Search

Your search keyword '"Su, Rong"' showing total 2,626 results

Search Constraints

Start Over You searched for: Author "Su, Rong" Remove constraint Author: "Su, Rong"
2,626 results on '"Su, Rong"'

Search Results

1. Integrated User Matching and Pricing in Round-Trip Car-Sharing

2. Why Studying Cut-ins? Comparing Cut-ins and Other Lane Changes Based on Naturalistic Driving Data

6. On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers

11. STGIN: A Spatial Temporal Graph-Informer Network for Long Sequence Traffic Speed Forecasting

12. Synergistic antitumor activity of baicalein combined with almonertinib in almonertinib-resistant non-small cell lung cancer cells through the reactive oxygen species-mediated PI3K/Akt pathway

13. Dense-TNT: Efficient Vehicle Type Classification Neural Network Using Satellite Imagery

14. A SUMO Framework for Deep Reinforcement Learning Experiments Solving Electric Vehicle Charging Dispatching Problem

15. AST-GIN: Attribute-Augmented Spatial-Temporal Graph Informer Network for Electric Vehicle Charging Station Availability Forecasting

16. Distributed Dynamic Platoons Control and Junction Crossing Optimization for Mixed Traffic Flow in Smart Cities- Part II. Stability, Optimization, and Performance Analysis

17. Distributed Dynamic Platoons Control and Junction Crossing Optimization for Mixed Traffic Flows in Smart Cities- Part I. Fundamentals, Theoretical and Automatic Decision Framework

18. Distributed Observers-based Cooperative Platooning Tracking Control and Intermittent Optimization for Connected Automated Vehicles with Unknown Jerk Dynamics

19. Distributed Cooperative Control and Optimization of Connected Automated Vehicles Platoon Against Cut-in Behaviors of Social Drivers

20. Supervisor Obfuscation Against Covert Actuator Attackers

21. Interpretable Fault Diagnosis of Rolling Element Bearings with Temporal Logic Neural Network

22. Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations

23. Identification of System Vulnerability under a Smart Sensor Attack via Attack Model Reduction

30. A Topological Approach for Computing Supremal Sublanguages for Some Language Equations in Supervisory Control Theory

31. Nash equilibrium of multi-agent graphical game with a privacy information encrypted learning algorithm

33. Retrieval & Interaction Machine for Tabular Data Prediction

42. Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations

43. AutoFT: Automatic Fine-Tune for Parameters Transfer Learning in Click-Through Rate Prediction

44. Dual Graph enhanced Embedding Neural Network for CTR Prediction

45. Optimal Estimator Design and Properties Analysis for Interconnected Systems with Asymmetric Information Structure

46. Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder

47. Distributed Eco-Driving Algorithm of Vehicle Platoon Using Traffic Light and Road Slope Information

48. Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction

50. Phylogeny of genus Sichuana Shen & Yin, 2020 (Orthoptera, Tettigoniidae, Tettigoniinae) with four new species from Sichuan, China

Catalog

Books, media, physical & digital resources