咨询与建议

限定检索结果

文献类型

  • 1,412 篇 会议
  • 891 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,308 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 659 篇 控制科学与工程
    • 495 篇 软件工程
    • 451 篇 计算机科学与技术...
    • 331 篇 机械工程
    • 230 篇 电气工程
    • 128 篇 电子科学与技术(可...
    • 112 篇 仪器科学与技术
    • 103 篇 化学工程与技术
    • 100 篇 动力工程及工程热...
    • 92 篇 冶金工程
    • 91 篇 信息与通信工程
    • 77 篇 力学(可授工学、理...
    • 56 篇 交通运输工程
    • 55 篇 光学工程
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
    • 33 篇 生物工程
    • 23 篇 矿业工程
    • 21 篇 环境科学与工程(可...
    • 21 篇 安全科学与工程
  • 904 篇 理学
    • 499 篇 数学
    • 407 篇 系统科学
    • 144 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 78 篇 化学
    • 34 篇 生物学
  • 336 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 86 篇 工商管理
    • 38 篇 图书情报与档案管...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 18 篇 法学
  • 15 篇 医学
  • 7 篇 农学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 84 篇 control systems
  • 67 篇 fault detection
  • 64 篇 switched systems
  • 57 篇 nonlinear system...
  • 52 篇 parameter estima...
  • 48 篇 actuators
  • 46 篇 stability analys...
  • 43 篇 fault diagnosis
  • 43 篇 mathematical mod...
  • 42 篇 process control
  • 41 篇 automation
  • 40 篇 neural networks
  • 40 篇 switches
  • 37 篇 optimization
  • 37 篇 linear matrix in...
  • 37 篇 uncertainty
  • 37 篇 robustness
  • 36 篇 robust control
  • 33 篇 adaptive control
  • 31 篇 state feedback

机构

  • 450 篇 state key labora...
  • 306 篇 college of infor...
  • 132 篇 tianjin key labo...
  • 96 篇 state key labora...
  • 87 篇 northeastern uni...
  • 72 篇 school of inform...
  • 63 篇 key laboratory o...
  • 48 篇 the state key la...
  • 47 篇 state key labora...
  • 40 篇 northeastern uni...
  • 40 篇 college of infor...
  • 34 篇 hebei key labora...
  • 28 篇 tianjin key labo...
  • 24 篇 school of automa...
  • 23 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 tianjin key labo...
  • 20 篇 school of automa...
  • 19 篇 school of mechan...

作者

  • 103 篇 jun zhao
  • 77 篇 tianyou chai
  • 63 篇 min huang
  • 58 篇 feng dong
  • 54 篇 guang-hong yang
  • 49 篇 zhao jun
  • 49 篇 chai tianyou
  • 49 篇 georgi m. dimiro...
  • 45 篇 zhong-ping jiang
  • 42 篇 fuli wang
  • 41 篇 tengfei liu
  • 39 篇 huang min
  • 39 篇 r. isermann
  • 37 篇 yang tao
  • 32 篇 rolf isermann
  • 32 篇 yang guang-hong
  • 31 篇 dan ma
  • 31 篇 chao tan
  • 30 篇 dong feng
  • 28 篇 huaguang zhang

