![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Wentao Zhang 0003
Person information
- affiliation: Nanyang Technological University, Singapore
Other persons with the same name
- Wentao Zhang — disambiguation page
- Wentao Zhang 0001
— Peking University, Beijing, China (and 1 more)
- Wentao Zhang 0002
— Institute of Semiconductors, Chinese Academy of Sciences, Beijing, China
- Wentao Zhang 0004 — Southeast University, Nanjing, China
- Wentao Zhang 0005 — Sun Yat-sen University, Guangzhou, China
- Wentao Zhang 0006 — Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Wentao Zhang 0007
— Nanyang Technological University, College of Computing and Data Science, Singapore
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Rui Zhao, Zhiqiang Zuo, Ying Tan, Yijing Wang, Wentao Zhang:
Resilient control of networked switched systems subject to deception attack and DoS attack. Autom. 169: 111833 (2024) - [j19]Jinming Gao, Yijing Wang, Zhiqiang Zuo, Wentao Zhang:
Zero-Dynamics Attacks for Multi-Agent Systems Without Velocity Measurements. J. Syst. Sci. Complex. 37(5): 1809-1831 (2024) - [j18]Wentao Zhang
, Yang Shi
, Baoyong Zhang
, Deming Yuan
, Shengyuan Xu
:
Dynamic Regret of Distributed Online Saddle Point Problem. IEEE Trans. Autom. Control. 69(4): 2522-2529 (2024) - [j17]Rui Zhao
, Zhiqiang Zuo
, Yang Shi
, Yijing Wang
, Wentao Zhang
:
DoS and Stealthy Deception Attacks for Switched Systems: A Cooperative Approach. IEEE Trans. Autom. Control. 69(7): 4396-4410 (2024) - [j16]Ran Tian
, Zhiqiang Zuo
, Qiaoni Han
, Yijing Wang
, Wentao Zhang
:
Differential Privacy for Second-Order Bipartite Consensus Over Signed Digraph. IEEE Trans. Syst. Man Cybern. Syst. 54(6): 3652-3664 (2024) - [i2]Rui Zhao, Zhiqiang Zuo, Ying Tan, Yijing Wang, Wentao Zhang:
Resilient control of networked switched systems subject to deception attack and DoS attack. CoRR abs/2405.06165 (2024) - 2023
- [j15]Rui Zhao
, Zhiqiang Zuo, Yijing Wang, Wentao Zhang:
Active control strategy for switched systems against asynchronous DoS attacks. Autom. 148: 110765 (2023) - [j14]Rui Zhao
, Zhiqiang Zuo
, Yijing Wang
, Wentao Zhang
:
False Data Injection Attack for Switched Systems. IEEE Control. Syst. Lett. 7: 1754-1759 (2023) - [j13]Wentao Zhang
, Yang Shi
, Baoyong Zhang
, Kaihong Lu
, Deming Yuan
:
Quantized Distributed Online Projection-Free Convex Optimization. IEEE Control. Syst. Lett. 7: 1837-1842 (2023) - [j12]Zhiqiang Zuo, Jiewen Ji, Zhicheng Zhang
, Yijing Wang, Wentao Zhang:
Consensus of double-integrator multi-agent systems with asymmetric input saturation. Syst. Control. Lett. 172: 105440 (2023) - [j11]Wentao Zhang
, Zhiqiang Zuo
, Yijing Wang
, Guoqiang Hu
:
How Much Noise Suffices for Privacy of Multiagent Systems? IEEE Trans. Autom. Control. 68(10): 6051-6066 (2023) - [j10]Zhiqiang Zuo
, Jiewen Ji
, Zhicheng Zhang
, Yijing Wang
, Wentao Zhang:
Consensus of Multi-Agent Systems With Asymmetric Input Saturation Over Directed Graph. IEEE Trans. Circuits Syst. II Express Briefs 70(4): 1515-1519 (2023) - 2022
- [j9]Yingxue Du, Yijing Wang, Zhiqiang Zuo, Wentao Zhang:
Event-triggered bipartite consensus for multi-agent systems subject to multiplicative and additive noises. Appl. Math. Comput. 429: 127235 (2022) - [j8]Rui Zhao
, Zhiqiang Zuo
, Yijing Wang
, Wentao Zhang
:
Active Control Strategy for Disturbed Switched Systems Under Asynchronous DoS Attacks. IEEE Control. Syst. Lett. 6: 2701-2706 (2022) - [j7]Zhiqiang Zuo, Ran Tian, Qiaoni Han, Yijing Wang, Wentao Zhang:
Differential privacy for bipartite consensus over signed digraph. Neurocomputing 468: 11-21 (2022) - [j6]Wentao Zhang
, Zhiqiang Zuo
, Yijing Wang
:
Active Synchronization for Double-Integrator Network Systems Without Velocity Information. IEEE Trans. Circuits Syst. I Regul. Pap. 69(6): 2589-2600 (2022) - [j5]Wentao Zhang
, Zhiqiang Zuo
, Yijing Wang
:
Networked Multiagent Systems: Antagonistic Interaction, Constraint, and its Application. IEEE Trans. Neural Networks Learn. Syst. 33(8): 3690-3699 (2022) - [j4]Zhiqiang Zuo
, Xiong Cao
, Yijing Wang
, Wentao Zhang
:
Resilient Consensus of Multiagent Systems Against Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(4): 2664-2675 (2022) - 2021
- [j3]Yingxue Du, Yijing Wang, Zhiqiang Zuo, Wentao Zhang:
Stochastic bipartite consensus with measurement noises and antagonistic information. J. Frankl. Inst. 358(15): 7761-7785 (2021) - [i1]Wentao Zhang, Zhiqiang Zuo, Yijing Wang:
A Two-Functional-Network Framework of Opinion Dynamics. CoRR abs/2101.11415 (2021) - 2020
- [j2]Wentao Zhang, Zhiqiang Zuo
, Yijing Wang:
Coordination for second-order multi-agent systems with velocity and communication constraints. Neurocomputing 375: 51-61 (2020) - [j1]Wentao Zhang
, Zhiqiang Zuo
, Yijing Wang, Zhicheng Zhang:
Double-Integrator Dynamics for Multiagent Systems With Antagonistic Reciprocity. IEEE Trans. Cybern. 50(9): 4110-4120 (2020)
2010 – 2019
- 2017
- [c1]Wentao Zhang, Zhiqiang Zuo, Yijing Wang:
Cooperative control in the presence of antagonistic reciprocity. ASCC 2017: 745-749
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint