default search action
Hongran Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Rong Fei, Jian Zhang, Liling Bo, Heng Zhang, Hongran Li, Ming Li:
Joint multi-subspace feature learning with singular value decomposition for robust single-sample face recognition. Comput. Electr. Eng. 114: 109085 (2024) - [j19]Hongran Li, Hui Zhao, Chao Wei, Min Cao, Jian Zhang, Heng Zhang, Dongqing Yuan:
Assessing water quality environmental grades using hyperspectral images and a deep learning model: A case study in Jiangsu, China. Ecol. Informatics 84: 102854 (2024) - [j18]Yan Ren, Heng Zhang, Xianghui Cao, Chaoqun Yang, Jian Zhang, Hongran Li:
Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control. IEEE Internet Things J. 11(4): 5816-5825 (2024) - [j17]Qiyan Zang, Jian Zhang, Liling Bo, Yuchen Xiao, Guangwei Gao, Heng Zhang, Hongran Li, Zhaoman Zhong, Yan Ren:
A fully automatic adjacent key-points localization framework for minimal repeated pattern detection in printed fabric images. Knowl. Based Syst. 300: 112157 (2024) - [j16]Yan Ren, Heng Zhang, Wen Yang, Ming Li, Jian Zhang, Hongran Li:
Transferable Adversarial Attack Against Deep Reinforcement Learning-Based Smart Grid Dynamic Pricing System. IEEE Trans. Ind. Informatics 20(6): 9015-9025 (2024) - [j15]Yan Ren, Heng Zhang, Linkang Du, Zhikun Zhang, Jian Zhang, Hongran Li:
Stealthy Black-Box Attack With Dynamic Threshold Against MARL-Based Traffic Signal Control System. IEEE Trans. Ind. Informatics 20(10): 12021-12031 (2024) - [j14]Zhe Wang, Heng Zhang, Xianghui Cao, Endong Liu, Hongran Li, Jian Zhang:
Modeling and Detection Scheme for Zero-Dynamics Attack on Wind Power System. IEEE Trans. Smart Grid 15(1): 934-943 (2024) - 2023
- [j13]Hongran Li, Tieli Lv, Yuchao Shui, Jian Zhang, Heng Zhang, Hui Zhao, Saibao Ma:
An Improved grey wolf optimizer with weighting functions and its application to Unmanned Aerial Vehicles path planning. Comput. Electr. Eng. 111(Part A): 108893 (2023) - [j12]Jianwei Sun, Heng Zhang, Xin Wang, Ming Yang, Jian Zhang, Hongran Li, Chenglong Gong:
Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems. IEEE Netw. Lett. 5(2): 81-85 (2023) - [j11]Hongran Li, Yu Xia, Jiacheng Ke, Tieli Lv, Heng Zhang, Zhaoman Zhong, Jian Zhang:
False data injection attacks detection based on Laguerre function in nonlinear Cyber-Physical systems. Internet Technol. Lett. 6(3) (2023) - [j10]Heng Zhang, Jun Gu, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. Peer Peer Netw. Appl. 16(1): 466-474 (2023) - [c12]Yinchu Wang, Yan Ren, Heng Zhang, Hongran Li, Jian Zhang:
An Intrusion Detection Method Based on Hash Function for Industrial Cloud Data. ICPADS 2023: 2460-2466 - [c11]Heng Zhang, Lei Wu, Zhemin Sun, Zhikai Zhang, Ming Li, Hongran Li, Jian Zhang:
Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming Attacks. MSN 2023: 825-830 - 2022
- [j9]Shuai Xu, Jian Zhang, Xin Qin, Yuchen Xiao, Jianjun Qian, Liling Bo, Heng Zhang, Hongran Li, Zhaoman Zhong:
Deep retinex decomposition network for underwater image enhancement. Comput. Electr. Eng. 100: 107822 (2022) - [j8]Zeyu Zhang, Hongran Li, Heng Zhang, Jian Zhang, Zhaoman Zhong, Weiwei Xu:
