default search action
Ruochen Tai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Ruochen Tai, Liyong Lin, Rong Su:
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. IEEE Trans. Autom. Control. 69(3): 1898-1905 (2024) - [j10]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Distributed Covert Sensor-Actuator Attackers. IEEE Trans. Autom. Control. 69(8): 4942-4957 (2024) - 2023
- [j9]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. Autom. 150: 110860 (2023) - [j8]Ruochen Tai, Liyong Lin, Rong Su:
Synthesis of optimal covert sensor-actuator attackers for discrete-event systems. Autom. 151: 110910 (2023) - [j7]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of networked supervisory control with imperfect communication channels. Discret. Event Dyn. Syst. 33(1): 25-61 (2023) - [j6]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. IEEE Trans. Autom. Control. 68(6): 3453-3468 (2023) - [c6]Ruochen Tai, Liyong Lin, Rong Su:
Supervisor Fortification Against Covert Actuator Attacks. CDC 2023: 7917-7922 - [i11]Ruochen Tai, Liyong Lin, Rong Su:
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. CoRR abs/2307.15972 (2023) - 2022
- [j5]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
A new modeling framework for networked discrete-event systems. Autom. 138: 110139 (2022) - [j4]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis. Autom. 142: 110279 (2022) - [j3]Ruochen Tai, Liyong Lin, Rong Su:
Identification of System Vulnerability Under a Smart Sensor Attack via Attack Model Reduction. IEEE Control. Syst. Lett. 6: 2948-2953 (2022) - [j2]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-assisted heuristic synthesis of covert attackers against unknown supervisors. Discret. Event Dyn. Syst. 32(3): 495-520 (2022) - [c5]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Distributed Control of Timed Networked System against Communication Delays. ICCA 2022: 1008-1013 - [i10]Ruochen Tai, Liyong Lin, Rong Su:
Identification of System Vulnerability under a Smart Sensor Attack via Attack Model Reduction. CoRR abs/2201.10247 (2022) - [i9]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. CoRR abs/2203.08360 (2022) - [i8]Ruochen Tai, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Covert Actuator Attackers. CoRR abs/2205.02383 (2022) - 2021
- [c4]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CDC 2021: 7003-7008 - [c3]Yi Shen, Yang Hong, Wei Zhou, Ruochen Tai, Ye Yuan, Han Ding:
Manipulability and Robustness Optimization of the Cable-Driven Redundant Soft Manipulator. ROBIO 2021: 864-869 - [i7]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels. CoRR abs/2103.07132 (2021) - [i6]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CoRR abs/2103.11197 (2021) - [i5]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked Supervisor Synthesis Against Lossy Channels with Bounded Network Delays as Non-Networked Synthesis. CoRR abs/2103.11273 (2021) - [i4]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction. CoRR abs/2104.04299 (2021) - [i3]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. CoRR abs/2104.14919 (2021) - [i2]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations. CoRR abs/2106.12268 (2021) - 2020
- [j1]Jingchuan Wang, Ruochen Tai, Jingwen Xu:
A Bi-Level Probabilistic Path Planning Algorithm for Multiple Robots with Motion Uncertainty. Complex. 2020: 9207324:1-9207324:16 (2020) - [c2]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Supervisor Synthesis for Networked Discrete Event Systems with Delays against Non-FIFO Communication Channels. ICARCV 2020: 1027-1032 - [i1]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of Networked Supervisory Control with Imperfect Communication Channels. CoRR abs/2010.11491 (2020)
2010 – 2019
- 2018
- [c1]Ruochen Tai, Jingchuan Wang, Wei Tian, Weidong Chen, Hesheng Wang, Yue Zhou:
A Time-Efficient Approach to Solve Conflicts and Deadlocks for Scheduling AGVs in Warehousing Applications. RCAR 2018: 166-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint