Linna Zhou

Orcid: 0009-0004-0727-2436

According to our database1, Linna Zhou authored at least 86 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Optimal Output Regulation of Interconnected Singularly Perturbed Systems with Application to Power Systems.
IEEE CAA J. Autom. Sinica, March, 2024

Reinforcement Learning Reduced H<sub>∞</sub> Output Tracking Control of Nonlinear Two-Time-Scale Industrial Systems.
IEEE Trans. Ind. Informatics, February, 2024

2023
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition.
J. Inf. Secur. Appl., November, 2023

Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit.
Neural Networks, September, 2023

Reinforcement Learning and Optimal Control of PMSM Speed Servo System.
IEEE Trans. Ind. Electron., August, 2023

Formation Control for Multiple Quadrotors Under DoS Attacks via Singular Perturbation.
IEEE Trans. Aerosp. Electron. Syst., August, 2023

Reversible data hiding using a transformer predictor and an adaptive embedding strategy.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Neural-Network-Based Adaptive Control of Uncertain MIMO Singularly Perturbed Systems With Full-State Constraints.
IEEE Trans. Neural Networks Learn. Syst., July, 2023

Multi-dimensional hypercomplex continuous orthogonal moments for light-field images.
Expert Syst. Appl., May, 2023

FSFM: A Feature Square Tower Fusion Module for Multimodal Object Detection.
IEEE Trans. Instrum. Meas., 2023

Unearthing Common Inconsistency for Generalisable Deepfake Detection.
CoRR, 2023

Facial Parameter Splicing: A Novel Approach to Efficient Talking Face Generation.
Proceedings of the ACM Multimedia Asia 2023, 2023

Efficient Chinese Relation Extraction with Multi-entity Dependency Tree Pruning and Path-Fusion.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Fixing Domain Bias for Generalized Deepfake Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Adaptive Dynamic Programming and Decentralized Optimal Output Regulation of Two-Time-Scale Interconnected Systems.
Proceedings of the 12th International Conference on Control, 2023

2022
Security Control for Multi-Time-Scale CPSs Under DoS Attacks: An Improved Dynamic Event-Triggered Mechanism.
IEEE Trans. Netw. Sci. Eng., 2022

Reinforcement Learning and Optimal Setpoint Tracking Control of Linear Systems With External Disturbances.
IEEE Trans. Ind. Informatics, 2022

Fake Face Images Detection and Identification of Celebrities Based on Semantic Segmentation.
IEEE Signal Process. Lett., 2022

Protecting World Leader Using Facial Speaking Pattern Against Deepfakes.
IEEE Signal Process. Lett., 2022

Incremental learning paradigm with privileged information for random vector functional-link networks: IRVFL+.
Neural Comput. Appl., 2022

Asynchronous event-triggered H... control problem for two-time-scale systems based on double-rate sampled-data.
J. Frankl. Inst., 2022

Intermediate-Layer Transferable Adversarial Attack With DNN Attention.
IEEE Access, 2022

Formation Control for Quadrotor Swarms with Deception Attacks Via Singular Perturbation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

2021
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case.
IEEE Trans. Netw. Sci. Eng., 2021

Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack.
Secur. Commun. Networks, 2021

Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: The input-to-state stability.
J. Frankl. Inst., 2021

Event-triggered H ∞ filtering for singularly perturbed systems with external disturbance.
Int. J. Syst. Sci., 2021

A Novel Equivalent Input Disturbance-Based Adaptive Sliding Mode Control for Singularly Perturbed Systems.
IEEE Access, 2021

Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Reversible Data Hiding Based on Improved Block Selection Strategy and Pixel Value Ordering.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Decentralized composite suboptimal control for a class of two-time-scale interconnected networks with unknown slow dynamics.
Neurocomputing, 2020

Border following-based reversible watermarking algorithm for images with resistance to histogram overflowing.
Int. J. Distributed Sens. Networks, 2020

Reversible data hiding based on improved rhombus predictor and prediction error expansion.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Reversible Data Hiding Algorithm with High Imperceptibility Based on Histogram Shifting.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

A High Capacity Reversible Watermarking Algorithm Based on Block-Level Prediction Error Histogram Shifting.
Proceedings of the AIPR 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, 2020

2019
Passivity-Based Integral Sliding Mode Control and $\varepsilon$ - Bound Estimation for Uncertain Singularly Perturbed Systems With Disturbances.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

Disturbance-observer based sliding mode control for fuzzy singularly perturbed systems.
J. Intell. Fuzzy Syst., 2019

Integral Sliding Mode Control for Singularly Perturbed Systems with Mismatched Disturbances.
Circuits Syst. Signal Process., 2019

Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System.
IEEE Access, 2019

Information Hiding Based on Typing Errors.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Study of Chinese Text Steganography using Typos.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Anti-windup control for nonlinear singularly perturbed switched systems with actuator saturation.
Int. J. Syst. Sci., 2018

Sampled-data H∞ filtering for Markovian jump singularly perturbed systems with time-varying delay and missing measurements.
Int. J. Syst. Sci., 2018

Global asymptotic stability analysis of two-time-scale competitive neural networks with time-varying delays.
Neurocomputing, 2018

A Dynamic Online Protection Framework for Android Applications.
Comput. Syst. Sci. Eng., 2018

Model-Free Composite Control of Flexible Manipulators Based on Adaptive Dynamic Programming.
Complex., 2018

Disturbance Observer-Based Integral Sliding Mode Control for Singularly Perturbed Systems With Mismatched Disturbances.
IEEE Access, 2018

An Adaptive-Gain Sliding Mode Observer for Sensorless Control of Permanent Magnet Linear Synchronous Motors.
IEEE Access, 2018

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Detecting Technology of Network Storage Covert Channel Based on OPTICS Algorithm.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Technol., 2017

H<sub>∞</sub> sampled-data control for T-S fuzzy singularly perturbed systems with actuator saturation.
J. Intell. Fuzzy Syst., 2017

Finite-time control of linear systems subject to time-varying disturbances.
IMA J. Math. Control. Inf., 2017

Attention-based LSTM-CNNs for uncertainty identification on Chinese social media texts.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Sampled-data control for singularly perturbed systems with actuator saturation.
Proceedings of the 2017 American Control Conference, 2017

2016
A dual fragile watermarking scheme for speech authentication.
Multim. Tools Appl., 2016

H<sub>∞</sub> Control and ε-Bound Estimation of Discrete-Time Singularly Perturbed Systems.
Circuits Syst. Signal Process., 2016

Controller design for T-S fuzzy singularly perturbed switched systems.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

2015
Self-Embedding Watermarking Scheme Based on MDS Codes.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Dual tree complex wavelet transform approach to copy-rotate-move forgery detection.
Sci. China Inf. Sci., 2014

Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Binary Code Reranking Method Based on Bit Importance.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Forensics of image tampering based on the consistency of illuminant chromaticity.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

2013
Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers.
KSII Trans. Internet Inf. Syst., 2013

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
Algorithm of identifying opinion leaders in BBS.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011

Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Observers for descriptor systems with slope-restricted nonlinearities.
Int. J. Autom. Comput., 2010

2009
Text Steganography Based on Online Chat.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Strongly absolute stability problem of descriptor systems: Circle criterion.
J. Frankl. Inst., 2008

Practical stability analysis and synthesis of linear descriptor systems with disturbances.
Int. J. Autom. Comput., 2008

2007
Positive Realness and Absolute Stability Problem of Descriptor Systems.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

Strongly Absolute Stability Problem of Descriptor Systems.
Informatica, 2007

Blur Detection of Digital Forgery Using Mathematical Morphology.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Practical stability of descriptor systems with time delays in terms of two measurements.
J. Frankl. Inst., 2006

Practical stability of closed-loop descriptor systems.
Int. J. Syst. Sci., 2006

Information Hiding Method in Digital Audio Signal Based on Perfect Codes.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A New Watermarking Protocol of Copyright Protection.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Research on Steganography Method Based on Error-Correcting Codes.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Focus on the Generalized Information Hiding Technology.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Practical Stability Analysis and Synthesis of a Class of Uncertain T-S Fuzzy Systems.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
A Secure Steganographic Scheme in Binary Image.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005


  Loading...