Author of the publication

Schur-Convexity on Generalized Information Entropy and Its Applications.

, , and . ICICA (LNCS), volume 7030 of Lecture Notes in Computer Science, page 153-160. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks., and . Inf. Sci., (2021)Decentralized False-Data Injection Attacks Against State Omniscience: Existence and Security Analysis., , and . IEEE Trans. Autom. Control., 68 (8): 4634-4649 (August 2023)Completely Event-Triggered Consensus for Multiagent Systems With Directed Switching Topologies., , and . IEEE Trans. Cybern., 52 (8): 7865-7874 (2022)Optimal Stealthy Linear Attack on Remote State Estimation With Side Information., , and . IEEE Syst. J., 16 (1): 1499-1507 (2022)A Contour Map of the Ear's Vestibular Apparatus Based on 3D Reconstruction., , , , , and . Comput. Sci. Eng., 9 (1): 26-31 (2007)Distributed Event-Triggered Control for Multiagent Systems Under Denial-of-Service Attacked Topology: Secure Mode Strategy., , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6534-6544 (2022)Predicting coronary heart disease in Chinese diabetics using machine learning., , , , , , , , , and 4 other author(s). Comput. Biol. Medicine, (February 2024)Schur-Convexity on Generalized Information Entropy and Its Applications., , and . ICICA (LNCS), volume 7030 of Lecture Notes in Computer Science, page 153-160. Springer, (2011)Summation Detector for False Data-Injection Attack in Cyber-Physical Systems., and . IEEE Trans. Cybern., 50 (6): 2338-2345 (2020)Corporate Leaders Analytics and Network System (CLANS): Constructing and Mining Social Networks among Corporations and Business Elites in China., , , , and . ICONIP (1), volume 8834 of Lecture Notes in Computer Science, page 610-618. Springer, (2014)