default search action
Wei Huo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Wei Huo, Kam Fai Elvis Tsang, Yamin Yan, Karl Henrik Johansson, Ling Shi:
Distributed Nash equilibrium seeking with stochastic event-triggered mechanism. Autom. 162: 111486 (2024) - [j32]Wei Huo, Xiaomeng Chen, Kemi Ding, Subhrakanti Dey, Ling Shi:
Compression-Based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games. IEEE Control. Syst. Lett. 8: 886-891 (2024) - [j31]Xiaomeng Chen, Wei Huo, Kemi Ding, Subhrakanti Dey, Ling Shi:
Communication-Efficient and Differentially-Private Distributed Nash Equilibrium Seeking With Linear Convergence. IEEE Control. Syst. Lett. 8: 1787-1792 (2024) - [j30]Wei Huo, Ke Wang, Jun Tang, Nian Wang, Dong Liang:
GaitSCM: Causal representation learning for gait recognition. Comput. Vis. Image Underst. 243: 103995 (2024) - [j29]Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian:
SYNTONY: Potential-aware fuzzing with particle swarm optimization. J. Syst. Softw. 208: 111880 (2024) - [j28]Yao Zhang, Wei Huo, Jun Tang:
Multi-label feature selection via latent representation learning and dynamic graph constraints. Pattern Recognit. 151: 110411 (2024) - [j27]Wei Huo, Lingying Huang, Subhrakanti Dey, Ling Shi:
Neural-Network-Based Distributed Generalized Nash Equilibrium Seeking for Uncertain Nonlinear Multiagent Systems. IEEE Trans. Control. Netw. Syst. 11(3): 1323-1334 (2024) - [c62]Nanyu Zhong, Yueqi Chen, Yanyan Zou, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao, Menghao Li, Binghong Liu, Wei Huo:
TGRop: Top Gun of Return-Oriented Programming Automation. ESORICS (3) 2024: 130-152 - [c61]Yiming Liu, Cen Zhang, Feng Li, Yeting Li, Jianhua Zhou, Jian Wang, Lanlan Zhan, Yang Liu, Wei Huo:
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware. ICSE 2024: 173:1-173:12 - [c60]Chendong Yu, Yang Xiao, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang, Jingyi Shi, Defang Bo, Wei Huo:
File Hijacking Vulnerability: The Elephant in the Room. NDSS 2024 - [c59]Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi, Wei Huo:
Fuzzing for Stateful Protocol Implementations: Are We There Yet? TASE 2024: 186-204 - [c58]Jiaxu Zhao, Yuekang Li, Yanyan Zou, Zhaohui Liang, Yang Xiao, Yeting Li, Bingwei Peng, Nanyu Zhong, Xinyi Wang, Wei Wang, Wei Huo:
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems. USENIX Security Symposium 2024 - [i11]Wei Huo, Xiaomeng Chen, Lingying Huang, Karl Henrik Johansson, Ling Shi:
Differentially Private Dual Gradient Tracking for Distributed Resource Allocation. CoRR abs/2403.18275 (2024) - [i10]Wei Huo, Xiaomeng Chen, Kemi Ding, Subhrakanti Dey, Ling Shi:
Compression-based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games. CoRR abs/2405.03106 (2024) - [i9]Xiaomeng Chen, Wei Huo, Kemi Ding, Subhrakanti Dey, Ling Shi:
Communication-efficient and Differentially-private Distributed Nash Equilibrium Seeking with Linear Convergence. CoRR abs/2405.04757 (2024) - [i8]Wei Huo, Changxin Liu, Kemi Ding, Karl Henrik Johansson, Ling Shi:
Federated Cubic Regularized Newton Learning with Sparsification-amplified Differential Privacy. CoRR abs/2408.04315 (2024) - [i7]Changxin Liu, Nicola Bastianello, Wei Huo, Yang Shi, Karl Henrik Johansson:
A survey on secure decentralized optimization and learning. CoRR abs/2408.08628 (2024) - 2023
- [j26]Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo:
PosFuzz: augmenting greybox fuzzing with effective position distribution. Cybersecur. 6(1): 11 (2023) - [j25]Hao Feng, Nian Wang, Fa Zhao, Wei Huo:
Deep attention sampling hashing for efficient image retrieval. Neurocomputing 559: 126764 (2023) - [c57]Rui Ma, Xvhong Zhou, Xiajing Wang, Zheng Zhang, Jinman Jiang, Wei Huo:
pAFL: Adaptive Energy Allocation with Upper Confidence Bound. ICCNS 2023: 62-68 - [c56]Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. ISSTA 2023: 690-702 - [c55]He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo:
Splendor: Static Detection of Stored XSS in Modern Web Applications. ISSTA 2023: 1043-1054 - [c54]Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo:
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. RAID 2023: 412-425 - [c53]Xiaowei Wang, Zimu Yuan, Yang Xiao, Liyan Wang, Yican Yao, Haiming Chen, Wei Huo:
Decompilation Based Deep Binary-Source Function Matching. SciSec 2023: 244-260 - [c52]Jiawei Yin, Menghao Li, Yuekang Li, Yong Yu, Boru Lin, Yanyan Zou, Yang Liu, Wei Huo, Jingling Xue:
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing. SP 2023: 2155-2169 - [c51]Xinyi Wang, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Yang Liu, Wei Huo:
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation. SP 2023: 2427-2443 - [i6]Yunfeng Li, Bo Wang, Ye Li, Wei Huo, Zhuoyan Liu:
Motion-based Post-Processing: Using Kalman Filter to Exclude Similar Targets in Underwater Object Tracking. CoRR abs/2301.01482 (2023) - [i5]Wei Huo, Kam Fai Elvis Tsang, Yamin Yan, Karl Henrik Johansson, Ling Shi:
Distributed Nash Equilibrium Seeking with Stochastic Event-Triggered Mechanism. CoRR abs/2304.10338 (2023) - [i4]Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. CoRR abs/2305.17914 (2023) - [i3]Xiaomeng Chen, Wei Huo, Yuchi Wu, Subhrakanti Dey, Ling Shi:
An Efficient Distributed Nash Equilibrium Seeking with Compressed and Event-triggered Communication. CoRR abs/2311.13994 (2023) - 2022
- [j24]Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng, Wei Huo:
CAMFuzz: Explainable Fuzzing with Local Interpretation. Cybersecur. 5(1): 17 (2022) - [j23]Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo:
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. Cybersecur. 5(1): 21 (2022) - [j22]Guanjun Chen, Wei Huo:
Angular velocity stabilization of underactuated rigid satellites based on energy shaping. J. Frankl. Inst. 359(4): 1558-1581 (2022) - [c50]Lingying Huang, Xiaomeng Chen, Wei Huo, Jiazheng Wang, Fan Zhang, Bo Bai, Ling Shi:
Improving Primal Heuristics for Mixed Integer Programming Problems based on Problem Reduction: A Learning-based Approach. ICARCV 2022: 181-186 - [c49]Qing Sun, Lili Xu, Yang Xiao, Feng Li, He Su, Yiming Liu, Hongyun Huang, Wei Huo:
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis. ICSME 2022: 329-339 - [c48]He Su, Lili Xu, Huina Chao, Feng Li, Zimu Yuan, Jianhua Zhou, Wei Huo:
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs. ISSRE 2022: 355-365 - [c47]Jiawei Yin, Menghao Li, Wei Wu, Dandan Sun, Jianhua Zhou, Wei Huo, Jingling Xue:
Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis. SP 2022: 1623-1637 - [c46]Jingting Chen, Feng Li, Mingjie Xu, Jianhua Zhou, Wei Huo:
RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations. SANER 2022: 641-651 - [i2]Lingying Huang, Xiaomeng Chen, Wei Huo, Jiazheng Wang, Fan Zhang, Bo Bai, Ling Shi:
Improving Primal Heuristics for Mixed Integer Programming Problems based on Problem Reduction: A Learning-based Approach. CoRR abs/2209.13217 (2022) - 2021
- [j21]Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo:
B2SMatcher: fine-Grained version identification of open-Source software in binary files. Cybersecur. 4(1): 21 (2021) - [j20]Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang, Baoxu Liu:
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. Cybersecur. 4(1): 24 (2021) - [j19]Ning Cao, Wei Huo, Taihe Lin, Gangshan Wu:
Application of convolutional neural networks and image processing algorithms based on traffic video in vehicle taillight detection. Int. J. Sens. Networks 35(3): 181-192 (2021) - [c45]Xiaoyu He, Xiaofei Xie, Yuekang Li, Jianwen Sun, Feng Li, Wei Zou, Yang Liu, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo:
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines. CCS 2021: 2229-2242 - [c44]Yang Xiao, Zhengzi Xu, Weiwei Zhang, Chendong Yu, Longquan Liu, Wei Zou, Zimu Yuan, Yang Liu, Aihua Piao, Wei Huo:
VIVA: Binary Level Vulnerability Identification via Partial Signature. SANER 2021: 213-224 - [i1]Lingying Huang, Xiaomeng Chen, Wei Huo, Jiazheng Wang, Fan Zhang, Bo Bai, Ling Shi:
Branch and Bound in Mixed Integer Linear Programming Problems: A Survey of Techniques and Trends. CoRR abs/2111.06257 (2021) - 2020
- [j18]Lili Xu, Mingjie Xu, Feng Li, Wei Huo:
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. Cybersecur. 3(1): 1-19 (2020) - [j17]Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. IEEE Trans. Software Eng. 46(9): 981-1003 (2020) - [c43]Qian Ni, Meixia Ji, Ning Cao, Shouxu Du, Wei Huo:
Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT. ICAIS (1) 2020: 719-728 - [c42]Bingchang Liu, Guozhu Meng, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang:
A large-scale empirical study on vulnerability distribution within projects and the lessons learned. ICSE 2020: 1547-1559 - [c41]Xiaoyu He, Erick Bauman, Feng Li, Lei Yu, Linyu Li, Bingchang Liu, Aihua Piao, Kevin W. Hamlen, Wei Huo, Wei Zou:
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing. LCTES 2020: 74-84 - [c40]Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. USENIX Security Symposium 2020: 1165-1182
2010 – 2019
- 2019
- [c39]Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang, Baoxu Liu:
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. ACSAC 2019: 544-556 - [c38]Guanjun Chen, Wei Huo:
Stabilizing a VTOL Aircraft Based on Controlled Lagrangian Method. CDC 2019: 5874-5879 - [c37]Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, Wei Huo:
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches. DSN 2019: 605-616 - [c36]Dong Li, Wei Huo:
Path Following Control for a Stratospheric Airship Based on Disturbance Observer. ICCA 2019: 160-167 - [c35]Muyue Feng, Zimu Yuan, Feng Li, Gu Ban, Shiyang Wang, Qian Tang, He Su, Chendong Yu, Jiahuan Xu, Aihua Piao, Jingling Xue, Wei Huo:
B2SFinder: Detecting Open-Source Software Reuse in COTS Software. ASE 2019: 1038-1049 - [c34]Gaojian Hao, Feng Li, Wei Huo, Qing Sun, Wei Wang, Xinhua Li, Wei Zou:
Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools. TASE 2019: 65-72 - [c33]Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo:
Open-Source License Violations of Binary Software at Large Scale. SANER 2019: 564-568 - 2018
- [j16]Lujie Zhong, Pen-Chung Yew, Wei Huo, Feng Li, Xiaobing Feng, Zhaoqing Zhang:
RARE: An Efficient Static Fault Detection Framework for Definition-Use Faults in Large Programs. IEEE Access 6: 10432-10444 (2018) - [j15]Wenyu Qu, Wei Huo, Lingyu Wang:
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. EAI Endorsed Trans. Security Safety 5(16): e5 (2018) - [j14]Liang Sun, Wei Huo, Zongxia Jiao:
