default search action
Jun Shang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Jing Zhou, Jun Shang, Tongwen Chen:
On vulnerability of Kalman filtering with holistic estimation performance loss. Autom. 171: 111895 (2025) - 2024
- [j45]Jun Shang, Jing Zhou, Tongwen Chen:
Nonlinear stealthy attacks on remote state estimation. Autom. 167: 111747 (2024) - [j44]Jun Shang, Haishan Ye, Xiangyu Chang:
Accelerated Double-Sketching Subspace Newton. Eur. J. Oper. Res. 319(2): 484-493 (2024) - [j43]Huiying Liu, Xiangzheng Fu, Haiting Chen, Jun Shang, Haoyu Zhou, Wang Zhe, Xiaojun Yao:
Developing explainable models for lncRNA-Targeted drug discovery using graph autoencoders. Future Gener. Comput. Syst. 160: 29-39 (2024) - [j42]Jing Zhou, Jun Shang, Tongwen Chen:
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review. IEEE CAA J. Autom. Sinica 11(4): 851-865 (2024) - [j41]Zeyuan Yan, Li Li, Jun Shang, Hui Zhao:
Periodic update rule with Q-learning promotes evolution of cooperation in game transition with punishment mechanism. Neurocomputing 609: 128510 (2024) - [j40]Haniyeh Seyed Alinezhad, Jun Shang, Tongwen Chen, Sirish L. Shah:
A Probabilistic Framework for Online Analysis of Alarm Floods Using Convolutional Neural Networks. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - [c7]Jing Zhou, Jun Shang, Tongwen Chen:
Performance Assessment for Stochastic Anomaly Detectors in Industrial Alarm Systems. ICCA 2024: 406-411 - 2023
- [j39]Jing Zhou, Jun Shang, Tongwen Chen:
Optimal deception attacks on remote state estimators equipped with interval anomaly detectors. Autom. 148: 110723 (2023) - [j38]Haoyuan Xu, Yake Yang, Jun Shang, Jun Fu, Yuzhe Li:
Integrity attacks on remote estimation with spatial-temporal information sources. Autom. 155: 111172 (2023) - [j37]Jun Shang, Tongwen Chen:
Unilateral Orthogonal Nonnegative Matrix Factorization. SIAM J. Control. Optim. 61(4): 2497-2519 (2023) - [j36]Jing Zhou, Jun Shang, Tongwen Chen:
Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach. IEEE Trans. Autom. Control. 68(7): 3947-3962 (2023) - [j35]Jun Shang, Tongwen Chen:
Linear Encryption Against Eavesdropping on Remote State Estimation. IEEE Trans. Autom. Control. 68(7): 4413-4419 (2023) - [j34]Jing Zhou, Jun Shang, Tongwen Chen:
On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation. IEEE Trans. Control. Netw. Syst. 10(4): 2085-2096 (2023) - [j33]Haniyeh Seyed Alinezhad, Jun Shang, Tongwen Chen:
Open Set Online Classification of Industrial Alarm Floods With Alarm Ranking. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - [c6]Zhiyu Deng, Wenxin Yu, Lu Che, Shiyu Chen, Zhiqiang Zhang, Jun Shang, Peng Chen, Jun Gong:
Text to Image Generation with Conformer-GAN. ICONIP (5) 2023: 3-14 - [c5]Jun Shang, Wenxin Yu, Lu Che, Zhiqiang Zhang, Hongjie Cai, Zhiyu Deng, Jun Gong, Peng Chen:
Text-to-Image Synthesis with Threshold-Equipped Matching-Aware GAN. ICONIP (12) 2023: 161-172 - 2022
- [j32]Jun Shang, Jing Zhou, Tongwen Chen:
Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation. Autom. 136: 110015 (2022) - [j31]Hao Yu, Jun Shang, Tongwen Chen:
Stochastic event-based LQG control: An analysis on strict consistency. Autom. 138: 110157 (2022) - [j30]Donny Cheng, Jun Shang, Tongwen Chen:
Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems. IEEE Control. Syst. Lett. 6: 1640-1645 (2022) - [j29]Jun Shang, Hao Yu, Tongwen Chen:
Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation. IEEE Trans. Autom. Control. 67(4): 2052-2059 (2022) - [j28]Jun Shang, Hao Yu, Tongwen Chen:
Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback-Leibler Divergence. IEEE Trans. Autom. Control. 67(11): 6082-6089 (2022) - [j27]Jun Shang, Donny Cheng, Jing Zhou, Tongwen Chen:
Asymmetric Vulnerability of Measurement and Control Channels in Closed-Loop Systems. IEEE Trans. Control. Netw. Syst. 9(4): 1804-1815 (2022) - [j26]Hanwen Zhang, Jun Shang, Jianxun Zhang, Chunjie Yang:
Nonstationary Process Monitoring for Blast Furnaces Based on Consistent Trend Feature Analysis. IEEE Trans. Control. Syst. Technol. 30(3): 1257-1267 (2022) - [j25]Haniyeh Seyed Alinezhad, Jun Shang, Tongwen Chen:
Early Classification of Industrial Alarm Floods Based on Semisupervised Learning. IEEE Trans. Ind. Informatics 18(3): 1845-1853 (2022) - 2021
- [j24]Hao Yu, Jun Shang, Tongwen Chen:
On stochastic and deterministic event-based state estimation. Autom. 123: 109314 (2021) - [j23]Jun Shang, Tongwen Chen:
Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data. Autom. 128: 109555 (2021) - [j22]Hao Yu, Jun Shang, Tongwen Chen:
Corrigendum to "On stochastic and deterministic event-based state estimation" [Automatica 123 (2021) 109314]. Autom. 131: 109757 (2021) - [j21]Hanwen Zhang, Maoyin Chen, Jun Shang, Chunjie Yang, Youxian Sun:
Stochastic process-based degradation modeling and RUL prediction: from Brownian motion to fractional Brownian motion. Sci. China Inf. Sci. 64(7) (2021) - [j20]Jun Shang, Maoyin Chen, Tongwen Chen:
Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation. IEEE Trans. Autom. Control. 66(8): 3592-3607 (2021) - [j19]Jing Zhou, Jun Shang, Yuzhe Li, Tongwen Chen:
Optimal DoS Attack Against LQR Control Channels. IEEE Trans. Circuits Syst. II Express Briefs 68(4): 1348-1352 (2021) - [j18]Yuan Zhang, Yuanqing Xia, Jinhui Zhang, Jun Shang:
Generic Detectability and Isolability of Topology Failures in Networked Linear Systems. IEEE Trans. Control. Netw. Syst. 8(1): 500-512 (2021) - [j17]Decheng Liu, Jun Shang, Maoyin Chen:
Principal Component Analysis-Based Ensemble Detector for Incipient Faults in Dynamic Processes. IEEE Trans. Ind. Informatics 17(8): 5391-5401 (2021) - [c4]Jing Zhou, Jun Shang, Tongwen Chen:
Optimal Linear FDI Attacks with Side Information: A Comparative Study. ICPS 2021: 138-143 - [c3]Jing Zhou, Jun Shang, Tongwen Chen:
Worst-Case Stealthy False-Data Injection Attacks on Remote State Estimation. IECON 2021: 1-6 - 2020
- [j16]Hanwen Zhang, Jun Shang, Chunjie Yang, Youxian Sun:
Conditional random field for monitoring multimode processes with stochastic perturbations. J. Frankl. Inst. 357(12): 8229-8251 (2020) - [j15]Jun Shang, Tongwen Chen:
Early Classification of Alarm Floods via Exponentially Attenuated Component Analysis. IEEE Trans. Ind. Electron. 67(10): 8702-8712 (2020) - [c2]Liang Hao, Beibei Wang, Jun Shang:
