UM

Browse/Search Results:  1-10 of 66 Help

Selected(0)Clear Items/Page:    Sort:
Stepwise modeling approach to explore the interfacial behavior of Ca(OH)2/Sulfate Journal article
Wang, Meng, Sun, Wangzhe, Hou, Dongshuai, Wang, Muhan, Zheng, Heping, Zhang, Jun, Chen, Binmeng. Stepwise modeling approach to explore the interfacial behavior of Ca(OH)2/Sulfate[J]. Journal of Building Engineering, 2024, 98, 111005.
Authors:  Wang, Meng;  Sun, Wangzhe;  Hou, Dongshuai;  Wang, Muhan;  Zheng, Heping; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.7/6.8 | Submit date:2024/11/05
Atomic Simulation  Calcium Hydroxide  Interfacial Behavior  Ionic Hydration Layer  Sulfate Attack  
Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns Journal article
Yang, Shaohua, Lao, Keng Weng, Hui, Hongxun, Chen, Yulin. Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns[J]. IEEE Transactions on Power Systems, 2024, 39(6), 7277-7290.
Authors:  Yang, Shaohua;  Lao, Keng Weng;  Hui, Hongxun;  Chen, Yulin
Favorite | TC[WOS]:8 TC[Scopus]:17  IF:6.5/7.4 | Submit date:2024/05/16
Demand Response  Deception Cyber-attack  Arbitrary Attack Pattern  Secure Distributed Control  Lyapunov Theorem  
Contrastive semi-supervised adversarial training method for hyperspectral image classification networks 面向高光谱图像分类网络的对比半监督对抗训练方法 Journal article
Cheng, Shi, Ying, Liu, Minghua, Zhao, Qiguang, Miao, Chi-Man, Pun. Contrastive semi-supervised adversarial training method for hyperspectral image classification networks 面向高光谱图像分类网络的对比半监督对抗训练方法[J]. Journal of Image and Graphics, 2024, 29(7), 1861-1874.
Authors:  Cheng, Shi;  Ying, Liu;  Minghua, Zhao;  Qiguang, Miao;  Chi-Man, Pun
Favorite | TC[Scopus]:0 | Submit date:2024/09/03
Adversarial Attack  Adversarial Defense  Deep Neural Network  Hyperspectral Image Classification  Semi-supervised Learning  
Fooling the Image Dehazing Models by First Order Gradient Journal article
Gui, Jie, Cong, Xiaofeng, Peng, Chengwei, Tang, Yuan Yan, Kwok, James Tin Yau. Fooling the Image Dehazing Models by First Order Gradient[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6265 - 6278.
Authors:  Gui, Jie;  Cong, Xiaofeng;  Peng, Chengwei;  Tang, Yuan Yan;  Kwok, James Tin Yau
Favorite | TC[WOS]:0 TC[Scopus]:3  IF:8.3/7.1 | Submit date:2024/05/16
Image Dehazing  Adversarial Attack And Defense  Security  First Order Gradient  
Black-box reversible adversarial examples with invertible neural network Journal article
Huang, Jielun, Huang, Guoheng, Zhang, Xuhui, Yuan, Xiaochen, Xie, Fenfang, Pun, Chi Man, Zhong, Guo. Black-box reversible adversarial examples with invertible neural network[J]. Image and Vision Computing, 2024, 147, 105094.
Authors:  Huang, Jielun;  Huang, Guoheng;  Zhang, Xuhui;  Yuan, Xiaochen;  Xie, Fenfang; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:4.2/4.3 | Submit date:2024/06/05
Adversarial Attack  Image Restoration  Invertible Neural Network  
Frequency-constrained transferable adversarial attack on image manipulation detection and localization Journal article
Zeng, Yijia, Pun, Chi Man. Frequency-constrained transferable adversarial attack on image manipulation detection and localization[J]. The Visual Computer, 2024, 40(7), 4817-4828.
Authors:  Zeng, Yijia;  Pun, Chi Man
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.0/3.0 | Submit date:2024/07/04
Adversarial Attack  Forgery Image Detection And Localization  Reverse Image Forensics  Transferability  
Mode-Holding Control for Markov Jump Systems: When Event-Triggering Effect Meets DoS Attack Threat Journal article
Cao, Zhiru, Liu, Jason J.R., Peng, Chen. Mode-Holding Control for Markov Jump Systems: When Event-Triggering Effect Meets DoS Attack Threat[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2024, 71(6), 3096-3100.
Authors:  Cao, Zhiru;  Liu, Jason J.R.;  Peng, Chen
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:4.0/3.7 | Submit date:2024/05/16
Markov Jump System  Networked Control System  Adaptive Event-triggered Mechanism  Stochastic Dos Attack  Sliding Mode Control  
Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme Journal article
Zhao, Jing, Jia, Junru, Li, Wenfeng, Zhang, Jinxi, Du, Haiping, Xie, Zhengchao, Wong, Pak Kin. Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme[J]. IEEE/ASME Transactions on Mechatronics, 2024, 1-12.
Authors:  Zhao, Jing;  Jia, Junru;  Li, Wenfeng;  Zhang, Jinxi;  Du, Haiping; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:6.1/6.2 | Submit date:2024/07/04
Attack Estimation  Hybrid Triggered Scheme  Security Control  Suspension Systems  Vibration Control  
Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting Journal article
Yang, Lei, Liang, Gaoshen, Yang, Yanrong, Ruan, Jiaqi, Yu, Peipei, Yang, Chao. Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting[J]. IET Renewable Power Generation, 2024, 18(7), 1370-1379.
Authors:  Yang, Lei;  Liang, Gaoshen;  Yang, Yanrong;  Ruan, Jiaqi;  Yu, Peipei; et al.
Favorite | TC[WOS]:2 TC[Scopus]:3  IF:2.6/2.8 | Submit date:2024/02/22
Adversarial False Data Injection Attack  Cyber Threat  Deep Learning  Renewable Energy  Resilience  Wind Speed Forecasting  
Reversible Adversarial Image Examples with Beam Search Attack and Grayscale Invariance Conference paper
Zhang, Haodong, Pun, Chi Man, Du, Xia. Reversible Adversarial Image Examples with Beam Search Attack and Grayscale Invariance[C]:SPIE-INT SOC OPTICAL ENGINEERING, 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA, 2024.
Authors:  Zhang, Haodong;  Pun, Chi Man;  Du, Xia
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2024/06/05
Adversarial Attack  Beam Search  Grayscale Invariance  Reversible Data Hiding