Disturbance-Observer-Based Robust Relative Pose Control for Spacecraft Rendezvous and Proximity Operations Under Input Saturation. IEEE Trans. Aerosp. Electron. Syst. 54(4): 1605-1617 (2018) - [c32]Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang:
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. Inscrypt 2018: 404-423 - [c31]Zhenzhou Wang, Wei Huo, Pingping Yu, Lin Qi, Ning Cao:
Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle. CyberC 2018 - [c30]Bingchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, Wei Zou:
αDiff: cross-version binary code similarity detection with DNN. ASE 2018: 667-678 - 2017
- [j13]Yao Zou, Wei Huo:
Nonlinear Robust Controller for Miniature Helicopters Without Singularity. IEEE Trans. Aerosp. Electron. Syst. 53(3): 1402-1411 (2017) - [j12]Liang Sun, Wei Huo, Zongxia Jiao:
Robust Nonlinear Adaptive Relative Pose Control for Cooperative Spacecraft During Rendezvous and Proximity Operations. IEEE Trans. Control. Syst. Technol. 25(5): 1840-1847 (2017) - [j11]Liang Sun, Wei Huo, Zongxia Jiao:
Adaptive Backstepping Control of Spacecraft Rendezvous and Proximity Operations With Input Saturation and Full-State Constraint. IEEE Trans. Ind. Electron. 64(1): 480-492 (2017) - [j10]Feng Li, Zhiyuan Li, Wei Huo, Xiaobing Feng:
Locating Software Faults Based on Minimum Debugging Frontier Set. IEEE Trans. Software Eng. 43(8): 760-776 (2017) - [c29]Kewei Xia, Wei Huo:
Adaptive fault-tolerant control for cooperative spacecraft rendezvous and docking. ACC 2017: 3747-3752 - [c28]Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. ICSE 2017: 335-346 - 2015
- [j9]Liang Sun, Wei Huo:
6-DOF integrated adaptive backstepping control for spacecraft proximity operations. IEEE Trans. Aerosp. Electron. Syst. 51(3): 2433-2443 (2015) - [c27]Yao Zou, Wei Huo:
Adaptive tracking control for a model helicopter with disturbances. ACC 2015: 3824-3829 - 2014
- [j8]Bing Zhu, Wei Huo:
3-D Path-Following Control for a Model-Scaled Autonomous Helicopter. IEEE Trans. Control. Syst. Technol. 22(5): 1927-1934 (2014) - 2013
- [c26]Liang Sun, Wei Huo:
Robust adaptive control for spacecraft cooperative rendezvous and docking. CDC 2013: 5516-5521 - [c25]Feng Li, Wei Huo, Congming Chen, Lujie Zhong, Xiaobing Feng, Zhiyuan Li:
Effective fault localization based on minimum debugging frontier set. CGO 2013: 5:1-5:10 - 2012
- [c24]Congming Chen, Wei Huo, Xiaobing Feng:
Making it practical and effective: fast and precise may-happen-in-parallel analysis. PACT 2012: 469-470 - [c23]Xiaolin Zhang, Guang-Yue Cui, Lixin Liu, Wei Huo:
An Extended Continuous Uncertain XML Data Model Research. WISA 2012: 3-8 - [c22]Congming Chen, Wei Huo, Lung Li, Xiaobing Feng, Kai Xing:
Can We Make It Faster? Efficient May-Happen-in-Parallel Analysis Revisited. PDCAT 2012: 59-64 - 2011
- [c21]Bing Zhu, Wei Huo:
Adaptive backstepping control for a miniature autonomous helicopter. CDC/ECC 2011: 5413-5418 - [c20]Long Chen, Wei Huo, Haitao Mi, Zhaoqing Zhang, Xiaobing Feng, Zhiyuan Li:
Parallelizing a machine translation decoder for multicore computer. ICNC 2011: 2220-2225 - [c19]Bobo Xing, Tiezhu Zhang, Wei Huo, Hongxin Zhang:
Modeling and analysis of the working process of the flat valve system of Mechanical Hydraulic Confined Piston Engine. RAM 2011: 343-346 - 2010
- [c18]Hongtao Yu, Jingling Xue, Wei Huo, Xiaobing Feng, Zhaoqing Zhang:
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code. CGO 2010: 218-229 - [c17]Bing Zhu, Wei Huo:
Trajectory Linearization Control for a quadrotor helicopter. ICCA 2010: 34-39 - [c16]Kong-Yi Wu, Wei Huo:
Backstepping-based direct adaptive fuzzy formation control of uncertain mobile robots. ICCA 2010: 2092-2097
2000 – 2009
- 2009
- [j7]MaoQing Li, Wei Huo:
Controller design for mechanical systems with underactuation degree one based on controlled Lagrangians method. Int. J. Control 82(9): 1747-1761 (2009) - [c15]Baoli Ma, Wei Huo:
Smooth time-varying uniform asymptotic stabilization of underactuated surface vessels. CDC 2009: 3137-3141 - 2008
- [j6]Wei Huo:
Predictive variable structure control of nonholonomic chained systems. Int. J. Comput. Math. 85(6): 949-960 (2008) - 2007
- [c14]Donald M. Monro, Xiaopeng Wang, Wei Huo, Adrian N. Evans:
Merge Coding of Atoms for Wavelet/Matching Pursuits Image Compression. ICASSP (1) 2007: 1053-1056 - 2006
- [j5]Chadi Assi, Wei Huo, Abdallah Shami:
Multiple link failures survivability of optical networks with traffic grooming capability. Comput. Commun. 29(18): 3900-3912 (2006) - [c13]Haoxiang Zhang, Xiaopeng Wang, Wei Huo, Donald M. Monro:
A Hybrid Video Coder Based on H.264 with Matching Pursuits. ICASSP (2) 2006: 889-892 - [c12]Wei Huo, Chadi Assi, Abdallah Shami:
Multiple-Link Failures Survivability in Optical Networks with Traffic Grooming Capability. ICC 2006: 2811-2816 - [c11]Donald M. Monro, Wei Huo, Xiaopeng Wang:
Subband Adaptive Dictionaries for Wavelet/Matching Pursuits Image Coding. ICIP 2006: 2133-2136 - 2005
- [j4]Chadi Assi, Wei Huo, Abdallah Shami, Nasir Ghani:
Improving signaling recovery in shared mesh optical networks. Comput. Commun. 29(1): 59-68 (2005) - [j3]Chadi Assi, Wei Huo, Abdallah Shami, Nasir Ghani:
Analysis of capacity re-provisioning in optical mesh networks. IEEE Commun. Lett. 9(7): 658-660 (2005) - [c10]Chadi Assi, Wei Huo:
On the benefits of lightpath re-provisioning in optical mesh networks. ICC 2005: 1746-1750 - [c9]Chadi Assi, Wei Huo, Abdallah Shami:
Centralized Versus Distributed Re-provisioning in Optical Mesh Networks. ICN (1) 2005: 34-43 - [c8]Chadi Assi, Wei Huo, Abdallah Shami:
Impact of Resource Sharability on Dual Failure Restorability in Optical Mesh Networks. NETWORKING 2005: 792-803 - 2004
- [c7]Wei Huo, Chadi Assi, Abdallah Shami:
A New Framework for Rapid Restoration in Optical Mesh Networks. ICPP Workshops 2004: 363-370 - 2001
- [j2]Zhendong Sun, Shuzhi Sam Ge, Wei Huo, Tong Heng Lee:
Stabilization of nonholonomic chained systems via nonregular feedback linearization. Syst. Control. Lett. 44(4): 279-289 (2001) - 2000
- [j1]Wenjie Dong, Wei Huo, Shiu Kit Tso, Weiliang Xu:
Tracking control of uncertain dynamic nonholonomic system and its application to wheeled mobile robots. IEEE Trans. Robotics Autom. 16(6): 870-874 (2000) - [c6]Chaoli Wang, Wei Huo, Dalong Tan, Yuechao Wang:
ε-stabilization of multiple chained form control systems with input constraints and its application in mobile robots. IROS 2000: 1766-1771
1990 – 1999
- 1999
- [c5]Wenjie Dong, Wei Huo:
Tracking Control of Wheeled Mobile Robots with Unknown Dynamics. ICRA 1999: 2645-2650 - 1996
- [c4]Baoli Ma, Wei Huo:
Adaptive kinematic control of free-floating space robot system. IROS 1996: 1565-1572 - 1995
- [c3]Baoli Ma, Wei Huo:
Adaptive Control of Space Robot System with an Attitude Controlled Base. ICRA 1995: 1265-1270 - [c2]Wei Huo:
New Formulas for Complete Determining Base Parameters of Robots. ICRA 1995: 3021-3026
1980 – 1989
- 1989
- [c1]Wei Huo, Mian Cheng, Weibing Gao:
The application of the inertial parameter regrouping method to the robot forward dynamics algorithm. SMC 1989: 338-343
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint