CASIA OpenIR

浏览/检索结果: 共25条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1877-1890
作者:  null Mamta;  Brij B. Gupta;  Kuan-Ching Li;  Victor C. M. Leung;  Kostas E. Psannis;  Shingo Yamaguchi
Adobe PDF(1923Kb)  |  收藏  |  浏览/下载:216/60  |  提交时间:2021/09/03
Cloud-based cyber-physical systems (CCPS)  data encryption  healthcare information search and retrieval  keyword search  public-key cryptosystems  searchable encryption  
Energy-Efficient Optimal Guaranteed Cost Intermittent-Switch Control of a Direct Expansion Air Conditioning System 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 11, 页码: 1852-1866
作者:  Jun Mei;  Zhenyu Lu;  Junhao Hu;  Yuling Fan
Adobe PDF(1768Kb)  |  收藏  |  浏览/下载:136/58  |  提交时间:2021/09/03
Energy efficiency  hierarchical control  open loop optimal control  optimal guaranteed cost periodically intermittent-switch control  
Decentralized Resilient H Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 11, 页码: 1737-1751
作者:  Xin Zhao;  Suli Zou;  Zhongjing Ma
Adobe PDF(3053Kb)  |  收藏  |  浏览/下载:198/43  |  提交时间:2021/09/03
Cyber-physical power systems (CPPSs)  denial-of-service (DoS) attacks  load frequency control (LFC)  sampled-data control  
MU-GAN: Facial Attribute Editing Based on Multi-Attention Mechanism 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 9, 页码: 1614-1626
作者:  Ke Zhang;  Yukun Su;  Xiwang Guo;  Liang Qi;  Zhenbing Zhao
Adobe PDF(13892Kb)  |  收藏  |  浏览/下载:130/22  |  提交时间:2021/09/03
Attention U-Net connection  encoder-decoder architecture  facial attribute editing  multi-attention mechanism  
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 9, 页码: 1477-1499
作者:  Mohamed Amine Ferrag;  Lei Shu;  Kim-Kwang Raymond Choo
Adobe PDF(2997Kb)  |  收藏  |  浏览/下载:182/44  |  提交时间:2021/09/03
Blockchain  COVID-19  healthcare  privacy  SARS-CoV-2  security  
Design and Analysis of a Novel 2T2R Parallel Mechanism with the Closed-loop Limbs 期刊论文
International Journal of Automation and Computing, 2021, 卷号: 18, 期号: 4, 页码: 654-666
作者:  Hai-Rong Fang;  Peng-Fei Liu;  Hui Yang;  Bing-Shan Jiang
Adobe PDF(2387Kb)  |  收藏  |  浏览/下载:228/71  |  提交时间:2021/07/20
2T2R parallel mechanism  close loop structure  high stiffness  kinematics analysis  workspace  
Delayed Teleoperation with Force Feedback of a Humanoid Robot 期刊论文
International Journal of Automation and Computing, 2021, 卷号: 18, 期号: 4, 页码: 605-618
作者:  Viviana Moya;  Emanuel Slawiñski;  Vicente Mut
Adobe PDF(2260Kb)  |  收藏  |  浏览/下载:162/53  |  提交时间:2021/07/20
Humanoid robot  bilateral teleoperation  time delay  force feedback  walking  manipulation  
Ensuring the Correctness of Regular Expressions: A Review 期刊论文
International Journal of Automation and Computing, 2021, 卷号: 18, 期号: 4, 页码: 521-535
作者:  Li-Xiao Zheng;  Shuai Ma;  Zu-Xi Chen;  Xiang-Yu Luo
Adobe PDF(1076Kb)  |  收藏  |  浏览/下载:139/44  |  提交时间:2021/07/20
Regular expressions  correctness  string generation  learning  static checking  verification  visualization, repairing  
Distributed Subgradient Algorithm for Multi-Agent Optimization With Dynamic Stepsize 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 8, 页码: 1451-1464
作者:  Xiaoxing Ren;  Dewei Li;  Yugeng Xi;  Haibin Shao
Adobe PDF(2527Kb)  |  收藏  |  浏览/下载:120/39  |  提交时间:2021/06/11
Distributed optimization  dynamic stepsize  gradient method  multi-agent networks  
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 8, 页码: 1440-1450
作者:  Yue Zhao;  Ze Chen;  Chunjie Zhou;  Yu-Chu Tian;  Yuanqing Qin
Adobe PDF(6237Kb)  |  收藏  |  浏览/下载:194/54  |  提交时间:2021/06/11
Cyber-physical systems  energy controller  energy conversion  false data injection attacks  L2 disturbance attenuation technology