default search action
Zhong-Hua Pang
Person information
- affiliation: North China University of Technology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Haibin Guo, Zhong-Hua Pang, Chao Li:
Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation. IEEE CAA J. Autom. Sinica 11(4): 1054-1056 (2024) - [j41]Zhong-Hua Pang, Yumo Zhang, Xueyuan Sun, Shengnan Gao, Guo-Ping Liu:
Data-Driven Adaptive Predictive Control Method With Autotuned Weighting Factor for Nonlinear Systems Using Triangular Dynamic Linearization. IEEE CAA J. Autom. Sinica 11(8): 1880-1882 (2024) - [j40]Zhong-Hua Pang, Qian Cao, Haibin Guo, Zhe Dong:
Prediction-Based State Estimation and Compensation Control for Networked Systems with Communication Constraints and DoS Attacks. IEEE CAA J. Autom. Sinica 11(11): 2352-2354 (2024) - [j39]Haibin Guo, Jian Sun, Zhong-Hua Pang:
Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems. IEEE Trans. Circuits Syst. II Express Briefs 71(1): 206-210 (2024) - [j38]Tong Mu, Zhong-Hua Pang, Haibin Guo, Guo-Ping Liu, Qing-Long Han:
Output Tracking Predictive Control of Uncertain Networked Control Systems. IEEE Trans. Circuits Syst. II Express Briefs 71(6): 3141-3145 (2024) - [j37]Ang Liu, Yuwei Ren, Zhong-Hua Pang, Ben Niu:
Fixed-Time Secure State Estimation for Cyber-Physical Systems With Multi-Channel Transmission Under DoS Attacks. IEEE Trans. Circuits Syst. II Express Briefs 71(8): 3805-3809 (2024) - [j36]Yuhan Suo, Senchun Chai, Runqi Chai, Zhong-Hua Pang, Yuanqing Xia, Guo-Ping Liu:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. IEEE Trans. Inf. Forensics Secur. 19: 1908-1921 (2024) - 2023
- [j35]Haibin Guo, Jian Sun, Zhong-Hua Pang:
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems. IEEE CAA J. Autom. Sinica 10(5): 1181-1191 (2023) - [j34]Zhong-Hua Pang, Tong Mu, Fang-Yuan Hou, Yuntao Shi, Jian Sun:
Two networked predictive control methods for output tracking of networked systems with plant-model mismatch. Int. J. Syst. Sci. 54(10): 2073-2088 (2023) - [j33]Chang-Bing Zheng, Zhong-Hua Pang, Jing-Xu Wang, Shengnan Gao, Jian Sun, Guo-Ping Liu:
Time-varying formation prescribed performance control with collision avoidance for multi-agent systems subject to mismatched disturbances. Inf. Sci. 633: 517-530 (2023) - [j32]Zhonghua Pang, Yuan Fu, Haibin Guo, Jian Sun:
Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies. J. Syst. Sci. Complex. 36(4): 1407-1422 (2023) - [j31]Zhong-Hua Pang, Cheng-Gang Xia, Ji Zhang, Qing-Long Han, Guo-Ping Liu:
A Prediction-Based Approach Realizing Finite-Time Convergence of Networked Control Systems. IEEE Trans. Circuits Syst. II Express Briefs 70(7): 2445-2449 (2023) - [j30]Chang-Bing Zheng, Zhong-Hua Pang, Jian Sun, Guo-Ping Liu, Qing-Long Han:
Time-Varying Formation Predictive Control of Second-Order Networked Multi-Agent Systems With Three-Channel Random Communication Constraints. IEEE Trans. Circuits Syst. II Express Briefs 70(9): 3479-3483 (2023) - [j29]Haibin Guo, Jian Sun, Zhong-Hua Pang, Guo-Ping Liu:
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems. IEEE Trans. Cybern. 53(10): 6714-6724 (2023) - [j28]Chang-Bing Zheng, Zhong-Hua Pang, Jing-Xu Wang, Jian Sun, Guo-Ping Liu, Qing-Long Han:
Null-Space-Based Time-Varying Formation Control of Uncertain Nonlinear Second-Order Multiagent Systems With Collision Avoidance. IEEE Trans. Ind. Electron. 70(10): 10476-10485 (2023) - 2022
- [j27]Fangyuan Hou, Jian Sun, Qiuling Yang, Zhonghua Pang:
Deep reinforcement learning for optimal denial-of-service attacks scheduling. Sci. China Inf. Sci. 65(6): 1-9 (2022) - [j26]Zhong-Hua Pang, Xue-Ying Zhao, Jian Sun, Yuntao Shi, Guo-Ping Liu:
Comparison of Three Data-Driven Networked Predictive Control Methods for a Class of Nonlinear Systems. IEEE CAA J. Autom. Sinica 9(9): 1714-1716 (2022) - [j25]Zhong-Hua Pang, Cheng-Gang Xia, Jian Sun, Guo-Ping Liu, Qing-Long Han:
Active fault-tolerant predictive control of networked systems subject to actuator faults and random communication constraints. Int. J. Control 95(9): 2357-2363 (2022) - [j24]Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun, Guo-Ping Liu:
Security of networked control systems subject to deception attacks: a survey. Int. J. Syst. Sci. 53(16): 3577-3598 (2022) - [j23]Zhong-Hua Pang, Zhen-Yi Liu, Zhe Dong, Tong Mu:
An Event-Triggered Networked Predictive Control Method Using an Allowable Time Delay. J. Adv. Comput. Intell. Intell. Informatics 26(5): 768-775 (2022) - [j22]Haibin Guo, Zhonghua Pang, Jian Sun, Jun Li:
Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme. J. Syst. Sci. Complex. 35(5): 1668-1684 (2022) - [j21]Zhonghua Pang, Tao Du, Chang-Bing Zheng, Chao Li:
Event-Triggered Cooperative Predictive Control for Networked Multi-Agent Systems with Random Delays and Packet Dropouts. Symmetry 14(3): 541 (2022) - [j20]Zhong-Hua Pang, Lan-Zhi Fan, Zhe Dong, Qing-Long Han, Guo-Ping Liu:
False Data Injection Attacks Against Partial Sensor Measurements of Networked Control Systems. IEEE Trans. Circuits Syst. II Express Briefs 69(1): 149-153 (2022) - [j19]Zhong-Hua Pang, Chang-Bing Zheng, Chao Li, Guo-Ping Liu, Qing-Long Han:
Cloud-Based Time-Varying Formation Predictive Control of Multi-Agent Systems With Random Communication Constraints and Quantized Signals. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1282-1286 (2022) - [j18]Zhong-Hua Pang, Cheng-Gang Xia, Wei-Feng Zhai, Guo-Ping Liu, Qing-Long Han:
Networked Active Fault-Tolerant Predictive Control for Systems With Random Communication Constraints and Actuator/Sensor Faults. IEEE Trans. Circuits Syst. II Express Briefs 69(4): 2166-2170 (2022) - [j17]Haibin Guo, Jian Sun, Zhong-Hua Pang:
Stealthy FDI Attacks Against Networked Control Systems Using Two Filters With an Arbitrary Gain. IEEE Trans. Circuits Syst. II Express Briefs 69(7): 3219-3223 (2022) - [j16]Zhong-Hua Pang, Biao Ma, Guo-Ping Liu, Qing-Long Han:
Data-Driven Adaptive Control: An Incremental Triangular Dynamic Linearization Approach. IEEE Trans. Circuits Syst. II Express Briefs 69(12): 4949-4953 (2022) - [j15]Qirui Zhang, Kun Liu, Zhonghua Pang, Yuanqing Xia, Tao Liu:
Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks. IEEE Trans. Cybern. 52(6): 4926-4934 (2022) - [i2]Yuhan Suo, Senchun Chai, Runqi Chai, Zhong-Hua Pang, Yuanqing Xia, Guo-Ping Liu:
Security Defense of Large Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. CoRR abs/2212.05500 (2022) - 2021
- [j14]Zhong-Hua Pang, Lan-Zhi Fan, Jian Sun, Kun Liu, Guo-Ping Liu:
Detection of stealthy false data injection attacks against networked control systems via active data modification. Inf. Sci. 546: 192-205 (2021) - [j13]Zhong-Hua Pang, Chuandong Bai, Guoping Liu, Qing-Long Han, Xianming Zhang:
A Novel Networked Predictive Control Method for Systems with Random Communication Constraints. J. Syst. Sci. Complex. 34(4): 1364-1378 (2021) - [j12]Zhong-Hua Pang, Wencheng Luo, Guoping Liu, Qing-Long Han:
Observer-Based Incremental Predictive Control of Networked Multi-Agent Systems With Random Delays and Packet Dropouts. IEEE Trans. Circuits Syst. II Express Briefs 68(1): 426-430 (2021) - [j11]Zhong-Hua Pang, Chang-Bing Zheng, Jian Sun, Qing-Long Han, Guo-Ping Liu:
