CASIA OpenIR

浏览/检索结果: 共74条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Adaptive Event-triggered Time-varying Output Group Formation Containment Control of Heterogeneous Multiagent Systems 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 6, 页码: 1398-1409
作者:  Lihong Feng;  Bonan Huang;  Jiayue Sun;  Qiuye Sun;  Xiangpeng Xie
Adobe PDF(3455Kb)  |  收藏  |  浏览/下载:19/9  |  提交时间:2024/05/22
Adaptive control  event-triggered mechanisms  formation containment (FC)  heterogeneous multiagent systems  time-varying group formation  
Attack-Resilient Distributed Cooperative Control of Virtually Coupled High-Speed Trains via Topology Reconfiguration 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 1066-1068
作者:  Shunyuan Xiao;  Xiaohua Ge;  Qing Wu
Adobe PDF(633Kb)  |  收藏  |  浏览/下载:87/40  |  提交时间:2024/03/18
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 878-892
作者:  Honghai Wang;  Qing-Long Han
Adobe PDF(2068Kb)  |  收藏  |  浏览/下载:51/18  |  提交时间:2024/03/18
Consensus protocol  Hurwitz stability  multi-agent systems  quasi-polynomials  time delay  
Achieving 500X Acceleration for Adversarial Robustness Verification of Tree-Based Smart Grid Dynamic Security Assessment 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 3, 页码: 800-802
作者:  Chao Ren;  Chunran Zou;  Zehui Xiong;  Han Yu;  Zhao-Yang Dong;  Niyato Dusit
Adobe PDF(469Kb)  |  收藏  |  浏览/下载:99/37  |  提交时间:2024/02/19
Reinforcement Learning in Process Industries: Review and Perspective 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 283-300
作者:  Oguzhan Dogru;  Junyao Xie;  Om Prakash;  Ranjith Chiplunkar;  Jansen Soesanto;  Hongtian Chen;  Kirubakaran Velswamy;  Fadi Ibrahim;  Biao Huang
Adobe PDF(1275Kb)  |  收藏  |  浏览/下载:53/17  |  提交时间:2024/01/23
Process control  process systems engineering  reinforcement learning  
Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 240-248
作者:  Dan You;  Shouguang Wang
Adobe PDF(855Kb)  |  收藏  |  浏览/下载:99/38  |  提交时间:2024/01/02
Cyber-attacks  cyber-physical system (CPS)  liveness  non-deterministic supervisors  Petri net (PN)  
Autonomous Vehicle Platoons In Urban Road Networks: A Joint Distributed Reinforcement Learning and Model Predictive Control Approach 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 141-156
作者:  Luigi D’Alfonso;  Francesco Giannini;  Giuseppe Franzè;  Giuseppe Fedele;  Francesco Pupo;  Giancarlo Fortino
Adobe PDF(7491Kb)  |  收藏  |  浏览/下载:221/131  |  提交时间:2024/01/02
Distributed model predictive control  distributed reinforcement learning  routing decisions  urban road networks  
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:  Qingsong Zhao;  Lei Shu;  Kailiang Li;  Mohamed Amine Ferrag;  Ximeng Liu;  Yanbin Li
Adobe PDF(3374Kb)  |  收藏  |  浏览/下载:257/178  |  提交时间:2024/01/02
Challenges  Internet of Things (IoT)  privacy and security  security requirements  solar insecticidal lamps (SIL)  
Transformer-Based Macroscopic Regulation for High-Speed Railway Timetable Rescheduling 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1822-1833
作者:  Wei Xu;  Chen Zhao;  Jie Cheng;  Yin Wang;  Yiqing Tang;  Tao Zhang;  Zhiming Yuan;  Yisheng Lv;  Fei-Yue Wang
Adobe PDF(3484Kb)  |  收藏  |  浏览/下载:123/60  |  提交时间:2023/08/10
High-speed railway  reinforcement learning  train timetable rescheduling  Transformer  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:125/29  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay