Author of the publication

Fault Tolerant Control for Dynamic Positioning of Unmanned Marine Vehicles Based on T-S Fuzzy Model With Unknown Membership Functions.

, , , , and . IEEE Trans. Veh. Technol., 70 (1): 146-157 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive fuzzy modular backstepping output feedback control of uncertain nonlinear systems in the presence of input saturation., , and . Int. J. Machine Learning & Cybernetics, 4 (5): 527-536 (2013)COLREGs-Compliant Unmanned Surface Vehicles Collision Avoidance Based on Multi-Objective Genetic Algorithm., , , , and . IEEE Access, (2020)A Survey on DNA-Based Cryptography and Steganography., , , , , and . IEEE Access, (2023)Distributed Optimal Energy Management for We-Energy Considering Operation Security., , , , , and . IEEE Trans. Netw. Sci. Eng., 11 (1): 225-235 (January 2024)Adaptive Neural Control Using Tangent Time-Varying BLFs for a Class of Uncertain Stochastic Nonlinear Systems With Full State Constraints., , , , and . IEEE Trans. Cybern., 51 (4): 1943-1953 (2021)Observer-Based Platoon Formation Control With Prescribed Performance Guarantees for Unmanned Surface Vehicles in Presence of Nonsmooth Input Characteristics., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (3): 1226-1230 (March 2024)Target tracking method of Siamese networks based on the broad learning system., , , , and . CAAI Trans. Intell. Technol., 8 (3): 1043-1057 (September 2023)Attacks detection and security control for cyber-physical systems under false data injection attacks., , , and . J. Frankl. Inst., 360 (14): 10476-10498 (September 2023)Event-Triggered Multisource Bumpless Transfer Control for Networked Switched Systems With Almost Output Regulation Against Switching Deception Attacks., , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (7): 3956-3965 (July 2023)Neural-network-based formation control with collision, obstacle avoidance and connectivity maintenance for a class of second-order nonlinear multi-agent systems., , , , , , and . Neurocomputing, (2021)