Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research progress of artificial psychology and artificial emotion in China., , and . CAAI Trans. Intell. Technol., 1 (4): 355-365 (2016)False sequential logic attack on SCADA system and its physical impact analysis., , , and . Computers & Security, (2016)Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems., , and . IEEE Trans. Industrial Informatics, 15 (2): 663-676 (2019)A Transductive Model-based Stress Recognition Method Using Peripheral Physiological Signals., , and . Sensors, 19 (2): 429 (2019)Affective Computing of Childern with Authism Based on Feature Transfer., , , , , and . CCIS, page 845-849. IEEE, (2018)Intrusion detection research of control system based on robot arm., , , , and . ROBIO, page 2657-2662. IEEE, (2017)Field-oriented control of synchronous motor based on adaptive extended Kalman filter., , , and . CCIS, page 633-637. IEEE, (2011)Compliance Control Using Hydraulic Heavy-Duty Manipulator., , , and . IEEE Trans. Industrial Informatics, 15 (2): 1193-1201 (2019)Cognitive-affective regulation process for micro-expressions based on Gaussian cloud distribution., , , and . CAAI Trans. Intell. Technol., 2 (1): 56-61 (2017)A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression., , and . J. Electrical and Computer Engineering, (2018)