default search action
Hongtao Sun
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Lihong Xu, Chen Wang, Hong-Tao Sun, Yitao Shen:
Secure Path Following Control of Autonomous Vehicles Under Actuator Attacks Using Fuzzy Terminal Sliding Mode Control Approach. IEEE Access 12: 126652-126667 (2024) - [j21]Yiran Huang, Fuhao Chen, Hongtao Sun, Cheng Zhong:
Exploring gene-patient association to identify personalized cancer driver genes by linear neighborhood propagation. BMC Bioinform. 25(1): 34 (2024) - [j20]Cheng Tan, Qinglong Zhang, Zhengqiang Zhang, Hongtao Sun:
Finite-time stability and stabilisation of time-varying stochastic systems with multiplicative noise and time-delays. Int. J. Syst. Sci. 55(10): 1993-2007 (2024) - [j19]Ziran Chen, Ziqi Cui, Hongtao Sun, Cheng Tan:
Quantized and event-triggered modeling and fault detection for networked fuzzy systems. J. Frankl. Inst. 361(7): 106780 (2024) - [j18]Ziran Chen, Ziqi Cui, Hongtao Sun, Cheng Tan:
Networked fault detection for fuzzy systems using a quantizer with event-triggered strategy. Trans. Inst. Meas. Control 46(6): 1168-1176 (2024) - [j17]Hong-Tao Sun, Chen Peng, Xiaohua Ge, Zhi Chen:
Secure Event-Triggered Sliding Control for Path Following of Autonomous Vehicles Under Sensor and Actuator Attacks. IEEE Trans. Intell. Veh. 9(1): 981-992 (2024) - [i2]Bobby Chen, Siyu Chen, Jason Dowlatabadi, Yu Xuan Hong, Vinayak Iyer, Uday Mantripragada, Rishabh Narang, Apoorv Pandey, Zijun Qin, Abrar Sheikh, Hongtao Sun, Jiaqi Sun, Matthew Walker, Kaichen Wei, Chen Xu, Jingnan Yang, Allen T. Zhang, Guoqing Zhang:
Practical Marketplace Optimization at Uber Using Causally-Informed Machine Learning. CoRR abs/2407.19078 (2024) - 2023
- [j16]Maoli Wang, Yu Sun, Hongtao Sun, Bowen Zhang:
Security Issues on Industrial Internet of Things: Overview and Challenges. Comput. 12(12): 256 (2023) - [j15]Hong-Tao Sun, Pengfei Zhang, Chen Peng:
Output-sensitive event-triggered path following control of autonomous ground vehicles under stochastic FDI attacks. J. Frankl. Inst. 360(3): 2307-2325 (2023) - [j14]Hong-Tao Sun, Chen Peng:
Event-Triggered Adaptive Security Path Following Control for Unmanned Ground Vehicles Under Sensor Attacks. IEEE Trans. Veh. Technol. 72(7): 8500-8509 (2023) - 2022
- [j13]Hong-Tao Sun, Chen Peng, Cheng Tan:
Self-discipline predictive control against large-scale packet dropouts using input delay approach. Int. J. Syst. Sci. 53(5): 934-947 (2022) - [j12]Md Musabbir Hossain, Chen Peng, Hong-Tao Sun, Shaorong Xie:
Bandwidth Allocation-Based Distributed Event-Triggered LFC for Smart Grids Under Hybrid Attacks. IEEE Trans. Smart Grid 13(1): 820-830 (2022) - [c16]Luoying Huang, Hongtao Sun, Dongxue Liu, Huiyao Pan:
Design and Application of School Management Evaluation Model for Decision-making. ICISCAE 2022: 197-201 - [c15]Hongtao Sun, Luoying Huang, Zhongjian Chen, Qinhua Zheng:
Research on collaborative filtering recommendation method of online learning resources based on learner model. ICISCAE 2022: 202-206 - 2021
- [j11]Hongtao Sun, Chen Peng, Dong Yue, Yu-Long Wang, Tengfei Zhang:
Resilient Load Frequency Control of Cyber-Physical Power Systems Under QoS-Dependent Event-Triggered Communication. IEEE Trans. Syst. Man Cybern. Syst. 51(4): 2113-2122 (2021) - 2020
- [j10]Zhiwen Wang, Xiangnan Xu, Hongtao Sun, Long Li:
Dual-terminal event triggered control for cyber-physical systems under false data injection attacks. Kybernetika 56(2): 323-339 (2020) - [j9]Chen Peng, Hongtao Sun:
Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks. IEEE Trans. Autom. Control. 65(9): 3943-3949 (2020) - [c14]Zhiwen Wang, Jiqiang Hu, Hongtao Sun:
False Data Injection Attacks in Smart Grid Using Gaussian Mixture Model. ICARCV 2020: 830-837
2010 – 2019
- 2019
- [j8]Zhiwen Wang, Long Li, Hongtao Sun, Chaoqun Zhu, Xiangnan Xu:
Dynamic Output Feedback Control of Cyber-Physical Systems Under DoS Attacks. IEEE Access 7: 181032-181040 (2019) - [j7]Hongtao Sun, Chen Peng, Weidong Zhang, Taicheng Yang, Zhiwen Wang:
Security-based resilient event-triggered control of networked control systems under denial of service attacks. J. Frankl. Inst. 356(17): 10277-10295 (2019) - [j6]Hao Zhang, Chen Peng, Hongtao Sun, Dajun Du:
Adaptive state estimation for cyber physical systems under sparse attacks. Trans. Inst. Meas. Control 41(6): 1571-1579 (2019) - [j5]Chen Peng, Hongtao Sun, Mingjin Yang, Yu-Long Wang:
A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks. IEEE Trans. Syst. Man Cybern. Syst. 49(8): 1554-1569 (2019) - 2018
- [c13]Hongtao Sun, Chen Peng:
Relaxed Event-Triggered Control of Networked Control Systems Under Denial of Service Attacks. AIMS 2018: 141-154 - 2017
- [j4]Hongtao Sun, Chen Peng, Taicheng Yang, Hao Zhang, Wangli He:
Resilient control of networked control systems with stochastic denial of service attacks. Neurocomputing 270: 170-177 (2017) - [c12]Hongtao Sun, Chen Peng, Wangli He, Zhiwen Wang:
Attack frequency estimation of networked control systems under denial of service with energy constraints. IECON 2017: 4301-4306 - [c11]Hao Zhang, Chen Peng, Hongtao Sun:
State Estimation-Based Security Control for Networked Systems Under Hybrid Attacks. LSMS/ICSEE (2) 2017: 467-476 - 2015
- [c10]Christy Vaughn, Caleb Miller, Onyebuchi Ekenta, Hongtao Sun, Medha Bhadkamkar, Petros Efstathopoulos, Erim Kardes:
Soothsayer: Predicting Capacity Usage in Backup Storage Systems. MASCOTS 2015: 208-217 - 2014
- [j3]Hongtao Sun, Li Chen:
A framework for analysing the social affordance of Web 2.0 tools. Int. J. Soc. Media Interact. Learn. Environ. 2(1): 37-59 (2014) - 2013
- [c9]Hongtao Sun, Guangming Song, Jun Zhang, Zhen Li, Yanjun Yin, Ancheng Shao, Jingyi Zhan, Meijiao Xu, Zhe Zhang:
Design of a tumbling robot that jumps and tumbles for rough terrain. ISIE 2013: 1-6 - 2012
- [j2]Hongtao Sun, Jeremy D. Buhler:
PhyLAT: a phylogenetic local alignment tool. Bioinform. 28(10): 1336-1344 (2012) - [c8]Zhiwen Wang, Hongtao Sun:
A Bandwidth Allocation Strategy Based on the Proportion of Measurement Error in Networked Control System. ICDMA 2012: 9-12 - [c7]Zhi-Wen Wang, Hong-Tao Sun:
Control and scheduling co-design of networked control system: Overview and directions. ICMLC 2012: 816-824 - [c6]Jun Zhang, Guangming Song, Zhen Li, Guifang Qiao, Hongtao Sun, Aiguo Song:
Self-righting, steering and takeoff angle adjusting for a jumping robot. IROS 2012: 2089-2094 - [c5]Guifang Qiao, Guangming Song, Jun Zhang, Hongtao Sun, Weiguo Wang, Aiguo Song:
Design of transmote: A modular self-reconfigurable robot with versatile transformation capabilities. ROBIO 2012: 1331-1336 - [c4]Guifang Qiao, Guangming Song, Jun Zhang, Hongtao Sun, Jian Ge, Weiguo Wang:
Design of a self-reconfigurable wireless network system for modular self-reconfigurable robots. ROBIO 2012: 1337-1342 - 2011
- [j1]Jun Zhang, Guangming Song, Guifang Qiao, Tianhua Meng, Hongtao Sun:
An indoor security system with a jumping robot as the surveillance terminal. IEEE Trans. Consumer Electron. 57(4): 1774-1781 (2011) - [c3]Shuang Li, Hongtao Sun, Xun Zheng:
A Case Study on Design of Teacher Peer-Coaching Activities Supported by a Web 2.0 Community. ICHL 2011: 40-50
2000 – 2009
- 2007
- [c2]Xin Li, Tian Liu, Han Peng, Liyan Qian, Hongtao Sun, Jin Xu, Ke Xu, Jiaqi Zhu:
Improved Exponential Time Lower Bound of Knapsack Problem Under BT Model. TAMC 2007: 624-631 - 2006
- [c1]Hongtao Sun, Lu Wang, Hongwei Dai:
Resource Based Solution to Teachers' Knowledge Management. ICCE 2006: 409-412 - [i1]Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu:
Improved Exponential Time Lower Bound of Knapsack Problem under BT model. CoRR abs/cs/0606064 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint