CASIA OpenIR

浏览/检索结果: 共58条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
State-Based Opacity Verification of Networked Discrete Event Systems Using Labeled Petri Nets 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1274-1291
作者:  Yifan Dong;  Naiqi Wu;  Zhiwu Li
Adobe PDF(7338Kb)  |  收藏  |  浏览/下载:26/7  |  提交时间:2024/04/10
Labeled Petri net  multi-valued decision diagram  networked discrete event system  state-based opacity  
Evolutionary Optimization Methods for High-Dimensional Expensive Problems: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1092-1105
作者:  MengChu Zhou;  Meiji Cui;  Dian Xu;  Shuwei Zhu;  Ziyan Zhao;  Abdullah Abusorrah
Adobe PDF(2100Kb)  |  收藏  |  浏览/下载:9/3  |  提交时间:2024/04/10
Evolutionary algorithm (EA)  high-dimensional expensive problems (HEPs)  industrial applications  surrogate-assisted optimization  
A Tutorial on Federated Learning from Theory to Practice: Foundations, Software Frameworks, Exemplary Use Cases, and Selected Trends 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 824-850
作者:  M. Victoria Luzón;  Nuria Rodríguez-Barroso;  Alberto Argente-Garrido;  Daniel Jiménez-López;  Jose M. Moyano;  Javier Del Ser;  Weiping Ding;  Francisco Herrera
Adobe PDF(4602Kb)  |  收藏  |  浏览/下载:22/8  |  提交时间:2024/03/18
Data privacy  distributed machine learning  federated learning  software frameworks  
Dendritic Learning-Incorporated Vision Transformer for Image Recognition 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 539-541
作者:  Zhiming Zhang;  Zhenyu Lei;  Masaaki Omura;  Hideyuki Hasegawa;  Shangce Gao
Adobe PDF(965Kb)  |  收藏  |  浏览/下载:85/37  |  提交时间:2024/01/23
Fault Estimation for a Class of Markov Jump Piecewise-Affine Systems: Current Feedback Based Iterative Learning Approach 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 418-429
作者:  Yanzheng Zhu;  Nuo Xu;  Fen Wu;  Xinkai Chen;  Donghua Zhou
Adobe PDF(5104Kb)  |  收藏  |  浏览/下载:35/12  |  提交时间:2024/01/23
Current feedback  fault estimation  iterative learning observer  Markov jump piecewise-affine system  
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 377-390
作者:  Honghao Zhu;  MengChu Zhou;  Yu Xie;  Aiiad Albeshri
Adobe PDF(2674Kb)  |  收藏  |  浏览/下载:43/16  |  提交时间:2024/01/23
Credit card fraud detection (CCFD)  dandelion algorithm (DA)  feature selection  normal sowing operator  
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 10, 页码: 1984-1999
作者:  Feiye Zhang;  Qingyu Yang;  Dou An
Adobe PDF(3841Kb)  |  收藏  |  浏览/下载:79/41  |  提交时间:2023/09/07
Centralized training and decentralized execution  demand side management  multi-agent reinforcement learning  privacy preserving  
Scheduling Dual-Arm Multi-Cluster Tools With Regulation of Post-Processing Time 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1730-1742
作者:  Qinghua Zhu;  Bin Li;  Yan Hou;  Hongpeng Li;  Naiqi Wu
Adobe PDF(1768Kb)  |  收藏  |  浏览/下载:130/40  |  提交时间:2023/07/20
Cluster tool  optimization  scheduling  
Steps Toward Industry 5.0: Building “6S” Parallel Industries With Cyber-Physical-Social Intelligence 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1692-1703
作者:  Xingxia Wang;  Jing Yang;  Yutong Wang;  Qinghai Miao;  Fei-Yue Wang;  Aijun Zhao;  Jian-Ling Deng;  Lingxi Li;  Xiaoxiang Na;  Ljubo Vlacic
Adobe PDF(15811Kb)  |  收藏  |  浏览/下载:108/23  |  提交时间:2023/07/20
ACP  artificial intelligence  CPS  CPSS  Industry 4.0  Industry 5.0  parallel industries  parallel intelligence  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:100/23  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay