Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Programming IoT Devices by Demonstration Using Mobile Apps

    The revolutionary advances of Internet of Things (IoT) devices and applications have helped IoT emerge as an increasingly important domain for end-user development (EUD). Past research has shown that end users...

    Toby Jia-Jun Li, Yuanchun Li, Fanglin Chen, Brad A. Myers in End-User Development (2017)

  2. No Access

    Chapter and Conference Paper

    Decentralized Stabilization for Nonlinear Systems with Unknown Mismatched Interconnections

    This paper establishes a neural network and policy iteration based decentralized control scheme to stabilize large-scale nonlinear systems with unknown mismatched interconnections. For relaxing the common assu...

    Bo Zhao, Ding Wang, Guang Shi, Derong Liu, Yuanchun Li in Neural Information Processing (2016)

  3. No Access

    Chapter and Conference Paper

    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function

    This article presents a masquerade detection system based on principal component analysis (PCA) and radial basics function (RBF) neural network. The system first creates a profile defining a normal user’s beha...

    Zhanchun Li, Zhitang Li, Yao Li, Bin Liu in Computational Intelligence and Security (2005)

  4. No Access

    Chapter and Conference Paper

    An Image Hiding Algorithm Based on Bit Plane

    In this paper, an image hiding method which used for hiding one secret image into multiple open images is addressed. The method is roughly divided into three steps. First, based on the correlations analysis, d...

    Bin Liu, Zhitang Li, Zhanchun Li in Computational Intelligence and Security (2005)