已选(0)清除
条数/页: 排序方式: |
| Computational Experiments for Complex Social Systems: Integrated Design of Experiment System 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1175-1189 作者: Xiao Xue; Xiangning Yu; Deyu Zhou; Xiao Wang; Chongke Bi; Shufang Wang; Fei-Yue Wang Adobe PDF(11890Kb)  |  收藏  |  浏览/下载:28/4  |  提交时间:2024/04/10 Artificial society computational experiments model integration operation engine technology integration |
| Computational Experiments for Complex Social Systems: Experiment Design and Generative Explanation 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 1022-1038 作者: Xiao Xue; Deyu Zhou; Xiangning Yu; Gang Wang; Juanjuan Li; Xia Xie; Lizhen Cui; Fei-Yue Wang Adobe PDF(7239Kb)  |  收藏  |  浏览/下载:33/7  |  提交时间:2024/03/18 Agent-based modeling computational experiments cyber-physical-social systems (CPSS) generative deduction generative experiments meta model |
| Constrained Multi-Objective Optimization With Deep Reinforcement Learning Assisted Operator Selection 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 919-931 作者: Fei Ming; Wenyin Gong; Ling Wang; Yaochu Jin Adobe PDF(2091Kb)  |  收藏  |  浏览/下载:30/10  |  提交时间:2024/03/18 Constrained multi-objective optimization deep Q-learning deep reinforcement learning (DRL) evolutionary algorithms evolutionary operator selection |
| What Does Sora Show: The Beginning of TAO to Imaginative Intelligence and Scenarios Engineering 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 809-815 作者: Fei-Yue Wang; Qinghai Miao; Lingxi Li; Qinghua Ni; Xuan Li; Juanjuan Li; Lili Fan; Yonglin Tian; Qing-Long Han Adobe PDF(571Kb)  |  收藏  |  浏览/下载:25/7  |  提交时间:2024/03/18 |
| A Dual Closed-Loop Digital Twin Construction Method for Optimizing the Copper Disc Casting Process 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 3, 页码: 581-594 作者: Zhaohui Jiang; Chuan Xu; Jinshi Liu; Weichao Luo; Zhiwen Chen; Weihua Gui Adobe PDF(16387Kb)  |  收藏  |  浏览/下载:35/6  |  提交时间:2024/02/19 Copper disc casting machine digital twin (DT) mechanism modeling self-optimization |
| Diverse Deep Matrix Factorization With Hypergraph Regularization for Multi-View Data Representation 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 11, 页码: 2154-2167 作者: Haonan Huang; Guoxu Zhou; Naiyao Liang; Qibin Zhao; Shengli Xie Adobe PDF(3206Kb)  |  收藏  |  浏览/下载:127/38  |  提交时间:2023/09/22 Deep matrix factorization (DMF) diversity hypergraph regularization multi-view data representation (MDR) |
| Human-Like Decision-Making of Autonomous Vehicles in Dynamic Traffic Scenarios 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 10, 页码: 1905-1917 作者: Tangyike Zhang; Junxiang Zhan; Jiamin Shi; Jingmin Xin; Nanning Zheng Adobe PDF(2815Kb)  |  收藏  |  浏览/下载:147/62  |  提交时间:2023/09/07 Autonomous vehicles decision-making driving behavior human-like driving |
| AUTOSIM: Automated Urban Traffic Operation Simulation via Meta-Learning 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1871-1881 作者: Yuanqi Qin; Wen Hua; Junchen Jin; Jun Ge; Xingyuan Dai; Lingxi Li; Xiao Wang; Fei-Yue Wang Adobe PDF(3244Kb)  |  收藏  |  浏览/下载:88/17  |  提交时间:2023/08/10 Conditional generative adversarial network signalized urban networks short-term link speed prediction |
| How Generative Adversarial Networks Promote the Development of Intelligent Transportation Systems: A Survey 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1781-1796 作者: Hongyi Lin; Yang Liu; Shen Li; Xiaobo Qu Adobe PDF(1497Kb)  |  收藏  |  浏览/下载:133/84  |  提交时间:2023/08/10 Autonomous driving generative adversarial network (GAN) intelligent transportation system (ITS) traffic anomaly inspection traffic flow |
| Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667 作者: Li Duan; Yangyang Sun; Wei Ni; Weiping Ding; Jiqiang Liu; Wei Wang Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:104/23  |  提交时间:2023/07/20 Blockchain cross-chain defense distributed private key control hash-locking notary security threats sidechain/relay |