default search action
Tian-Yu Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Tian-Yu Zhang, Guang-Hong Yang, Dan Ye:
Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks. Autom. 171: 111947 (2025) - 2024
- [j20]Tian-Yu Zhang, Dan Ye, Guang-Hong Yang:
Ripple effect of cooperative attacks in multi-agent systems: Results on minimum attack targets. Autom. 159: 111307 (2024) - [j19]Tian-Yu Zhang, Enjian Yao, Yang Yang, Hong-Ming Yang, David Z. W. Wang:
Multi-network coordinated charging infrastructure planning for the self-sufficient renewable power highway. Comput. Aided Civ. Infrastructure Eng. 39(16): 2517-2540 (2024) - [j18]Cai-Yi Ma, Yamei Luo, Tian-Yu Zhang, Yu-Duo Hao, Xue-Qin Xie, Xiao-Wei Liu, Xiaolei Ren, Xiaolin He, Yu-Mei Han, Ke-Jun Deng, Dan Yan, Hui Yang, Hua Tang, Hao Lin:
Predicting coronary heart disease in Chinese diabetics using machine learning. Comput. Biol. Medicine 169: 107952 (2024) - [j17]Kai-Yu Wang, Dan Ye, Tian-Yu Zhang:
Data-Driven Undetectable Attack Against State Estimation in Distributed Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 54(5): 3134-3143 (2024) - 2023
- [j16]Hui Yang, Yamei Luo, Cai-Yi Ma, Tian-Yu Zhang, Tao Zhou, Xiaolei Ren, Xiaolin He, Kejun Deng, Dan Yan, Hua Tang, Hao Lin:
A gender specific risk assessment of coronary heart disease based on physical examination data. npj Digit. Medicine 6 (2023) - [j15]Tian-Yu Zhang, Dan Ye, Yang Shi:
Decentralized False-Data Injection Attacks Against State Omniscience: Existence and Security Analysis. IEEE Trans. Autom. Control. 68(8): 4634-4649 (2023) - [i1]Xiao-Yun Xu, Tian-Yu Zhang, Zi-Wei Wang, Chu-Han Wang, Xian-Min Jin:
A Reconfigurable Photonic Processor for NP-complete Problems. CoRR abs/2308.14156 (2023) - 2022
- [j14]Dan Ye, Bing Yang, Tian-Yu Zhang:
Optimal Stealthy Linear Attack on Remote State Estimation With Side Information. IEEE Syst. J. 16(1): 1499-1507 (2022) - [j13]Tian-Yu Zhang, Dan Ye, Xingang Zhao:
Completely Event-Triggered Consensus for Multiagent Systems With Directed Switching Topologies. IEEE Trans. Cybern. 52(8): 7865-7874 (2022) - [j12]Tian-Yu Zhang, Dan Ye, Ge Guo:
Distributed Event-Triggered Control for Multiagent Systems Under Denial-of-Service Attacked Topology: Secure Mode Strategy. IEEE Trans. Syst. Man Cybern. Syst. 52(10): 6534-6544 (2022) - [c8]Tian-Yu Zhang, Jun Li, Jie Chai, Zhong-Qiu Zhao, Weidong Tian:
Improved YOLOv5 Network with Attention and Context for Small Object Detection. ICIC (3) 2022: 341-352 - [c7]Wei-Dong Tian, Jun-jun Zhu, Shuang Wu, Zhong-Qiu Zhao, Yu-Zheng Zhang, Tian-Yu Zhang:
A Sub-captions Semantic-Guided Network for Image Captioning. ICIC (3) 2022: 367-379 - 2021
- [j11]Tian-Yu Zhang, Dan Ye:
Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks. Inf. Sci. 542: 380-390 (2021) - [j10]Tian-Yu Zhang, Dan Ye:
A novel adaptive cooperative attack design against cyber-physical systems via mixed H∞/H- index. J. Frankl. Inst. 358(1): 17-34 (2021) - 2020
- [j9]Tian-Yu Zhang, Dan Ye:
False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach. Autom. 120: 109117 (2020) - [j8]Dan Ye, Tian-Yu Zhang:
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems. IEEE Trans. Cybern. 50(6): 2338-2345 (2020) - [j7]Tian-Yu Zhang, Dan Ye:
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology. IEEE Trans. Cybern. 50(7): 3094-3103 (2020)
2010 – 2019
- 2019
- [j6]Dan Ye, Tian-Yu Zhang, Ge Guo:
Stochastic coding detection scheme in cyber-physical systems against replay attack. Inf. Sci. 481: 432-444 (2019) - [c6]Tian-Yu Zhang, Dan Ye, Yue Long:
Detection for Controller-to-Actuator Replay Attack in Cyber-Physical Systems via Pseudo-Random Code. ASCC 2019: 1346-1351 - 2014
- [c5]Yuanyuan Man, Shuai Wang, Tian-Yu Zhang, T. J. Wong, Irwin King:
Corporate Leaders Analytics and Network System (CLANS): Constructing and Mining Social Networks among Corporations and Business Elites in China. ICONIP (1) 2014: 610-618 - 2013
- [j5]Lin Yang, Tian-Yu Zhang, Jim X. Chen, Pei-Dong Dai, Wei Quan, Keqiang Wang, Zheng-Min Wang:
Motion Simulation of Inner Hair Cell Stereocilia. Comput. Sci. Eng. 15(2): 27-33 (2013) - [j4]Yao-yao Fu, Tian-Yu Zhang, Pei-Dong Dai, Lin Yang:
Evaluating Potential Ear Canal Reconstruction for Congenital Aural Atresia Patients. Comput. Sci. Eng. 15(2): 34-40 (2013) - 2011
- [c4]Tian-Yu Zhang, Ai-ping Ji:
Schur-Convexity of Generalized Heronian Mean. ICICA (2) 2011: 25-33 - [c3]Bo-Yan Xi, Shuhong Wang, Tian-Yu Zhang:
Schur-Convexity on Generalized Information Entropy and Its Applications. ICICA (LNCS) 2011: 153-160 - [c2]Shuhong Wang, Tian-Yu Zhang, Bo-Yan Xi:
Schur Convexity for a Class of Symmetric Functions. ICICA (1) 2011: 626-634
2000 – 2009
- 2009
- [j3]You-Zhou Xie, Lin Yang, Li-Fen Chen, Pei-Dong Dai, Tian-Yu Zhang, Jim X. Chen, Zheng-Min Wang:
A Virtual Platform for Auditory Organ Mechanics Analysis. Comput. Sci. Eng. 11(4): 74-80 (2009) - 2008
- [c1]Jian-Hong Gan, Pei-Dong Dai, Qiang Peng, Jim X. Chen, Tian-Yu Zhang, Zheng-Min Wang:
The Simulation of Benign Tumor Growth in Blood Vessels Circumstance. CSSE (1) 2008: 223-227 - 2007
- [j2]Tian-Yu Zhang, Pei-Dong Dai, Zheng-Min Wang, Keqiang Wang, Jim X. Chen, Le Xie:
A Contour Map of the Ear's Vestibular Apparatus Based on 3D Reconstruction. Comput. Sci. Eng. 9(1): 26-31 (2007) - 2005
- [j1]Pei-Dong Dai, Tian-Yu Zhang, Jim X. Chen, Zheng-Min Wang, Keqiang Wang:
A virtual laboratory for temporal bone microanatomy. Comput. Sci. Eng. 7(2): 75-79 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint