CASIA OpenIR

浏览/检索结果: 共1297条,第1-10条 帮助

  只显示已认领条目
已选(0)清除 条数/页:   排序方式:
隐蔽攻击下信息物理系统的安全输出反馈控制 期刊论文
自动化学报, 2024, 卷号: 50, 期号: 7, 页码: 1363-1372
作者:  张淇瑞;  孟思琪;  王兰豪;  刘坤;  代伟
Adobe PDF(1959Kb)  |  收藏  |  浏览/下载:9/2  |  提交时间:2024/07/25
信息物理系统  隐蔽攻击  安全控制  KL散度  可达集  
基于特征变换和度量网络的小样本学习算法 期刊论文
自动化学报, 2024, 卷号: 50, 期号: 7, 页码: 1305-1314
作者:  王多瑞;  杜杨;  董兰芳;  胡卫明;  李兵
Adobe PDF(1177Kb)  |  收藏  |  浏览/下载:4/3  |  提交时间:2024/07/25
特征变换  度量学习  小样本学习  残差学习  
Parallel Dispatching: An ACP-Based High-Speed Railway Intelligent Dispatching System 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 卷号: 9, 期号: 1, 页码: 1146-1160
作者:  Xu, Wei;  Zhao, Chen;  Dai, Xingyuan;  Yuan, Zhiming;  Zhang, Tao;  Wang, Tao;  Ren, Yuhai;  Lv, Yisheng
收藏  |  浏览/下载:9/0  |  提交时间:2024/07/22
Dispatching  Rail transportation  Personnel  Maintenance engineering  Intelligent vehicles  Behavioral sciences  Safety  Cyber-physical-social systems (CPSS)  artificial systems  computational experiments  parallel execution  ACP  decentralized  distributed autonomous operations and organi zations (DAO)  high-speed railway dispatching systems  
Adaptive Human-Robot Interaction Torque Estimation With High Accuracy and Strong Tracking Ability for a Lower Limb Rehabilitation Robot 期刊论文
IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2024, 页码: 12
作者:  Liang, Xu;  Yan, Yuchen;  Wang, Weiqun;  Su, Tingting;  He, Guangping;  Li, Guotao;  Hou, Zeng-Guang
收藏  |  浏览/下载:2/0  |  提交时间:2024/07/22
Adaptive learning  human-robot interaction  rehabilitation robot  torque estimation  
A Novel Parallel Control Method for Optimal Consensus of Nonlinear Multiagent Systems 期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2024, 页码: 14
作者:  Jiao, Shanshan;  Wei, Qinglai;  Wang, Fei-Yue
收藏  |  浏览/下载:1/0  |  提交时间:2024/07/22
Consensus control  Optimal control  Performance analysis  Vectors  Heuristic algorithms  Multi-agent systems  Dynamic programming  Adaptive dynamic programming (ADP)  coupled Hamilton-Jacobi  optimal consensus control  parallel control  
Co-representation of Functional Brain Networks Is Shaped by Cortical Myeloarchitecture and Reveals Individual Behavioral Ability 期刊论文
JOURNAL OF NEUROSCIENCE, 2024, 卷号: 44, 期号: 13, 页码: 14
作者:  Chu, Congying;  Li, Wen;  Shi, Weiyang;  Wang, Haiyan;  Wang, Jiaojian;  Liu, Yong;  Liu, Bing;  Elmenhorst, David;  Eickhoff, Simon B.;  Fan, Lingzhong;  Jiang, Tianzi
收藏  |  浏览/下载:1/0  |  提交时间:2024/07/22
co-representation  functional brain network  myeloarchitecture  resting-state fMRI  
Towards Domain-agnostic Depth Completion 期刊论文
Machine Intelligence Research, 2024, 卷号: 21, 期号: 4, 页码: 652-669
作者:  Guangkai Xu;   Wei Yin;   Jianming Zhang;   Oliver Wang;  Simon Niklaus;   Simon Chen;   Jia-Wang Bian
Adobe PDF(17196Kb)  |  收藏  |  浏览/下载:11/2  |  提交时间:2024/07/18
Monocular depth estimation  depth completion  zero-shot generalization  scene reconstruction  neural network  
The First Five Years of a Phase Theory for Complex Systems and Networks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 8, 页码: 1728-1743
作者:  Dan Wang;  Wei Chen;  Li Qiu
Adobe PDF(1875Kb)  |  收藏  |  浏览/下载:9/4  |  提交时间:2024/07/16
Consensus and synchronization  matrix phases  multi-agent systems  phase theory  sectored real lemma  small phase theorem  
Altered large-scale dynamic connectivity patterns in Alzheimer's disease and mild cognitive impairment patients: A machine learning study 期刊论文
Huamn Brian Mapping, 2023, 卷号: 44, 期号: 9, 页码: 3467-3480
作者:  Rixing Jing;  Pindong Chen;  Yongbin Wei;  Juanning Si;  Yuying Zhou;  Dawei Wang;  Chengyuan Song;  Hongwei Yang;  Zengqiang Zhang;  Hongxiang Yao;  Xiaopeng Kang;  Lingzhong Fan;  Tong Han;  Wen Qin;  Bo Zhou;  Tianzi Jiang;  Jie Lu;  Ying Han;  Xi Zhang;  Bing Liu;  Chunshui Yu;  Pan Wang;  Yong Liu
Adobe PDF(3939Kb)  |  收藏  |  浏览/下载:32/9  |  提交时间:2024/07/09
Adversarial Attacks on Scene Graph Generation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:  Zhao, Mengnan;  Zhang, Lihe;  Wang, Wei;  Kong, Yuqiu;  Yin, Baocai
收藏  |  浏览/下载:6/0  |  提交时间:2024/07/03
Task analysis  Object detection  Windows  Visualization  Mirrors  Predictive models  Perturbation methods  Scene graph generation  adversarial attack  bounding box relabeling  two-step weighted attack