Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant Size Ciphertext and Private Key HIBE without Random Oracles., , , and . J. Inf. Sci. Eng., 30 (2): 333-345 (2014)Projected primal-dual gradient flow of augmented Lagrangian with application to distributed maximization of the algebraic connectivity of a network., , , and . Autom., (2018)Optimizing Robustness of Core-Periphery Structure in Complex Networks., , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (12): 3572-3576 (2021)Pose Synchronization of Multiple Rigid Bodies Under Average Dwell Time Condition., , , and . J. Syst. Sci. Complex., 31 (1): 215-233 (2018)Design of evacuation strategies with crowd density feedback., and . Sci. China Inf. Sci., 59 (1): 1-11 (2016)Parallel simultaneous stabilization of a set of Port-Controlled Hamiltonian systems subject to actuator saturation., , and . J. Systems Science & Complexity, 24 (1): 120-139 (2011)Linear reachability versus global stabilization., and . IEEE Trans. Automat. Contr., 44 (6): 1303-1305 (1999)On Forwarding Protocols in Linear Topology Wake-up Wireless Sensor Networks., , , and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 380-391. Springer, (2018)Reliable service computing platform architecture for cross-organizational workflows., , , , , and . SMC, page 3066-3071. IEEE, (2014)Intrinsic reduced attitude formation with ring inter-agent graph., , , , and . Autom., (2017)