Distance- and Velocity-Based Collision Avoidance for Time-Varying Formation Control of Second-Order Multi-Agent Systems. IEEE Trans. Circuits Syst. II Express Briefs 68(4): 1253-1257 (2021) - [j10]Haibin Guo, Zhong-Hua Pang, Jian Sun, Jun Li:
An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems. IEEE Trans. Circuits Syst. II Express Briefs 68(10): 3306-3310 (2021) - [c6]Zhuolei Chaochen, Qichao Zhang, Ding Li, Haoran Li, Zhonghua Pang:
Vehicle Trajectory Prediction Based on Graph Attention Network. ICCSIP 2021: 427-438 - 2020
- [c5]Junwen Chen, Yi Lu, Yaran Chen, Dongbin Zhao, Zhonghua Pang:
ContourRend: A Segmentation Method for Improving Contours by Rendering. ISNN 2020: 251-260 - [i1]Junwen Chen, Yi Lu, Yaran Chen, Dongbin Zhao, Zhonghua Pang:
ContourRend: A Segmentation Method for Improving Contours by Rendering. CoRR abs/2007.07437 (2020)
2010 – 2019
- 2019
- [c4]Zhong-Hua Pang, Wencheng Luo:
Observer-Based Cooperative Output Tracking Control of Linear Multi-Agent Systems. ICARM 2019: 976-980 - 2017
- [j9]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun:
Data-based predictive control for networked nonlinear systems with packet dropout and measurement noise. J. Syst. Sci. Complex. 30(5): 1072-1083 (2017) - [j8]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun:
Input Design-Based Compensation Control for Networked Nonlinear Systems With Random Delays and Packet Dropouts. IEEE Trans. Circuits Syst. II Express Briefs 64-II(3): 299-303 (2017) - [j7]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun:
Data-Driven Control With Input Design-Based Data Dropout Compensation for Networked Nonlinear Systems. IEEE Trans. Control. Syst. Technol. 25(2): 628-636 (2017) - 2016
- [j6]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou:
Design and Performance Analysis of Incremental Networked Predictive Control Systems. IEEE Trans. Cybern. 46(6): 1400-1410 (2016) - [j5]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun:
Data-Based Predictive Control for Networked Nonlinear Systems With Network-Induced Delay and Packet Dropout. IEEE Trans. Ind. Electron. 63(2): 1249-1257 (2016) - [j4]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Fangyuan Hou, Dehui Sun:
Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems. IEEE Trans. Ind. Electron. 63(5): 3242-3251 (2016) - 2015
- [c3]Cunwu Han, Zhong-Hua Pang, Lei Liu, Song Bi, Dehui Sun:
Robust H∞ congestion control for dynamic TCP/AQM networks with random delays. ICIA 2015: 923-926 - [c2]Zhong-Hua Pang, Fangyuan Hou, Yuguo Zhou, Dehui Sun:
Design of false data injection attacks for output tracking control of CARMA systems. ICIA 2015: 1273-1277 - 2014
- [j3]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Maoyin Chen:
Output Tracking Control for Networked Systems: A Model-Based Prediction Approach. IEEE Trans. Ind. Electron. 61(9): 4867-4877 (2014) - 2013
- [j2]Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou:
Step Output Tracking Controller Design for Networked Control Systems. J. Adv. Comput. Intell. Intell. Informatics 17(6): 813-817 (2013) - 2012
- [j1]Zhong-Hua Pang, Guo-Ping Liu:
Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks. IEEE Trans. Control. Syst. Technol. 20(5): 1334-1342 (2012) - 2010
- [c1]Zhong-Hua Pang, Guo-Ping Liu:
Model-based recursive networked predictive control. SMC 2010: 1665-1670
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint