Author of the publication

Dynamic Compliance Analysis for LHDS of Legged Robot, Part B: Force-Based Impedance Control.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The position-based impedance control combined with compliance-eliminated and feedforward compensation for HDU of legged robot., , , , , , and . J. Frankl. Inst., 356 (16): 9232-9253 (2019)An Object Context Integrated Network for Joint Learning of Depth and Optical Flow., , , , and . IEEE Trans. Image Process., (2020)Optical flow and scene flow estimation: A survey., , , and . Pattern Recognit., (2021)ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference., , , , , and . J. Comput. Sci. Technol., 37 (2): 405-422 (2022)Self-supervised Monocular Trained Depth Estimation Using Triplet Attention and Funnel Activation., , , , and . Neural Process. Lett., 53 (6): 4489-4506 (2021)RiceRelativesGD: a genomic database of rice relatives for rice research., , , , , , , , , and 2 other author(s). Database J. Biol. Databases Curation, (2019)Dynamic Compliance Analysis for LHDS of Legged Robot, Part A: Position-Based Impedance Control., , , , , , and . IEEE Access, (2018)MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing., , , , , , and . NDSS, The Internet Society, (2022)SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities., , , , , and . TrustCom, page 131-138. IEEE, (2022)Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor., , , , and . BlockSys, volume 1679 of Communications in Computer and Information Science, page 292-305. Springer, (2022)