


default search action
Yuzhe Li
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j82]Nachuan Yang, Jiawei Tang, Yuzhe Li, Ling Shi:
Sparse optimization of H2 controllers for LTI Systems: A log-barrier Method. Autom. 173: 112102 (2025) - [j81]Yake Yang, Zhi Li, Xudong Zhao, Yuzhe Li:
Worst-case performance of Kalman filtering against cyber-attacks with true and contaminated information. Autom. 176: 112257 (2025) - [j80]Cheng Tan
, Jianying Di
, Ge Guo
, Yuzhe Li
, Wing Shing Wong
:
Exponential Mean-Square Stabilization Control for Cyber-Physical Systems Under Random DoS Attacks and Transmission Delay. IEEE Trans. Autom. Control. 70(1): 190-202 (2025) - [j79]Wei Xing
, Xudong Zhao
, Yuzhe Li
, Le Liu
:
Denial-of-Service Attacks on Cyber-Physical Systems Against Linear Quadratic Control: A Stackelberg-Game Analysis. IEEE Trans. Autom. Control. 70(1): 595-602 (2025) - [j78]Nachuan Yang
, Yuzhe Li
, Tongwen Chen
, Ling Shi
:
Sparsity Promoting Observer Design for Wireless Sensor-Estimator Networks. IEEE Trans. Autom. Control. 70(2): 1184-1191 (2025) - [j77]Nachuan Yang
, Jiawei Tang
, Yuzhe Li
, Guodong Shi
, Ling Shi
:
Log-Barrier Search for Structural Linear Quadratic Regulators. IEEE Trans. Autom. Control. 70(3): 1965-1972 (2025) - [j76]Ran Chen
, Yuzhe Li
, Tianyou Chai
:
Risk-Constrained MPC With Application in Safety-Critical Control of Turbofan Engines. IEEE Trans Autom. Sci. Eng. 22: 872-882 (2025) - [i11]Ling Fu, Biao Yang, Zhebin Kuang, Jiajun Song, Yuzhe Li, Linghao Zhu, Qidi Luo, Xinyu Wang, Hao Lu, Mingxin Huang, Zhang Li, Guozhi Tang, Bin Shan, Chunhui Lin, Qi Liu, Binghong Wu, Hao Feng, Hao Liu, Can Huang, Jingqun Tang, Wei Chen, Lianwen Jin, Yuliang Liu, Xiang Bai:
OCRBench v2: An Improved Benchmark for Evaluating Large Multimodal Models on Visual Text Localization and Reasoning. CoRR abs/2501.00321 (2025) - 2024
- [j75]Yun Chen
, Hong-Bing Zeng, Yuzhe Li:
Stability analysis of linear delayed systems based on an allowable delay set partitioning approach. Autom. 163: 111603 (2024) - [j74]Hao Liu
, Yuzhe Li:
Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises. Commun. Nonlinear Sci. Numer. Simul. 128: 107648 (2024) - [j73]Cheng Tan
, Qinglong Zhang
, Jianying Di
, Yuzhe Li
:
Pareto Optimal Control for Multi-Controller Networked Control Systems With Intermittent Observation. IEEE Control. Syst. Lett. 8: 2457-2462 (2024) - [j72]Kunpeng Zhang, Xinlei Yi, Yuzhe Li
, Ming Cao
, Tianyou Chai, Tao Yang
:
Distributed online constrained convex optimization with event-triggered communication. Eur. J. Control 80: 101042 (2024) - [j71]Yuzhe Li, Yuning Zhang:
Deep-Learning-Based Real-Time Passive Non-Line-of-Sight Imaging for Room-Scale Scenes. Sensors 24(19): 6480 (2024) - [j70]Yake Yang
, Yuzhe Li
, Yang Shi
, Daniel E. Quevedo
:
The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity Attacks. IEEE Trans. Autom. Control. 69(5): 3096-3111 (2024) - [j69]Cheng Tan
, Zhengqiang Zhang
, Huanshui Zhang
, Yuzhe Li
, Wing Shing Wong
:
Asymptotical Mean-Square Stabilization of Networked Control Systems Operating Over Multipath Routing Networks. IEEE Trans. Autom. Control. 69(7): 4681-4688 (2024) - [j68]Hezhe Sun
