Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems., , , , and . Neurocomputing, (2018)Event-triggered information fusion for networked systems with missing measurements and correlated noises., , and . Neurocomputing, (2019)Nonlinear Robust Compensation Method for Trajectory Tracking Control of Quadrotors., , , and . IEEE Access, (2019)An Adaptive Internal Model Control Based on LS-SVM., and . ISNN (3), volume 4493 of Lecture Notes in Computer Science, page 479-485. Springer, (2007)An Improved Method for Oriented Chamfer Matching., , and . IScIDE, volume 8261 of Lecture Notes in Computer Science, page 875-879. Springer, (2013)Computer Vision Based Pose Bias Detection of Shield Tunneling Machine., , , , and . IScIDE, volume 8261 of Lecture Notes in Computer Science, page 880-886. Springer, (2013)Gender Classification via Global-Local Features Fusion., , , and . CCBR, volume 7098 of Lecture Notes in Computer Science, page 214-220. Springer, (2011)Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems., , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 318-330. Springer, (2016)Neural-network-based approach to finite-time optimal control for a class of unknown nonlinear systems., , , and . Soft Comput., 18 (8): 1645-1653 (2014)Encoding spatio-temporal distribution by generalized VLAD for action recognition., , and . CCECE, page 620-625. IEEE, (2015)