已选(0)清除
条数/页: 排序方式: |
| 图神经网络表示学习方法研究 学位论文 , 2023 作者: 叶雪 Adobe PDF(25235Kb)  |  收藏  |  浏览/下载:140/7  |  提交时间:2023/06/16 深度学习 图神经网络 注意力机制 元学习 拓扑数据分析 |
| Fully Distributed Nash Equilibrium Seeking for High-Order Players With Actuator Limitations 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 6, 页码: 1434-1444 作者: Maojiao Ye; Qing-Long Han; Lei Ding; Shengyuan Xu Adobe PDF(1869Kb)  |  收藏  |  浏览/下载:66/20  |  提交时间:2023/05/29 Actuator limitation directed networks games Nash equilibrium |
| Event-Triggered Asymmetric Bipartite Consensus Tracking for Nonlinear Multi-Agent Systems Based on Model-Free Adaptive Control 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 3, 页码: 662-672 作者: Jiaqi Liang; Xuhui Bu; Lizhi Cui; Zhongsheng Hou Adobe PDF(1799Kb)  |  收藏  |  浏览/下载:121/37  |  提交时间:2023/03/02 Asymmetric bipartite consensus tracking event-triggered model-free adaptive control (MFAC) nonlinear systems signed digraph |
| Distributed Nash Equilibrium Seeking for General Networked Games With Bounded Disturbances 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 2, 页码: 376-387 作者: Maojiao Ye; Danhu Li; Qing-Long Han; Lei Ding Adobe PDF(27414Kb)  |  收藏  |  浏览/下载:159/26  |  提交时间:2023/01/16 Distributed networks disturbance rejection Nash equilibrium networked games |
| A Survey on the Control Lyapunov Function and Control Barrier Function for Nonlinear-Affine Control Systems 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 3, 页码: 584-602 作者: Boqian Li; Shiping Wen; Zheng Yan; Guanghui Wen; Tingwen Huang Adobe PDF(2663Kb)  |  收藏  |  浏览/下载:419/306  |  提交时间:2023/03/02 Control barrier function (CBF) control Lyapunov function (CLF) nonlinear-affine control systems |
| Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 5, 页码: 1181-1191 作者: Haibin Guo; Jian Sun; Zhong-Hua Pang Adobe PDF(1752Kb)  |  收藏  |  浏览/下载:115/40  |  提交时间:2023/04/26 Cyber-physical systems (CPSs) false data injection (FDI) attacks remote state estimation stealthy attacks |