语言

  • 2,134 篇 英文
  • 125 篇 中文
  • 48 篇 其他
检索条件"机构=Automation and Process Engineering Laboratory"
2308 条 记 录,以下是41-50 订阅
排序:
Completely-Stealthy and Energy-Stealthy Sensor Attacks With Constrained Channels: Existence and Design
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Jin, Kaijing Ye, Dan Zhang, Tian-Yu Northeastern University College of Information Science and Engineering Shenyang110819 China Northeastern University State Key Laboratory of Synthetical Automation of Process Industries Shenyang110819 China
In this paper, the security of state estimation is studied under stealthy false-data injection attacks launched in the sensor-to-estimator channels. It is proved that there is no strictly stealthy sensor attack such t... 详细信息
来源: 评论
Distributed State Estimation for Discrete-Time Linear Systems: A Canonical Decomposition-Based Approach
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Gao, Rui Yang, Guang-Hong Northeastern University College of Information Science and Engineering Shenyang110819 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
This paper is concerned with the problem of distributed state estimation for discrete-time linear systems using a network of agents, where the measurement of each agent suffers from the lack of detectability with the ... 详细信息
来源: 评论
Finite Horizon Pareto-Optimal Control for Multi-Controller Cyber-Physical Systems Under DoS Attacks
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 362-371页
作者: Cheng Tan Qinglong Zhang Jianying Di Yuzhe Li School of Engineering QuFu Normal University Rizhao Shandong China College of Information Science and Engineering Northeastern University Shenyang China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China
In this paper, we study multi-controller cyber-physical systems (MCPSs) characterized by the presence of multiple controllers engaging in cooperative game interactions. Due to Denial-of-Service (DoS) attacks on the tr... 详细信息
来源: 评论
TSDD-UB: A Texture Simplification-Based Denoising Diffusion Model for Unsupervised Defect Detection Under Ultrasonic B-Scan Signal
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Wang, Liwei Liu, Jinhai Zhong, Yuan Shen, Xiangkai Zhao, He Northeastern University School of Information Science and Engineering Shenyang110004 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries School of Information Science and Engineering Shenyang110004 China Beihang University School of Automation Science and Electrical Engineering Beijing100191 China
The ultrasonic B-scan signal is widely used in the detection of pipeline defects. However, most existing methods face challenges in achieving high accuracy due to the amplitude attenuation phenomenon and the complicat... 详细信息
来源: 评论
Intelligent PI control of hematite regrinding pressure based on signal compensation and reinforcement learning
收藏 引用
Kongzhi yu Juece/Control and Decision 2025年 第6期40卷 1931-1938页
作者: Sun, Hong-Shuo Zhang, Ya-Jun Liu, Ning Guo, Ce Chai, Tian-You Zhang, Jin-Qiang State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang110819 China National Engineering Technology Research Center for Metallurgical Industry Automation Northeastern University Shenyang110819 China Hongxing Beneficiation Plant Jiuquan Iron & Steel Group Corporation Jiayuguan735100 China
The regrinding process of hematite is a unique beneficiation process for low-grade hematite, where the control of the ore feed pressure is a key process. To ensure precise control of the ore feed pressure, this paper ... 详细信息
来源: 评论
Adaptive Nussbaum Design for Nonholonomic Systems With Asymptotic Stabilization Against False Data Injection
收藏 引用
IEEE Transactions on Cybernetics 2025年
作者: Liu, Guilong Yang, Yongliang Gao, Weinan Wunsch, Donald C. University of Science and Technology Beijing Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering Beijing100083 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China Missouri University of Science and Technology Department of Electrical and Computer Engineering RollaMO65409 United States
This article addresses the stabilization challenges of nonholonomic systems under the threat of false data injection (FDI) attacks, which compromise the integrity of state information. A novel adaptive control strateg... 详细信息
来源: 评论
Secure State Estimation For Continuous-time Cyber-Physical Systems Under Stochastic Attacks And Faults
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Sun, Qingdong Yang, Guang-Hong Northeastern University College of Information Science and Engineering Liaoning Shenyang110819 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
This paper studies the secure state estimation problem of continuous-time cyber-physical systems affected by sensor attacks and actuator faults, where the attackers do not target fixed transmission channels but instea... 详细信息
来源: 评论
Dissipativity-Based Secure Output Regulation in Networked Switched Systems With Long-Duration Zero-Value Attacks
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Li, Lili Guo, Qingjun Fu, Jun Rong, Di Dalian Maritime University College of Marine Electrical Engineering Dalian116026 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
The secure output regulation (OR) problem is formulated for networked switched systems (SSs) with severely unstable dynamics that are subjected to long-duration zero-value (LDZV) attacks. For these systems, well-defin... 详细信息
来源: 评论
Data-driven fault-tolerant consensus control for constrained nonlinear multiagent systems via adaptive dynamic programming
收藏 引用
Information Sciences 2025年 705卷
作者: Zhang, Lulu Zhang, Huaguang Wang, Tianbiao Yue, Xiaohui College of Information Science and Engineering Northeastern University Liaoning Shenyang110004 China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Liaoning Shenyang110004 China
In this paper, a data-driven fault-tolerant control (FTC) method is proposed to solve the consensus problem of constrained multiagent systems (MASs) with denial-of-service attacks. First, a resilient distributed obser... 详细信息
来源: 评论
A Secure Transmission and Attack Detection Approach Based on Autoencoder
收藏 引用
IEEE Transactions on Network Science and engineering 2025年
作者: Ma, Zhen-Lei Li, Xiao-Jian Northeastern University College of Information Science and Engineering Liaoning Shenyang110819 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Liaoning Shenyang110819 China
This paper is concerned with the secure transmission and attack detection problem for cyber-physical systems with unknown dynamic matrices. The signals transmitted between physical and cyber layers can be eavesdropped... 详细信息
来源: 评论