Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function

    This article presents a masquerade detection system based on principal component analysis (PCA) and radial basics function (RBF) neural network. The system first creates a profile defining a normal user’s beha...

    Zhanchun Li, Zhitang Li, Yao Li, Bin Liu in Computational Intelligence and Security (2005)

  2. No Access

    Chapter and Conference Paper

    An Image Hiding Algorithm Based on Bit Plane

    In this paper, an image hiding method which used for hiding one secret image into multiple open images is addressed. The method is roughly divided into three steps. First, based on the correlations analysis, d...

    Bin Liu, Zhitang Li, Zhanchun Li in Computational Intelligence and Security (2005)

  3. No Access

    Chapter and Conference Paper

    Decentralized Stabilization for Nonlinear Systems with Unknown Mismatched Interconnections

    This paper establishes a neural network and policy iteration based decentralized control scheme to stabilize large-scale nonlinear systems with unknown mismatched interconnections. For relaxing the common assu...

    Bo Zhao, Ding Wang, Guang Shi, Derong Liu, Yuanchun Li in Neural Information Processing (2016)

  4. No Access

    Chapter and Conference Paper

    A Learning-Based Decentralized Optimal Control Method for Modular and Reconfigurable Robots with Uncertain Environment

    This paper presents a novel decentralized control approach for modular and reconfigurable robots (MRRs) with uncertain environment contact under a learning-based optimal compensation strategy. Unlike the known...

    Bo Dong, Ke** Liu, Hui Li, Yuanchun Li in Neural Information Processing (2017)

  5. No Access

    Chapter and Conference Paper

    Programming IoT Devices by Demonstration Using Mobile Apps

    The revolutionary advances of Internet of Things (IoT) devices and applications have helped IoT emerge as an increasingly important domain for end-user development (EUD). Past research has shown that end users...

    Toby Jia-Jun Li, Yuanchun Li, Fanglin Chen, Brad A. Myers in End-User Development (2017)

  6. No Access

    Chapter and Conference Paper

    Decentralized Force/Position Fault-Tolerant Control for Constrained Reconfigurable Manipulators with Actuator Faults

    This paper addresses the problems of decentralized force/position fault-tolerant control for constrained reconfigurable manipulators. A novel decentralized force/position control method is proposed for constra...

    Fan Zhou, Bo Dong, Yuanchun Li in Neural Information Processing (2017)

  7. No Access

    Chapter and Conference Paper

    Neuro-control of Nonlinear Systems with Unknown Input Constraints

    This paper establishes an adaptive dynamic programming algorithm based neuro-control scheme for nonlinear systems with unknown input constraints. The control strategy consists of an online nominal optimal cont...

    Bo Zhao, **nliang Liu, Derong Liu, Yuanchun Li in Neural Information Processing (2017)

  8. No Access

    Chapter and Conference Paper

    Active Optimal Fault-Tolerant Control Method for Multi-fault Concurrent Modular Manipulator Based on Adaptive Dynamic Programming

    In this paper, a novel active optimal fault-tolerant control (FTC) scheme is designed based on adaptive dynamic programming (ADP) for modular manipulator when sensor and actuator faults are concurrency. Firstl...

    Bing Li, Fan Zhou, Bo Dong, Yucheng Liu, Fu Liu in Advances in Neural Networks – ISNN 2019 (2019)

  9. No Access

    Chapter and Conference Paper

    Decentralized Robust Optimal Control for Modular Robot Manipulators Based on Zero-Sum Game with ADP

    In this paper, a decentralized robust zero-sum optimal control method is proposed for modular robot manipulators (MRMs) based on the adaptive dynamic programming (ADP) approach

    Bo Dong, Tianjiao An, Fan Zhou, Shenquan Wang in Advances in Neural Networks – ISNN 2019 (2019)

  10. No Access

    Chapter and Conference Paper

    Information Security Risk and Protective Measures of Computer Network in Big Data Age

    Along with the rapid development of Internet information technology, the field of network information technology has become more and more widely applied, and it is followed by the ‘‘big data era’’. Under the ...

    Lei Deng, Hai** Li, Fanchun Li in Artificial Intelligence Algorithms and Applications (2020)

  11. No Access

    Chapter and Conference Paper

    A Variable Step-Size Based Iterative Algorithm for High-Precision Ranging Using FMCW Radar

    Frequency modulated continuous wave (FMCW) radar ranging plays an important role in many applications, including autonomous vital sign sensing, driving, and human-computer interaction. In this paper, a variabl...

    Dengke Yao, Yong Wang, Liangbo **e in Advances in Artificial Intelligence and Se… (2021)