UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Encryption-decryption-based set-membership filtering for two-dimensional systems: on security and boundedness Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Wei, Guoliang. Encryption-decryption-based set-membership filtering for two-dimensional systems: on security and boundedness[J]. Automatica, 2025, 173, 112091.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Wei, Guoliang
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:4.8/6.0 | Submit date:2025/01/22
Encryption-decryption Mechanism  Two-dimensional Systems  Unknown-but-bounded Noises  Set-membership Filtering  Uniform Boundedness  
Optimized Evaluations of Irrigation Profits and Balance of Irrigation Water Demand and Supply Under Climate Change Journal article
Yang, Zidong, Chen, Yuanfang, Wang, Shuhong, Zhou, Changrang, Niu, Liqun, Wang, Wenpeng, Huang, Qin, Yu, Hang. Optimized Evaluations of Irrigation Profits and Balance of Irrigation Water Demand and Supply Under Climate Change[J]. Water, 2024, 16(23), 3525.
Authors:  Yang, Zidong;  Chen, Yuanfang;  Wang, Shuhong;  Zhou, Changrang;  Niu, Liqun; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.0/3.3 | Submit date:2024/12/26
Balance Of Irrigation Water DemAnd And Supply  Irrigation Profits  Optimized Evaluation  Reversed Optimization  
Secure Observer-Based Collision-Free Control for Autonomous Vehicles Under Non-Gaussian Noises Journal article
Zhu, Kaiqun, Wang, Zidong, Li, Zhenning, Xu, Cheng Zhong. Secure Observer-Based Collision-Free Control for Autonomous Vehicles Under Non-Gaussian Noises[J]. IEEE Transactions on Industrial Informatics, 2024.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Li, Zhenning;  Xu, Cheng Zhong
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:11.7/11.4 | Submit date:2024/12/26
Autonomous Vehicle  Chance Constraint  Encryption Mechanism  Tracking Control  Uncertainty  
Privacy-Preserving Control for 2-D Systems With Guaranteed Probability Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Han, Qing-Long. Privacy-Preserving Control for 2-D Systems With Guaranteed Probability[J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54(8), 4999-5011.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Han, Qing-Long
Favorite | TC[WOS]:7 TC[Scopus]:8  IF:8.6/8.7 | Submit date:2024/10/09
Dynamic Coding-decoding Rule  Guaranteed Probability  Privacy-preserving Mechanism (Ppm)  Two-dimensional (2-d) Systems  
Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Xu, Cheng Zhong. Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Xu, Cheng Zhong
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:10.2/10.4 | Submit date:2024/05/16
Artificial Neural Networks  Artificial Neural Networks (Anns)  Bandwidth  Bandwidth Constraints  Cryptography  Encryption  Homomorphic Encryption Scheme (Hes)  Noise  Secure State Estimation  Security  Set-membership State Estimation  State Estimation  
Recursive locally minimum-variance filtering for two-dimensional systems: When dynamic quantization effect meets random sensor failure Journal article
Fan Wang, Zidong Wang, Jinling Liang, Carlos Silvestre. Recursive locally minimum-variance filtering for two-dimensional systems: When dynamic quantization effect meets random sensor failure[J]. Automatica, 2022, 148, 110762.
Authors:  Fan Wang;  Zidong Wang;  Jinling Liang;  Carlos Silvestre
Favorite | TC[WOS]:14 TC[Scopus]:15  IF:4.8/6.0 | Submit date:2023/02/22
Two-dimensional Systems  Recursive Filter  Dynamic Quantization  Sensor Failure  Monotonicity  Boundedness  
A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks Journal article
Wang, Fan, Wang, Zidong, Liang, Jinling, Silvestre, Carlos. A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks[J]. IEEE Transactions on Network Science and Engineering, 2022, 9(2), 678-688.
Authors:  ; et al.
Favorite | TC[WOS]:15 TC[Scopus]:16  IF:6.7/6.0 | Submit date:2022/05/17
Deception Attacks  Performance Analysis  Recursive Filtering  State Saturation  Two-dimensional Systems