Research on the Path of Data Literacy Cultivation for College Students. MMBD 2020: 69-73 - [i1]Yuan Zhang, Yuanqing Xia, Jinhui Zhang, Jun Shang:
Generic Detectability and Isolability of Topology Failures in Networked Linear Systems. CoRR abs/2005.04687 (2020)
2010 – 2019
- 2019
- [j14]Runze Wan, Naixue Xiong, Qinghui Hu, Haijun Wang, Jun Shang:
Similarity-aware data aggregation using fuzzy c-means approach for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2019: 59 (2019) - [j13]Hanwen Zhang, Donghua Zhou, Maoyin Chen, Jun Shang:
FBM-Based Remaining Useful Life Prediction for Degradation Processes With Long-Range Dependence and Multiple Modes. IEEE Trans. Reliab. 68(3): 1021-1033 (2019) - 2018
- [j12]Jun Shang, Maoyin Chen, Hanwen Zhang:
Fault detection based on augmented kernel Mahalanobis distance for nonlinear dynamic processes. Comput. Chem. Eng. 109: 311-321 (2018) - [j11]Jun Shang, Ben Hu, Junmei Wang, Feng Zhu, Yu Kang, Dan Li, Huiyong Sun, De-Xin Kong, Tingjun Hou:
Cheminformatic Insight into the Differences between Terrestrial and Marine Originated Natural Products. J. Chem. Inf. Model. 58(6): 1182-1193 (2018) - [j10]Maoyin Chen, Jun Shang:
Recursive Spectral Meta-Learner for Online Combining Different Fault Classifiers. IEEE Trans. Autom. Control. 63(2): 586-593 (2018) - [j9]Donghua Zhou, Hongquan Ji, Xiao He, Jun Shang:
Fault Detection and Isolation of the Brake Cylinder System for Electric Multiple Units. IEEE Trans. Control. Syst. Technol. 26(5): 1744-1757 (2018) - [j8]Jun Shang, Maoyin Chen:
Recursive Dynamic Transformed Component Statistical Analysis for Fault Detection in Dynamic Processes. IEEE Trans. Ind. Electron. 65(1): 578-588 (2018) - 2017
- [j7]Jun Shang, Maoyin Chen, Hongquan Ji, Donghua Zhou:
Recursive transformed component statistical analysis for incipient fault detection. Autom. 80: 313-327 (2017) - [j6]Jun Shang, Huiyong Sun, Hui Liu, Fu Chen, Sheng Tian, Peichen Pan, Dan Li, De-Xin Kong, Tingjun Hou:
Comparative analyses of structural features and scaffold diversity for purchasable compound libraries. J. Cheminformatics 9(1): 25:1-25:16 (2017) - [j5]Jun Shang, Chuanbo Chen, Xiaobing Pei, Hu Liang, He Tang, Mudar Sarem:
A novel local derivative quantized binary pattern for object recognition. Vis. Comput. 33(2): 221-233 (2017) - [c1]Jun Shang, Maoyin Chen, Donghua Zhou:
Multimode process monitoring based on conditionally independent Bayesian learning. CDC 2017: 2705-2710 - 2016
- [j4]Jun Shang, Chuanbo Chen, Hu Liang, He Tang:
Object recognition using rotation invariant local binary pattern of significant bit planes. IET Image Process. 10(9): 662-670 (2016) - 2015
- [j3]Jun Shang, Chuanbo Chen, Xiaobing Pei, Hu Liang, He Tang, Mudar Sarem:
Robust image region descriptor using local derivative ordinal binary pattern. J. Electronic Imaging 24(3): 033009 (2015) - 2014
- [j2]Jun Shang, Chuanbo Chen, Hu Liang, He Tang, Mudar Sarem:
A Novel Fragments-based Similarity Measurement Algorithm for Visual Tracking. J. Comput. 9(9): 2167-2172 (2014) - [j1]Chuanbo Chen, He Tang, Zehua Lyu, Hu Liang, Jun Shang, Mudar Sarem:
Saliency modeling via outlier detection. J. Electronic Imaging 23(5): 053023 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint