Hongran Li

Orcid: 0000-0002-7437-7359

According to our database1, Hongran Li authored at least 26 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control.
IEEE Internet Things J., February, 2024

Modeling and Detection Scheme for Zero-Dynamics Attack on Wind Power System.
IEEE Trans. Smart Grid, January, 2024

2023
An Improved grey wolf optimizer with weighting functions and its application to Unmanned Aerial Vehicles path planning.
Comput. Electr. Eng., October, 2023

Backdoor attacks against deep reinforcement learning based traffic signal control systems.
Peer Peer Netw. Appl., January, 2023

False data injection attacks detection based on Laguerre function in nonlinear Cyber-Physical systems.
Internet Technol. Lett., 2023

Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems.
IEEE Netw. Lett., 2023

An Intrusion Detection Method Based on Hash Function for Industrial Cloud Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Joint Reflectance Field Estimation and Sparse Representation for Face Image Illumination Preprocessing and Recognition.
Neural Process. Lett., 2022

Optimal Jamming Strategy Against Two-State Switched System.
IEEE Commun. Lett., 2022

Subspace cross representation measure for robust face recognition with few samples.
Comput. Electr. Eng., 2022

Model-free predictive control of nonlinear systems under False Data Injection attacks.
Comput. Electr. Eng., 2022

Deep retinex decomposition network for underwater image enhancement.
Comput. Electr. Eng., 2022

USV Control With Adaptive Compensation Under False Data Injection Attacks.
Proceedings of the IEEE INFOCOM 2022, 2022

Optimal Jamming Strategy Against Periodically Switched Linear Discrete-Time System.
Proceedings of the 13th Asian Control Conference, 2022

2021
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper.
Inf. Sci., 2021

Singular vector sparse reconstruction for image compression.
Comput. Electr. Eng., 2021

Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Hiding Iris Biological Features with Encryption.
Proceedings of the 2021 International Conference on Security, 2021

Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

Iris Protection with Verisimilar Feature Structure.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Polynomial regressors based data-driven control for autonomous underwater vehicles.
Peer-to-Peer Netw. Appl., 2020

Subspace transform induced robust similarity measure for facial images.
Frontiers Inf. Technol. Electron. Eng., 2020

Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

2019
Optimizing Time-series Prediction on China's Green Trade Economy.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Iris biometric feature hidden based on chaotic encryption.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive Control.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019


  Loading...