default search action
Ziyang Zhen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Umair Javaid, Ziyang Zhen, Sami Shahid, Dauda Sh Ibrahim, Salman Ijaz:
Observer-based attitude control of spacecraft under actuator dead zone and misalignment faults. Appl. Math. Comput. 465: 128406 (2024) - [j18]Zhen Tang, Ziyang Zhen, Zhengen Zhao, Geert Deconinck:
Observer-based guaranteed-cost bipartite time-varying formation tracking control for multiagent systems subject to communication delays. Inf. Sci. 682: 121259 (2024) - [j17]Haibo Wang, Shuang Shi, Ziyang Zhen:
Disturbance observer based fixed-time tracking control for unmanned aerial helicopters. J. Frankl. Inst. 361(17): 107184 (2024) - [j16]Liangdong Wen, Ziyang Zhen, Chenggang Tao, Jian Ding:
Distributed Cooperative Strategy of UAV Swarm Without Speed Measurement Under Saturation Attack Mission. IEEE Trans. Aerosp. Electron. Syst. 60(4): 4518-4529 (2024) - [j15]Cheng Yuwen, Shuai Liu, Ziyang Zhen:
Distributed Nash Equilibrium Seeking With Stochastic Communication Noise. IEEE Trans. Circuits Syst. II Express Briefs 71(4): 2134-2138 (2024) - [j14]Cheng Yuwen, Ziyang Zhen, Liangdong Wen:
Formation Tracking in Noncooperative Game-Theoretic Framework. IEEE Trans. Control. Netw. Syst. 11(2): 1056-1066 (2024) - 2023
- [j13]Chen Liu, Bo Li, Jun Zhao, Ziyang Zhen, Weiwei Feng, Xudong Liu:
TI-MVD: A temporal interaction-enhanced model for malware variants detection. Knowl. Based Syst. 278: 110850 (2023) - [j12]Zhengen Zhao, Yunsong Xu, Yuzhe Li, Ziyang Zhen, Ying Yang, Yang Shi:
Data-Driven Attack Detection and Identification for Cyber-Physical Systems Under Sparse Sensor Attacks. IEEE Trans. Autom. Control. 68(10): 6330-6337 (2023) - [j11]Zhen Tang, Ziyang Zhen, Zhengen Zhao:
Distributed H∞ consensus of multiagent systems with nonuniform time-varying communication delays. Trans. Inst. Meas. Control 45(15): 2933-2943 (2023) - 2021
- [j10]Zhengen Zhao, Yimin Huang, Ziyang Zhen, Yuzhe Li:
Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems. IEEE Trans. Cybern. 51(12): 6179-6187 (2021) - 2020
- [j9]Shaohua Yang, Gang Tao, Bin Jiang, Ziyang Zhen:
Practical output tracking control for nonlinearly parameterized longitudinal dynamics of air vehicles. J. Frankl. Inst. 357(17): 12380-12413 (2020) - [j8]Ziyang Zhen, Chaojun Yu, Shuoying Jiang, Ju Jiang:
Adaptive Super-Twisting Control for Automatic Carrier Landing of Aircraft. IEEE Trans. Aerosp. Electron. Syst. 56(2): 984-997 (2020)
2010 – 2019
- 2019
- [j7]Ajeet Kumar Bhatia, Ju Jiang, Ziyang Zhen, Nigar Ahmed, Avinash Rohra:
Projection Modification Based Robust Adaptive Backstepping Control for Multipurpose Quadcopter UAV. IEEE Access 7: 154121-154130 (2019) - [j6]Ziyang Zhen, Miao Peng, Yixuan Xue, Shuoying Jiang:
Robust Preview Control and Autoregressive Prediction for Aircraft Automatic Carrier Landing. IEEE Access 7: 181273-181283 (2019) - 2018
- [j5]Ziyang Zhen, Shuoying Jiang, Ju Jiang:
Preview Control and Particle Filtering for Automatic Carrier Landing. IEEE Trans. Aerosp. Electron. Syst. 54(6): 2662-2674 (2018) - 2016
- [j4]Haiqun Qin, Ziyang Zhen, Kun Ma:
Moving object detection based on optical flow and neural network fusion. Int. J. Intell. Comput. Cybern. 9(4): 325-335 (2016) - 2013
- [j3]Huajun Gong, Ziyang Zhen, Xin Li, Ju Jiang, Xinhua Wang:
Design of automatic climbing controller for large civil aircraft. J. Frankl. Inst. 350(9): 2442-2454 (2013) - [c9]Fengying Zheng, Huajun Gong, Ju Jiang, Ziyang Zhen:
Lateral Carrier Landing Performance Affecting Factors of Small Carrier-Based UAV. AsiaSim 2013: 528-540 - 2011
- [j2]Huangzhong Pu, Ziyang Zhen, Daobo Wang:
Modified shuffled frog leaping algorithm for optimization of UAV flight controller. Int. J. Intell. Comput. Cybern. 4(1): 25-39 (2011) - 2010
- [c8]Ziyang Zhen, Daobo Wang, Qi Kang:
UAV flight trajectory control based on information fusion control method. ICNSC 2010: 337-341 - [c7]Yuankang Fang, Ziyang Zhen, Zhiqiu Huang, Chao Zhang:
Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm. ISICA (1) 2010: 329-337
2000 – 2009
- 2009
- [c6]Ziyang Zhen, Daobo Wang, Meng Li:
Improved particle swarm optimizer based on adaptive random learning approach. IEEE Congress on Evolutionary Computation 2009: 1045-1048 - [c5]Ziyang Zhen, Daobo Wang, Yuanyuan Liu:
Improved shuffled frog leaping algorithm for continuous optimization problem. IEEE Congress on Evolutionary Computation 2009: 2992-2995 - [c4]Ziyang Zhen, Zhisheng Wang, Yong Hu:
Multi-sensor Information Fusion for Aircraft Attitude Determination System. CSIE (6) 2009: 474-478 - 2007
- [j1]Zhisheng Wang, Daobo Wang, Ziyang Zhen:
Primary exploration of nonlinear information fusion control theory. Sci. China Ser. F Inf. Sci. 50(5): 686-696 (2007) - [c3]Ziyang Zhen, Zhisheng Wang, Yuanyuan Liu:
An Adaptive Particle Swarm Optimization for Global Optimization. ICNC (4) 2007: 8-12 - [c2]Yuanyuan Liu, Wenbo Liu, Ziyang Zhen, Gong Zhang:
Benchmark Tests of Robust Modified Particle Swarm Optimization. ICNC (4) 2007: 13-17 - [c1]Ziyang Zhen, Zhisheng Wang, Zhou Gu, Yuanyuan Liu:
A Novel Memetic Algorithm for Global Optimization Based on PSO and SFLA. ISICA 2007: 127-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint