Zhenyou Wang

Orcid: 0000-0002-5483-1681

According to our database1, Zhenyou Wang authored at least 20 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Observer-Based Neural Control of N-Link Flexible-Joint Robots.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

Semi-supervised fuzzy clustering algorithm based on prior membership degree matrix with expert preference.
Expert Syst. Appl., March, 2024

2023
Adaptive Fixed-Time Control of Nonlinear MASs With Actuator Faults.
IEEE CAA J. Autom. Sinica, May, 2023

2022
Cross-Enhancement Transformer for Action Segmentation.
CoRR, 2022

2021
A Robust Blade Profile Feature Parameter Identifying Method.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

2018
Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity.
Comput. J., 2018

2017
Solution algorithms for the number of tardy jobs minimisation scheduling with a time-dependent learning effect.
Int. J. Prod. Res., 2017

A Bicriteria Approach for Single Machine Scheduling with Resource Allocation, Learning Effect and a Deteriorating Maintenance Activity.
Asia Pac. J. Oper. Res., 2017

Quantized feedback fuzzy sliding mode control design via memory-based strategy.
Appl. Math. Comput., 2017

2016
Single Machine Two-Agent Scheduling with Deteriorating Jobs.
Asia Pac. J. Oper. Res., 2016

Permutation Flow Shop Problem with Shortening Job Processing Times.
Asia Pac. J. Oper. Res., 2016

2015
Cell recognition based on topological sparse coding for microscopy imaging of focused ultrasound treatment.
BMC Medical Imaging, 2015

2014
Exploiting a Modified Gray Model in Back Propagation Neural Networks for Enhanced Forecasting.
Cogn. Comput., 2014

2012
On Generic Construction for Private Designated Verifier Signatures.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

One-round Tripartite Authenticated Batch-Keys Agreement Protocol from Paring.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2010
Two-dimensional Sparse Principal Component Analysis: A new technique for feature extraction.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Performance Analysis Based on Transform Matrix of MLE in CICA.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Prediction Discrete Data Used BP Network Based on AGO.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Perfect Subliminal Channel in a Paring-Based Digital Signature.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Efficient Threshold Signature Scheme Without Random Oracles.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...