Model-free predictive control of nonlinear systems under False Data Injection attacks. Comput. Electr. Eng. 100: 107977 (2022) - [j7]Jian Zhang, Xin Qin, Yuchen Xiao, Rong Fei, Qiyan Zang, Shuai Xu, Liling Bo, Hongran Li, Heng Zhang, Zhaoman Zhong:
Subspace cross representation measure for robust face recognition with few samples. Comput. Electr. Eng. 102: 108162 (2022) - [j6]Yu Zhu, Heng Zhang, Hongran Li, Jian Zhang, Dandan Zhang:
Optimal Jamming Strategy Against Two-State Switched System. IEEE Commun. Lett. 26(3): 706-710 (2022) - [j5]Jian Zhang, Weihua Liu, Liling Bo, Heng Zhang, Hongran Li, Shuai Xu:
Joint Reflectance Field Estimation and Sparse Representation for Face Image Illumination Preprocessing and Recognition. Neural Process. Lett. 54(5): 3551-3564 (2022) - [c10]Yu Zhu, Heng Zhang, Ruijun Liu, Jian Zhang, Hongran Li:
Optimal Jamming Strategy Against Periodically Switched Linear Discrete-Time System. ASCC 2022: 2001-2006 - [c9]Panxin Bai, Heng Zhang, Jian Zhang, Hongran Li:
USV Control With Adaptive Compensation Under False Data Injection Attacks. INFOCOM Workshops 2022: 1-2 - 2021
- [j4]Shuai Xu, Jian Zhang, Liling Bo, Hongran Li, Heng Zhang, Zhaoman Zhong, Dongqing Yuan:
Singular vector sparse reconstruction for image compression. Comput. Electr. Eng. 91: 107069 (2021) - [j3]Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Hongran Li, Jian Zhang:
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. Inf. Sci. 546: 871-882 (2021) - [c8]Jun Gu, Heng Zhang, Zhikun Zhang, Jian Zhang, Hongran Li:
Iris Protection with Verisimilar Feature Structure. ICPADS 2021: 396-401 - [c7]Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan:
Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract. IoTDI 2021: 257-258 - [c6]Jun Gu, Heng Zhang, Yiming Lu, Hongran Li, Jian Zhang:
Hiding Iris Biological Features with Encryption. SPAC 2021: 501-505 - [c5]Hao Yan, Heng Zhang, Jianwei Sun, Tao Tian, Hongbin Wang, Dandan Zhang, Weiwei Xu, Jian Zhang, Hongran Li, Dongqing Yuan:
Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory. WASA (3) 2021: 68-76 - 2020
- [j2]Jian Zhang, Heng Zhang, Bo Li, Hongran Li, Shuai Xu, Dongqing Yuan:
Subspace transform induced robust similarity measure for facial images. Frontiers Inf. Technol. Electron. Eng. 21(9): 1334-1345 (2020) - [j1]Hongran Li, Weiwei Xu, Heng Zhang, Jian Zhang, Yi Liu:
Polynomial regressors based data-driven control for autonomous underwater vehicles. Peer-to-Peer Netw. Appl. 13(5): 1767-1775 (2020) - [c4]Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Dongqing Yuan, Jian Zhang, Hongran Li, Jiacheng Ke, Haisong Xu:
Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications. IoTDI 2020: 260-261
2010 – 2019
- 2019
- [c3]Weiwei Xu, Yuchen Xiao, Hongran Li, Jian Zhang, Heng Zhang:
Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive Control. HPSR 2019: 1-6 - [c2]Wenming Jiao, Heng Zhang, Qiyan Zang, Jian Zhang, Hongran Li:
Iris biometric feature hidden based on chaotic encryption. RACS 2019: 295-299 - [c1]Shuaiwei Zhang, Jiayue Ju, Suyi Jiao, Changwon Lim, Kinga Molnar, Jian Zhang, Hongran Li, Jing Sun, Heng Zhang:
Optimizing Time-series Prediction on China's Green Trade Economy. SSCI 2019: 1579-1584
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint