Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analogue-digital mixed method for solving the dynamical degradation of digital chaotic systems., , and . IMA J. Math. Control. Inf., 32 (4): 703-716 (2015)Chaos synchronization and parameters estimation of chaotic Lur'e systems with full unknown parameters via sampled-data control., and . IMA J. Math. Control. Inf., 35 (4): 1251-1262 (2018)Robust Synchronization by Time-Varying Impulsive Control., and . IEEE Trans. Circuits Syst. II Express Briefs, 57-II (9): 735-739 (2010)MESDeceiver: Efficiently Generating Natural Language Adversarial Examples., , , and . IJCNN, page 1-8. IEEE, (2022)A Method of Security Measurement of the Network Data Transmission., , , and . IPDPS, IEEE Computer Society, (2005)A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism., and . Multim. Tools Appl., 80 (14): 20883-20905 (2021)Pseudorandom bit generator based on non-stationary logistic maps., , , and . IET Inf. Secur., 10 (2): 87-94 (2016)Route Planning for Unmanned Aerial Vehicle (UAV) on the Sea Using Hybrid Differential Evolution and Quantum-Behaved Particle Swarm Optimization., , , and . IEEE Trans. Syst. Man Cybern. Syst., 43 (6): 1451-1465 (2013)On the eigenvalue and Shannon's entropy of finite length random sequences., , , and . Complex., 21 (2): 154-161 (2015)Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model., , , and . Comput. Secur., (2023)