0 | -- | 0 | Anfan Zhang, Shugen Ma, Bin Li, Minghui Wang, Xian Guo, Yuechao Wang. Adaptive controller design for underwater snake robot with unmatched uncertainties |
0 | -- | 0 | Haibin Duan, Han Li, Qinan Luo, Cong Zhang, Cong Li, Pei Li, Yimin Deng. A binocular vision-based UAVs autonomous aerial refueling platform |
0 | -- | 0 | Yong Zhao, Shengjie Lu, Hailong Qian, Pengcheng Yao. Robust mesh deformation with salient features preservation |
0 | -- | 0 | Peilian Guo, Yuzhen Wang, Haitao Li. Stable degree analysis for strategy profiles of evolutionary networked games |
0 | -- | 0 | Yuanjun Laili, Lin Zhang, Fei Tao, Ping Chuan Ma. Rotated neighbor learning-based auto-configured evolutionary algorithm |
0 | -- | 0 | Gang Yang, Xingshe Zhou. Intelligent CPS: features and challenges |
0 | -- | 0 | Hai Jin, Weiqi Dai, Deqing Zou. Theory and methodology of research on cloud security |
0 | -- | 0 | Yanlong Zhao, Wenjian Bi, Ting Wang. Iterative parameter estimate with batched binary-valued observations |
0 | -- | 0 | Hongbo Yu, Yonglin Hao, Dongxia Bai. Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack |
0 | -- | 0 | Dave Towey, Yunwei Dong, Chang-ai Sun, Tsong Yueh Chen. Metamorphic testing as a test case selection strategy |
0 | -- | 0 | Song Li, Hai-Xin Duan, Zhiliang Wang, Jinjin Liang, Xing Li. An accurate distributed scheme for detection of prefix interception |
0 | -- | 0 | Ling Du, Xiaochun Cao, Wei Zhang, Xinpeng Zhang, Na Liu, Jianguo Wei. Semi-fragile watermarking for image authentication based on compressive sensing |
0 | -- | 0 | Lin Xu, Shaobo Lin, ZongBen Xu. Learning capability of the truncated greedy algorithm |
0 | -- | 0 | Xiushan Nie, Yane Chai, Ju Liu, Jiande Sun, Yilong Yin. Spherical torus-based video hashing for near-duplicate video detection |
0 | -- | 0 | Fengrong Zhang, Shixiong Xia, Pantelimon Stanica, Yu Zhou. Further results on constructions of generalized bent Boolean functions |
0 | -- | 0 | Lulu Wang, Bixin Li, Hareton Leung. A new method to encode calling contexts with recursions |
0 | -- | 0 | Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, Wanqing Wu. Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem |
0 | -- | 0 | Xiaoge Zhang, Andrew Adamatzky, Xin-She Yang, Hai Yang, Sankaran Mahadevan, Yong Deng. A Physarum-inspired approach to supply chain network design |
0 | -- | 0 | Xiai Chen, Zhi Han, Yao Wang, Yandong Tang, Haibin Yu. Nonconvex plus quadratic penalized low-rank and sparse decomposition for noisy image alignment |
0 | -- | 0 | Jianfei Huang, Yu Kang, Bin Meng, Yun-Bo Zhao, Haibo Ji. Characteristic model based adaptive controller design and analysis for a class of SISO systems |
0 | -- | 0 | Dayou Liu, Bo Yang 0002, Shang Gao, Yungang Zhu, Yong Lai. Intelligent CPSS and its application to health care computing |
0 | -- | 0 | Huaimin Wang, Bo Ding. Growing construction and adaptive evolution of complex software systems |
0 | -- | 0 | Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee. One-to-many authentication for access control in mobile pay-TV systems |
0 | -- | 0 | Fei Yan, Abdullah M. Iliyasu, Huamin Yang, Kaoru Hirota. Strategy for quantum image stabilization |
0 | -- | 0 | Zhenfu Cao. New trends of information security - how to change people's life style? |
0 | -- | 0 | Wei Huang, Xianfeng Zhao. Novel cover selection criterion for spatial steganography using linear pixel prediction error |
0 | -- | 0 | Eric Madelaine, Min Zhang. Towards a bisimulation theory for open synchronized networks of automata |
0 | -- | 0 | Xiao-Shan Gao, Zhenyu Huang. Solving Boolean equation systems and applications in cryptanalysis |