Author of the publication

Robust H ∞ Finite-Time Fault-Tolerant Control of switched Systems with Asynchronous Switching1.

, , , and . Control. Intell. Syst., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A navigation simulation system of lunar rover., , , , and . ICNSC, page 556-561. IEEE, (2008)Nonparametric Topic-Aware Sparsification of Influence Networks., , , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 83-90. Springer, (2014)An upper bound based greedy algorithm for mining top-k influential nodes in social networks., , , and . WWW (Companion Volume), page 421-422. ACM, (2014)Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach., , , and . J. Comput. Sci., (2015)Atom-centered machine-learning force field package., , , , , , , and . Comput. Phys. Commun., (November 2023)DOD and DOA Estimation for Bistatic Co-Prime MIMO Array Based on Correlation Matrix Augmentation., , , , , and . ICCAIS, page 1-5. IEEE, (2019)An Improved SAO Scheme for Screen Content Coding., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (7): 1499-1502 (2016)Rethinking pre-training on medical imaging., , , and . J. Vis. Commun. Image Represent., (2021)Towards better semantic consistency of 2D medical image segmentation., , , , and . J. Vis. Commun. Image Represent., (2021)Trusted edge and cross-domain privacy enhancement model under multi-blockchain., , , and . Comput. Networks, (October 2023)