元清 - 自动化学报, 2021 - aas.net.cn
… guarantees the input-to-state stability of the attacked system is given. In … attacked with an
optimal strategy is generated. This strategy is obtained by solving an optimization problem from

[PDF][PDF] 面向电力信息物理系统的虚假数据注入攻击研究综述

王琦, 邰伟, 汤奕, 倪明 - 自动化学报, 2019 - esnl.hnu.edu.cn
… data attack on power system state estimation and defense mechanism. Power System Technol…
A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart Grids. …

[PDF][PDF] 考量合作與傳染病式攻擊下確保服務持續性之有效防禦策略

鍾蕙宇, 林永松 - 2012 - oplab.im.ntu.edu.tw
… collaborative attack into consideration and model the network attack-… attacking phase, the
commander would launch attacks and allocate his resources appropriately to achieve the best