Guowei Dong

According to our database1, Guowei Dong authored at least 27 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Reduced Adaptive Fuzzy Tracking Control for High-Order Stochastic Nonstrict Feedback Nonlinear System With Full-State Constraints.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Observer-Based Adaptive Event-Triggered Control for Nonstrict-Feedback Nonlinear Systems With Output Constraint and Actuator Failures.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Event-Triggered Control for Multiagent Systems With Sensor Faults and Input Saturation.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Finite-Time Consensus Tracking Neural Network FTC of Multi-Agent Systems.
IEEE Trans. Neural Networks Learn. Syst., 2021

Prescribed Performance Consensus Fuzzy Control of Multiagent Systems With Nonaffine Nonlinear Faults.
IEEE Trans. Fuzzy Syst., 2021

Adaptive Attitude Control for Multi-MUAV Systems With Output Dead-Zone and Actuator Fault.
IEEE CAA J. Autom. Sinica, 2021

2020
Observer-based adaptive fuzzy output constrained FTC for nonlinear interconnected large-scale systems.
Sci. China Inf. Sci., 2020

2019
Adaptive Fuzzy Event-Triggered Control for Stochastic Nonlinear Systems With Full State Constraints and Actuator Faults.
IEEE Trans. Fuzzy Syst., 2019

Adaptive fuzzy control for pure-feedback systems with full state constraints and unknown nonlinear dead zone.
Appl. Math. Comput., 2019

2018
Fault detection and fuzzy tolerant control for complex stochastic multivariable nonlinear systems.
Neurocomputing, 2018

2017
Adaptive NNs Fault-Tolerant Control for Nonstrict-Feedback Nonlinear Systems.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

2016
一种基于三维树模型的源代码安全缺陷分类方法 (Novel Taxonomy of Security Weakness in Source Code Based on Three-dimension Tree Model).
计算机科学, 2016

Design and implementation of software consistency detection system based on Netty framework.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A program behavior recognition algorithm based on assembly instruction sequence similarity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A practical off-line taint analysis framework and its application in reverse engineering of file format.
Comput. Secur., 2015

2014
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

SymWalker: Symbolic Execution in Routines of Binary Code.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

TWalker: An efficient taint analysis tool.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

Analysis on Password Protection in Android Applications.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2011
Ontology Model-Based Static Analysis of Security Vulnerabilities.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Security Assurance with Metamorphic Testing and Genetic Algorithm.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

2007
An Effective Iterative Metamorphic Testing Algorithm Based on Program Path Analysis.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

2005
Automatic Test Generation for N-Way Combinatorial Testing.
Proceedings of the Quality of Software Architectures and Software Quality, 2005


  Loading...