, Yufei Wang
, Huiwen Yang
, Kaixuan Huo
, Yuzhe Li
:
Strategic Gradient Transmission With Targeted Privacy-Awareness in Model Training: A Stackelberg Game Analysis. IEEE Trans. Artif. Intell. 5(9): 4635-4648 (2024) - [j67]Yingmin Kan, Huiwen Yang
, Fuyi Qu
, Yuzhe Li
:
Sensor Power Control for Remote State Estimation With Historical Data Re-Transmission. IEEE Trans Autom. Sci. Eng. 21(3): 4058-4069 (2024) - [j66]Cheng Tan
, Xinrui Ma, Zhengqiang Zhang
, Yuzhe Li
:
Adaptive Output Feedback Tracking Control for Nonlinear Time-Delay Systems With Sensor Uncertainties. IEEE Trans. Circuits Syst. II Express Briefs 71(2): 707-711 (2024) - [j65]Cheng Tan
, Haoting Sui, Yuzhe Li
:
Mean Square Consensus of Multi-Agent Systems Over Non-Identical Delayed and Fading Channels. IEEE Trans. Circuits Syst. II Express Briefs 71(9): 4261-4265 (2024) - [j64]Fuyi Qu
, Nachuan Yang
, Hao Liu
, Yuzhe Li
, Daniel E. Quevedo
:
Time-Stamp Attacks on Remote State Estimation in Cyber-Physical Systems. IEEE Trans. Control. Netw. Syst. 11(1): 450-461 (2024) - [j63]Cheng Tan
, Haoting Sui
, Yuzhe Li
, Zhengqiang Zhang
, Wing Shing Wong
:
Consensus of Networked Multiagent Systems Operating Over Multiple Communication Channels. IEEE Trans. Control. Netw. Syst. 11(3): 1420-1429 (2024) - [j62]Yun Chen
, Fuyi Qu
, Yuqing Ni
, Yuzhe Li
:
Strategic Information Transmission Against Malicious Eavesdropper and Semihonest Estimator: A Tripartite Game Analysis. IEEE Trans. Control. Netw. Syst. 11(4): 1825-1834 (2024) - [j61]Nachuan Yang
, Zikai Wang
, Tianci Yang
, Yuzhe Li
, Ling Shi
:
LASSO-Based Detection and Identification of Actuator Integrity Attacks in Remote Control Systems. IEEE Trans. Control. Syst. Technol. 32(2): 696-704 (2024) - [j60]Jun Fu
, Chensong Li, Yabing Huang
, Yuzhe Li
, Tianyou Chai
:
Invariance Principles for Nonlinear Discrete-Time Switched Systems and Its Application to Output Synchronization of Dynamical Networks. IEEE Trans. Cybern. 54(2): 1261-1271 (2024) - [j59]Weiwei Cao
, Ran Chen
, Mingxin Kang
, Yuzhe Li
, Tianyou Chai
:
Signal Compensation Control With DDPG-Based Tuning Strategy for Electronic Throttle System. IEEE Trans. Ind. Electron. 71(3): 2924-2932 (2024) - [j58]Yahan Deng
, Hao Yu
, Yuzhe Li
:
Stealthy Insider Attack on Stochastic Event-Triggered Scheduler: Dealing With Non-Gaussian Components. IEEE Trans. Inf. Forensics Secur. 19: 6886-6895 (2024) - [j57]Fuyi Qu
, Nachuan Yang
, Hao Liu
, Yuzhe Li
:
K-L Divergence-Based Detection of Attacks on Remote Control: The Utilization of Local Information. IEEE Trans. Ind. Informatics 20(6): 9070-9079 (2024) - [j56]Ying Zhao
, Yuxuan Gao
, Hong Sang
, Jun Fu
, Yuzhe Li
:
Event-Triggered Adaptive Antidisturbance Switching Control for Switched Systems With Dynamic Neural Network Disturbance Modeling. IEEE Trans. Neural Networks Learn. Syst. 35(12): 17688-17700 (2024) - [j55]Fuyi Qu
, Nachuan Yang
, Jun Fu
, Hao Liu
, Yuzhe Li
:
Stealthy Attack on Remote Control System With Local Controller and Its Countermeasures. IEEE Trans. Syst. Man Cybern. Syst. 54(2): 1147-1158 (2024) - [j54]Bing Zhao
, Qing Gao
, Yuzhe Li
, Jinhu Lü
, Kexin Zhang
:
Cooperative Security Analysis of Industry Cloud Control Systems Under False Data Injection Attacks. IEEE Trans. Syst. Man Cybern. Syst. 54(5): 3124-3133 (2024) - [j53]Ran Chen
, Yuzhe Li
, Xi-Ming Sun
, Tianyou Chai
:
Multiobjective Optimization for Turbofan Engine Using Gradient-Free Method. IEEE Trans. Syst. Man Cybern. Syst. 54(7): 4345-4357 (2024) - [c19]Xudong Xie, Yuzhe Li, Yang Liu, Zhifei Zhang, Zhaowen Wang, Wei Xiong, Xiang Bai:
WAS: Dataset and Methods for Artistic Text Segmentation. ECCV (55) 2024: 237-254 - [c18]Chao Gao, Lei Xu, Kunpeng Zhang, Yuzhe Li, Zhiwei Liu, Tao Yang:
Distributed Event-Triggered Nonconvex Optimization under Polyak-Łojasiewicz Condition. ICARCV 2024: 930-935 - [c17]Ran Chen, Yuzhe Li, Tianyou Chai:
Multi-Objective Derivative-Free Optimization Based on Hessian-Aware Gaussian Smoothing Method. ICCA 2024: 210-215 - [c16]Yake Yang, Tao Yang, Yuzhe Li:
A Total Secrecy Coding Scheme with True Random Sequences for Remote Estimation Against Eavesdroppers with Anti-Coding Mechanisms. ICCA 2024: 918-923 - [c15]Shuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li:
T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud. TrustCom 2024: 960-967 - [i10]Xudong Xie, Yuzhe Li, Yang Liu, Zhifei Zhang, Zhaowen Wang, Wei Xiong, Xiang Bai:
WAS: Dataset and Methods for Artistic Text Segmentation. CoRR abs/2408.00106 (2024) - 2023
- [j52]Yuzhe Li, Ran Chen, Yang Shi:
Spatiotemporal learning-based stochastic MPC with applications in aero-engine control. Autom. 153: 111014 (2023) - [j51]Hao Liu, Yewei Zhang, Yuzhe Li, Ben Niu:
Proactive attack detection scheme based on watermarking and moving target defense. Autom. 155: 111163 (2023) - [j50]Haoyuan Xu
, Yake Yang, Jun Shang, Jun Fu, Yuzhe Li:
Integrity attacks on remote estimation with spatial-temporal information sources. Autom. 155: 111172 (2023) - [j49]Yuzhe Li
, Yong Liu
, Bo Li
, Weiping Wang, Nan Liu:
Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM. Comput. Secur. 128: 103147 (2023) - [j48]Changwu Wu
, Wenyong Long, Chaoying Qin, Xiangyu Wang, Yuzhe Li, Kai Xiao, Yue Li, Qing Liu
:
Liquid biopsy-based identification of prognostic and immunotherapeutically relevant gene signatures in lower grade glioma. J. Big Data 10(1): 19 (2023) - [j47]Nachuan Yang
, Jiawei Tang
, Yik Ben Wong
, Yuzhe Li
, Ling Shi
:
Linear Quadratic Control of Positive Systems: A Projection-Based Approach. IEEE Trans. Autom. Control. 68(4): 2376-2382 (2023) - [j46]Hao Liu
, Yuzhe Li
, Qing-Long Han
, Tarek Raïssi
:
Watermark-Based Proactive Defense Strategy Design for Cyber-Physical Systems With Unknown-but-Bounded Noises. IEEE Trans. Autom. Control. 68(6): 3300-3315 (2023) - [j45]Qirui Zhang
, Kun Liu
, André M. H. Teixeira
, Yuzhe Li
, Senchun Chai
, Yuanqing Xia
:
An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems. IEEE Trans. Autom. Control. 68(6): 3672-3679 (2023) - [j44]Yuzhe Li
, Yake Yang
, Zhengen Zhao
, Jing Zhou
, Daniel E. Quevedo
:
Deception Attacks on Remote Estimation With Disclosure and Disruption Resources. IEEE Trans. Autom. Control. 68(7): 4096-4112 (2023) - [j43]Zhengen Zhao
, Yunsong Xu
, Yuzhe Li
, Ziyang Zhen
, Ying Yang
, Yang Shi
:
Data-Driven Attack Detection and Identification for Cyber-Physical Systems Under Sparse Sensor Attacks. IEEE Trans. Autom. Control. 68(10): 6330-6337 (2023) - [j42]Hao Liu
, Yuzhe Li
, Qing-Long Han
, Tarek Raïssi
, Tianyou Chai:
Secure Estimation, Attack Isolation, and Reconstruction Based on Zonotopic Unknown Input Observer. IEEE Trans. Autom. Control. 68(12): 7312-7325 (2023) - [j41]Cheng Tan
, Haoting Sui
, Yuzhe Li
, Zhengqiang Zhang
, Wing Shing Wong
:
Integrated Stabilizing Control for Sampled-Data NCSs With Intermittent Observation and Multiple Random Transmission Delays. IEEE Trans. Control. Netw. Syst. 10(4): 2035-2047 (2023) - [j40]Zhengen Zhao
, Yunsong Xu
, Yuzhe Li
, Yu Zhao
, Bohui Wang
, Guanghui Wen
:
Sparse Actuator Attack Detection and Identification: A Data-Driven Approach. IEEE Trans. Cybern. 53(6): 4054-4064 (2023) - [j39]Ran Chen
, Jingjiang Yu, Zhengen Zhao
, Yuzhe Li
, Jun Fu
, Tianyou Chai
:
Multiobjective Bayesian Optimization for Aeroengine Using Multiple Information Sources. IEEE Trans. Ind. Informatics 19(11): 11343-11352 (2023) - [j38]Mengyu Huang
, Kemi Ding
, Subhrakanti Dey
, Yuzhe Li
, Ling Shi
:
Learning-Based DoS Attack Power Allocation in Multiprocess Systems. IEEE Trans. Neural Networks Learn. Syst. 34(10): 8017-8030 (2023) - [j37]Fuyi Qu, Ahmad W. Al-Dabbagh
, Zhengen Zhao
, Hao Liu
, Yuzhe Li
:
Remote State Estimation in Networked Systems: Data Pre-Processing or Not? IEEE Trans. Netw. Sci. Eng. 10(6): 3895-3907 (2023) - [j36]Jun Fu
, Chenxuanyin Zou
, Mingsheng Zhang, Xinglong Lu
, Yuzhe Li
:
Multiobjective Dynamic Optimization of Nonlinear Systems With Path Constraints. IEEE Trans. Syst. Man Cybern. Syst. 53(3): 1530-1542 (2023) - [j35]Cheng Tan
, Jianying Di, Zhengqiang Zhang
, Yuzhe Li
, Wing Shing Wong
:
Necessary and Sufficient Conditions for Stabilizing an Uncertain Stochastic Multidelay System. IEEE Trans. Syst. Man Cybern. Syst. 53(10): 6169-6180 (2023) - [j34]Gaofeng Ren, Hao Liu
, Yewei Zhang, Yuzhe Li
:
Attack Detection Based on Encoding-Decoding Approach for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 53(10): 6293-6302 (2023) - [c14]Nachuan Yang, Yuxing Zhong, Yuzhe Li, Ling Shi:
Model-Unknown Spoofing Attack via False Data Injections. CDC 2023: 1814-1819 - [c13]Jianhui Li, Youcheng Niu, Shuang Li, Yuzhe Li, Jinming Xu, Junfeng Wu:
Inducing Desired Equilibrium in Taxi Repositioning Problem with Adaptive Incentive Design. CDC 2023: 8075-8080 - [c12]Yuzhe Li
, Bo Li
:
Solving the Performance Issues of Epsilon Estimation Method in Differentially Private ERM: Analysis, Solution and Evaluation. CNCIT 2023: 93-99 - [c11]Zhi Li, Danya Xu, Yuzhe Li, Tianyou Chai, Tao Yang:
OSVAE-GAN: Orthogonal Self-Attention Variational Autoencoder Generative Adversarial Networks for Time Series Anomaly Detection. SSCI 2023: 19-24 - [i9]Huiwen Yang, Lingying Huang, Yuzhe Li, Subhrakanti Dey, Ling Shi:
LQG Control Over SWIPT-enabled Wireless Communication Network. CoRR abs/2303.15131 (2023) - [i8]Kunpeng Zhang, Xinlei Yi, Yuzhe Li, Ming Cao, Tianyou Chai, Tao Yang:
Dynamic Regret and Cumulative Constraint Violation Analysis for Distributed Online Constrained Convex Optimization with Event-Triggered Communication. CoRR abs/2311.01957 (2023) - 2022
- [j33]Jun Fu, Yiwen Qi
, Ning Xing
, Yuzhe Li:
A new switching law for event-triggered switched systems under DoS attacks. Autom. 142: 110373 (2022) - [j32]Yuzhe Li, Yake Yang, Tianyou Chai, Tongwen Chen:
Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis. Autom. 144: 110461 (2022) - [j31]Nachuan Yang
, Yuzhe Li
, Ling Shi
:
Proportional Tracking Control of Positive Linear Systems. IEEE Control. Syst. Lett. 6: 1670-1675 (2022) - [j30]Hao Liu
, Ben Niu
, Yuzhe Li
:
False-Data-Injection Attacks on Remote Distributed Consensus Estimation. IEEE Trans. Cybern. 52(1): 433-443 (2022) - [j29]Mengyu Huang
, Kam Fai Elvis Tsang, Yuzhe Li
, Li Li
, Ling Shi
:
Strategic DoS Attack in Continuous Space for Cyber-Physical Systems Over Wireless Networks. IEEE Trans. Signal Inf. Process. over Networks 8: 421-432 (2022) - [j28]Hao Liu
, Shaodong Wang
, Ben Niu
, Yuzhe Li
:
A Novel Attack Detection for Linear Systems With Unknown-But-Bounded Noises. IEEE Trans. Syst. Man Cybern. Syst. 52(7): 4223-4232 (2022) - [j27]Hao Liu
, Shaodong Wang
, Yuzhe Li
:
Event-Triggered Control and Proactive Defense for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(10): 6305-6313 (2022) - [j26]Huiwen Yang
, Mengyu Huang
, Yuzhe Li
, Subhrakanti Dey
, Ling Shi
:
Joint Power Allocation for Remote State Estimation With SWIPT. IEEE Trans. Signal Process. 70: 1434-1447 (2022) - [c10]Nachuan Yang, Yuzhe Li, Ling Shi:
H∞ Control of Linear Uncertain Systems with Positivity Constraints. ASCC 2022: 542-546 - [c9]Nachuan Yang, Jiawei Tang, Yuzhe Li, Ling Shi:
LQR Design for Discrete-Time Positive Systems: A First-Order Method. CDC 2022: 4212-4217 - [c8]Ran Chen, Mingxin Kang, Yuzhe Li:
Aero-engine Performance Optimization Using MOEA with Selective Ensemble Learning. ICCA 2022: 814-819 - [c7]Yuzhe Li
, Bo Li
, Weiping Wang, Nan Liu:
An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints. TrustCom 2022: 533-540 - [i7]Yuzhe Li, Yong Liu, Bo Li
, Weiping Wang, Nan Liu:
Towards Practical Differential Privacy in Data Analysis: Understanding the Effect of Epsilon on Utility in Private ERM. CoRR abs/2206.03488 (2022) - 2021
- [j25]Tong Yang, Geli Zhang, Yuzhe Li, Jiangwen Fan, Danfeng Sun, Jie Wang, Yuanyuan Di
, Nanshan You, Ruoqi Liu, Qiang Zhang
, Russell B. Doughty
:
Satellite observed rapid green fodder expansion in northeastern Tibetan Plateau from 2010 to 2019. Int. J. Appl. Earth Obs. Geoinformation 102: 102394 (2021) - [j24]Yuchi Wu, Kemi Ding, Yuzhe Li, Ling Shi:
Optimal unbiased linear sensor fusion over multiple lossy channels with collective observability. Autom. 128: 109568 (2021) - [j23]Jing Zhou
, Jun Shang
, Yuzhe Li
, Tongwen Chen
:
Optimal DoS Attack Against LQR Control Channels. IEEE Trans. Circuits Syst. II Express Briefs 68(4): 1348-1352 (2021) - [j22]Zhengen Zhao
, Yimin Huang, Ziyang Zhen, Yuzhe Li
:
Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems. IEEE Trans. Cybern. 51(12): 6179-6187 (2021) - [c6]Yuzhe Li
, Yong Liu, Bo Li
, Weiping Wang, Nan Liu:
Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM Algorithms. TrustCom 2021: 371-378 - 2020
- [j21]Yuzhe Li, Dawei Shi, Tongwen Chen:
Secure analysis of dynamic networks under pinning attacks against synchronization. Autom. 111 (2020) - [j20]Yuxin Qiao, Huazhong Zhu, Huaping Zhong, Yuzhe Li:
Stratified Data Reconstruction and Spatial Pattern Analyses of Soil Bulk Density in the Northern Grasslands of China. ISPRS Int. J. Geo Inf. 9(11): 682 (2020) - [j19]Zhengen Zhao
, Yuzhe Li
, Ying Yang
, Linlin Li, Yunsong Xu
, Jing Zhou:
Sparse Undetectable Sensor Attacks Against Cyber-Physical Systems: A Subspace Approach. IEEE Trans. Circuits Syst. 67-II(11): 2517-2521 (2020) - [i6]Yuchi Wu, Kemi Ding, Yuzhe Li, Ling Shi:
Optimal Unbiased Linear Sensor Fusion over Multiple Lossy Channels with Collective Observability. CoRR abs/2012.04896 (2020)
2010 – 2019
- 2019
- [j18]Yuzhe Li, Aryan Saadat Mehr, Tongwen Chen:
Multi-sensor transmission power control for remote estimation through a SINR-based communication channel. Autom. 101: 78-86 (2019) - [j17]Yuchi Wu
, Yuzhe Li
, Ling Shi
:
Efficient Linear Sensor Fusion Over Multiple Lossy Channels With Local Observability. IEEE Control. Syst. Lett. 3(3): 721-726 (2019) - [j16]Liangxia Zhang, Decheng Zhou
, Jiangwen Fan, Qun Guo, Shiping Chen, Ranghui Wang, Yuzhe Li:
Contrasting the Performance of Eight Satellite-Based GPP Models in Water-Limited and Temperature-Limited Grassland Ecosystems. Remote. Sens. 11(11): 1333 (2019) - [j15]Yuzhe Li, Chung Shue Chen, Wing Shing Wong:
Power control for multi-sensor remote state estimation over interference channel. Syst. Control. Lett. 126: 1-7 (2019) - [c5]Yuzhe Li
, Jiang Zhou, Weiping Wang, Yong Chen
:
RE-Store: Reliable and Efficient KV-Store with Erasure Coding and Replication. CLUSTER 2019: 1-12 - [i5]Yuzhe Li, Dawei Shi, Tongwen Chen:
Secure Analysis of Dynamic Networks under Pinning Attacks against Synchronization. CoRR abs/1909.00582 (2019) - 2018
- [j14]Yuzhe Li, Junfeng Wu, Tongwen Chen:
Transmit power control and remote state estimation with sensor networks: A Bayesian inference approach. Autom. 97: 292-300 (2018) - [j13]Xingjian Guo, Quanqin Shao, Yuzhe Li, Yangchun Wang, Dongliang Wang
, Jiyuan Liu, Jiangwen Fan, Fan Yang:
Application of UAV Remote Sensing for a Population Census of Large Wild Herbivores - Taking the Headwater Region of the Yellow River as an Example. Remote. Sens. 10(7): 1041 (2018) - [j12]Yuzhe Li
, Dawei Shi
, Tongwen Chen
:
False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis. IEEE Trans. Autom. Control. 63(10): 3503-3509 (2018) - [j11]Ahmad W. Al-Dabbagh, Yuzhe Li
, Tongwen Chen:
An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems. IEEE Trans. Circuits Syst. II Express Briefs 65-II(8): 1049-1053 (2018) - [j10]Yuzhe Li
, Ling Shi
, Tongwen Chen
:
Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation. IEEE Trans. Control. Netw. Syst. 5(3): 846-856 (2018) - 2017
- [j9]Kemi Ding
, Yuzhe Li, Daniel E. Quevedo
, Subhrakanti Dey
, Ling Shi:
A multi-channel transmission schedule for remote state estimation under DoS attacks. Autom. 78: 194-201 (2017) - [j8]Junfeng Wu, Yuzhe Li
, Daniel E. Quevedo
, Ling Shi:
Improved results on transmission power control for remote state estimation. Syst. Control. Lett. 107: 44-48 (2017) - [j7]Yuzhe Li, Fan Zhang, Daniel E. Quevedo
, Vincent K. N. Lau, Subhrakanti Dey
, Ling Shi
:
Power Control of an Energy Harvesting Sensor for Remote State Estimation. IEEE Trans. Autom. Control. 62(1): 277-290 (2017) - [j6]Yuzhe Li, Daniel E. Quevedo
, Subhrakanti Dey
, Ling Shi:
SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach. IEEE Trans. Control. Netw. Syst. 4(3): 632-642 (2017) - [j5]Yinliang Yue, Bingsheng He
, Yuzhe Li
, Weiping Wang:
Building an Efficient Put-Intensive Key-Value Store with Skip-Tree. IEEE Trans. Parallel Distributed Syst. 28(4): 961-973 (2017) - [j4]Yuzhe Li
, Daniel E. Quevedo
, Subhrakanti Dey
, Ling Shi:
A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems. IEEE Trans. Signal Inf. Process. over Networks 3(1): 1-11 (2017) - [i4]Kemi Ding, Yuzhe Li, Subhrakanti Dey, Ling Shi:
Multi-sensor Transmission Management for Remote State Estimation under Coordination. CoRR abs/1703.09124 (2017) - 2016
- [c4]Yuzhe Li, Tongwen Chen:
Stochastic Detector against linear deception attacks on remote state estimation. CDC 2016: 6291-6296 - 2015
- [j3]Junfeng Wu, Yuzhe Li
, Daniel E. Quevedo
, Vincent K. N. Lau, Ling Shi
:
Data-driven power control for state estimation: A Bayesian inference approach. Autom. 54: 332-339 (2015) - [j2]Yuzhe Li
, Ling Shi
, Peng Cheng, Jiming Chen, Daniel E. Quevedo
:
Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach. IEEE Trans. Autom. Control. 60(10): 2831-2836 (2015) - [c3]Yuzhe Li
, Daniel E. Quevedo
, Subhrakanti Dey
, Ling Shi:
Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation. CDC 2015: 5795-5800 - [i3]Junfeng Wu, Yuzhe Li, Daniel E. Quevedo, Vincent K. N. Lau, Ling Shi:
Data-Driven Power Control for State Estimation: A Bayesian Inference Approach. CoRR abs/1503.07158 (2015) - [i2]Yuzhe Li, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi:
Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation. CoRR abs/1506.07955 (2015) - 2014
- [c2]Yuzhe Li
, Daniel E. Quevedo
, Vincent K. N. Lau, Ling Shi
:
Multi-sensor transmission power scheduling for remote state estimation under SINR model. CDC 2014: 1055-1060 - [i1]Yuzhe Li, Daniel E. Quevedo, Vincent K. N. Lau, Subhrakanti Dey, Ling Shi:
Transmission Power Scheduling for Energy Harvesting Sensor in Remote State Estimation. CoRR abs/1402.5784 (2014) - 2013
- [j1]Yuzhe Li
, Daniel E. Quevedo
, Vincent K. N. Lau
, Ling Shi
:
Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes. IEEE Trans. Signal Process. 61(24): 6164-6174 (2013) - [c1]Yuzhe Li
, Daniel E. Quevedo
, Vincent K. N. Lau
, Ling Shi
:
Online sensor transmission power schedule for remote state estimation. CDC 2013: 4000-4005
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-24 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint