Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             43 results found
no title author magazine year volume issue page(s) type
1 Adaptive tracking control of two-wheeled mobile robots under Denial-of-Service attacks Han, Zhen

141 C p. 365-376
article
2 A graph empowered insider threat detection framework based on daily activities Hong, Wei

141 C p. 84-92
article
3 A novel adaptive droop control strategy for SoC balance in PV-based DC microgrids Li, Boxi

141 C p. 351-364
article
4 A survey on blockchain sharding Liu, Xinmeng

141 C p. 30-43
article
5 A switched extremum seeking control without steady-state oscillation using gradient-based adaptive-amplitude perturbation Chu, Minghui

141 C p. 314-325
article
6 Backdoor attacks against distributed swarm learning Chen, Kongyang

141 C p. 59-72
article
7 Compliant human–robot object transfer based on modular 3-axis force sensor for collaborative manufacturing Hua, Hongliang

141 C p. 482-495
article
8 Constrained control using novel nonlinear mapping for underactuated unmanned surface vehicles with unknown sideslip angle Tong, Haiyan

141 C p. 261-275
article
9 Convergence analysis on a tracking differentiator used in active disturbance rejection control Zhang, Huixia

141 C p. 392-400
article
10 Decentralized access control for secure microservices cooperation with blockchain Xi, Ning

141 C p. 44-51
article
11 Design and parameter tuning of active disturbance rejection control for uncertain multivariable systems via quantitative feedback theory Cheng, Yun

141 C p. 288-302
article
12 Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph Feng, Xinguo

141 C p. 10-19
article
13 Differential evolution for population diversity mechanism based on covariance matrix Shao, Xueying

141 C p. 335-350
article
14 Distributed H ∞ filtering of replay attacks over sensor networks Sun, Ying

141 C p. 113-120
article
15 Dual-frequency enhanced attention network for aircraft engine remaining useful life prediction Yang, Qichao

141 C p. 167-183
article
16 Editorial Board
141 C p. ii
article
17 Enhancing projection based iterative learning control: A set-membership approach Li, Li

141 C p. 428-439
article
18 Event-triggered robust distributed output feedback model predictive control for nonlinear MASs against false data injection attacks Li, Zhengcai

141 C p. 197-211
article
19 High-precision dynamic torque control of high stiffness actuator for humanoids Liu, Yaliang

141 C p. 401-413
article
20 How to protect smart and autonomous vehicles from stealth viruses and worms Chen, Ming

141 C p. 52-58
article
21 Intelligent time-delay reduction of nonlinear model predictive control (NMPC) for wheeled mobile robots in the presence of obstacles Korayem, Moharam Habibnejad

141 C p. 414-427
article
22 Kernel-based PMP structure for nonlinear industrial quality-related process monitoring Ma, Hao

141 C p. 184-196
article
23 Known classes aware and emerging unknown classes rejection based on adversarial training for open set fault diagnosis She, Bo

141 C p. 455-469
article
24 Leader-following output-feedback consensus for second order multiagent systems with arbitrary convergence time and prescribed performance Gong, Wenquan

141 C p. 251-260
article
25 Learning-based near-optimal tracking control for industrial processes with slow and fast modes Li, Jinna

141 C p. 212-222
article
26 Making contract users safer: Towards building a Safe Browsing platform on Ethereum Tan, Cheng

141 C p. 121-131
article
27 MiDA: Membership inference attacks against domain adaptation Zhang, Yuanjie

141 C p. 103-112
article
28 Modeling and motion control of helical microrobots using the dual quaternion framework and adaptive sliding mode strategy Zhang, Chen

141 C p. 223-240
article
29 On the stability of nonlinear sampled-data systems and their continuous-time limits Vallarella, Alexis J.

141 C p. 326-334
article
30 Optimal vector matching fusion method for bionic compound eye polarization compass and inertial sensor integration Dou, Qingfeng

141 C p. 496-506
article
31 Privacy preserving federated learning for full heterogeneity Chen, Kongyang

141 C p. 73-83
article
32 Privacy preserving for AI-based 3D human pose recovery and retargeting Yan, Xiaodan

141 C p. 132-142
article
33 RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications Liu, Jianghua

141 C p. 20-29
article
34 Reliable fuzzy control of uncertain nonlinear networked systems under actuator faults Echreshavi, Zeinab

141 C p. 157-166
article
35 Robust adaptive three-dimensional trajectory tracking control scheme design for small fixed-wing UAVs Yang, Wenlong

141 C p. 377-391
article
36 Robust control of water quality in horizontal sub-surface flow wetlands using decentralized quantitative feedback theory based controller Chakravarty, Sandipan Prasad

141 C p. 440-454
article
37 Secure and efficient authenticated group key agreement protocol for AI-based automation systems Zhou, Tianqi

141 C p. 1-9
article
38 Secure control scheme for CPSs under DoS attacks via multiple transmission channels and unknown input observer Shi, Tianbiao

141 C p. 143-156
article
39 Switched step integral backstepping control for nonlinear motion systems with application to a laboratory helicopter Haruna, A.

141 C p. 470-481
article
40 Synchronization of discrete-time fractional fuzzy neural networks with delays via quantized control Yang, Jikai

141 C p. 241-250
article
41 Target ranging via sparse non-uniform short-time fractional Fourier transformation for multi-parameter modulated signal Dao, Xinyu

141 C p. 303-313
article
42 Trajectory tracking controller of a robotized arm with joint constraints, a direct adaptive gain with state limitations approach Hernandez-Sanchez, Alejandra

141 C p. 276-287
article
43 Trust assessment for mobile crowdsensing via device fingerprinting Cui, Helei

141 C p. 93-102
article
                             43 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands