Hui Li

ORCID: 0000-0002-5413-2012
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Neural Networks Stability and Synchronization
  • Fractional Differential Equations Solutions
  • Nonlinear Differential Equations Analysis
  • Differential Equations and Numerical Methods
  • Stability and Control of Uncertain Systems
  • Network Security and Intrusion Detection
  • Advanced Mathematical Modeling in Engineering
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Neural Networks and Applications
  • Distributed Control Multi-Agent Systems
  • Advanced Control Systems Design
  • Stability and Controllability of Differential Equations
  • Numerical methods for differential equations
  • Advanced Memory and Neural Computing
  • Advanced Computational Techniques and Applications
  • Cryptography and Data Security
  • Multi-Criteria Decision Making
  • Nonlinear Dynamics and Pattern Formation
  • Cooperative Communication and Network Coding
  • Meromorphic and Entire Functions
  • Advanced Differential Equations and Dynamical Systems
  • Advanced Image Processing Techniques
  • stochastic dynamics and bifurcation
  • Numerical Methods and Algorithms
  • Privacy-Preserving Technologies in Data

Tobacco Research Institute
2025

Harbin Institute of Technology
2005-2024

Changchun University of Technology
2010-2024

Liaoning University of Technology
2024

Xidian University
2019-2024

Jiangsu University of Technology
2024

China University of Mining and Technology
2023

Tsinghua University
2023

University of Electronic Science and Technology of China
2006-2022

Shanghai Institute of Materia Medica
2021

This paper discusses the fuzzy adaptive consensus secure control problem for a class of stochastic nonlinear multi-agent systems (MASs) with unknown false data injection attacks. Fuzzy logic (FLSs) are used to model functions. A distributed filter is proposed obtain information leader since leaders only available partial agents. To deal virtual time-varying gains caused by attacks, an compensation method developed via re-codesigning controllers. Based on backstepping methodology and bounded...

10.1080/00207721.2024.2304121 article EN International Journal of Systems Science 2024-01-23

As a generation of the real-valued neural network (RVNN), complex-valued (CVNN) is based on (CV) parameters and variables. The fractional-order (FO) CVNN with linear impulses fixed time delays discussed. By using sign function, Banach point theorem, two classes activation functions, some criteria uniform stability for solution existence uniqueness equilibrium are derived. Finally, three experimental simulations presented to illustrate correctness effectiveness obtained results.

10.1109/tnnls.2021.3070136 article EN IEEE Transactions on Neural Networks and Learning Systems 2021-04-14

10.1109/jstars.2025.3543827 article EN cc-by IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025-01-01

Due to the limitation of firewall and intrusion detection system in information security domain, prevention (IPS) appeared. It is a new generation technology following technique. also secure product that protects network real time from attacking, now becomes hotspot research domain. This article mainly focuses on support vector machine (SVM) applying Snort system, then implements small scale intelligent by combining firewall.

10.1109/cmce.2010.5610483 article EN International Conference on Computer, Mechatronics, Control and Electronic Engineering 2010-08-01

无证书签密密钥封装机制(CLSC-KEM)与数据封装机制共同构成无证书混合签密方案。该文提出一个新的概念:无证书体制下的多接收者签密密钥封装机制(mCLSC-KEM)。给出了mCLSC-KEM的定义以及安全模型,并构造了一个具体的方案。该方案比一般性构造(对每个接收者分别运行CLSC-KEM)高效很多,其密钥封装仅需计算1个双线性对,且对应的数据封装仅需运行1次对称加密,而一般性构造需计算n个双线性对和n次数据封装(设n个接收者)。在随机预言模型下,基于Gap双线性Diffie-Hellman问题,该文的方案是可证明安全的。

10.3724/sp.j.1146.2009.01260 article ZH-CN cc-by JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2010-12-02

The stability of fractional-order (FO) nonlinear system with state-dependent delays (SDDs) is investigated. Unlike the usual time-dependent delays, (SD) make size relative to states, which makes uncertain when historical state information would be used. A Lemma on Riemann-Liouville derivative first given ensure monotonicity considered function. Then, based Lyapunov method, several sufficient criteria are presented guarantee Mittag-Leffler discussed systems. In end, three examples applied...

10.1109/tcsi.2022.3142765 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2022-02-21

Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Transform) SURF ( Speeded-Up Robust Features ) algorithm. This describes principle algorithm respectively. The performance are compared for corresponding points computing time precision. algorithm's perform extracting angular was worst, lowest effectiveness finding points. presents its...

10.1109/cisp.2011.6100279 article EN 2011-10-01

This paper is devoted to prove the existence of optimal interval where Green's function negative definite. The left and right endpoints are found. Then, a new principle comparison third-order differential equation es- tablished. As an application our results, solvability non-conjugate boundary value problem discussed.

10.14232/ejqtde.2015.1.21 article EN cc-by Electronic journal of qualitative theory of differential equations 2015-01-01

Generative adversarial networks (GANs) are an unsupervised generative model that learns data distribution through training. However, recent experiments indicated GANs difficult to train due the requirement of optimization in high dimensional parameter space and zero gradient problem. In this work, we propose a self-sparse network (Self-Sparse GAN) reduces alleviates Self-Sparse GAN, design self-adaptive sparse transform module (SASTM) comprising sparsity decomposition feature-map...

10.26599/air.2022.9150005 article EN cc-by CAAI Artificial Intelligence Research 2022-08-27

The fractional-order (FO) nonlinear differential system with state-dependent (SD) delayed impulses (DI) is considered in this brief. are related to the state of and delays SD. A novel lemma for monotonicity solution Caputo's FO derivative equation given. By means linear matrix inequality (LMI) several comparative arguments, criteria uniform stability, asymptotical Mittag-Leffler stability obtained. Compared other works on integer-order (IO) impulsive systems SD or fixed delays, how impose...

10.1109/tnnls.2023.3291210 article EN IEEE Transactions on Neural Networks and Learning Systems 2023-07-26

The space‐time spectral collocation method was initially presented for the 1‐dimensional sine‐Gordon equation. In this article, we introduce a solving 2‐dimensional nonlinear Riesz space fractional diffusion equations. is based on Legendre‐Gauss‐Lobatto discretizing spatial and time first‐order system of ordinary differential Optimal priori error estimates in L 2 norms semidiscrete formulation uniqueness approximate solution are derived. has accuracy both time, numerical results confirm statement.

10.1002/mma.5124 article EN Mathematical Methods in the Applied Sciences 2018-06-14

Enterprise marketing has the characteristics of importance and distribution, so a distributed intelligent decision support system is needed to decision. On basis sufficiently analyzing necessity feasibility for using multi-intelligent-agent technology develop system, this paper designs three-layer structure composed customer layer, core layer resource layer. Then article discusses information flow between agents puts forward utilize communication mechanism based on messages cooperation...

10.1109/icmlc.2004.1380663 article EN 2005-02-22

This paper is dedicated to exploring the global Mittag-Leffler stability of fractional-order complex-valued (CV) neural networks (NNs) with asynchronous time delays, which generates exponential integer-order (IO) CVNNs. Here, delays mean that there are different in nodes. Two new inequalities concerning product two functions and one novel lemma on a fractional derivative given rigorous theoretical proof. By utilizing three norms, several conditions concluded guarantee existence uniqueness an...

10.1063/5.0059887 article EN Chaos An Interdisciplinary Journal of Nonlinear Science 2021-11-01

摘要: 寻求专利保护是企业发展的基本专利战略。一类由互补性专利组成的伞型专利组合是通过挖掘同一产品系统存在或潜在的更多技术问题而形成的具有互补技术特征的系列专利方案,通过更大的专利权利保护范围实现对同一产品系统的全方位保护。预期失效分析(Antucupatory failure determination, AFD)作为在发明问题解决算法(Algorithm for inventive-problem solving,...

10.3901/jme.2016.05.001 article ZH-CN Journal of Mechanical Engineering 2016-01-01

This paper is concerned with the problem of $H_{\infty}$ state estimation for a class delayed static neural networks. The purpose to design delay-dependent estimator such that dynamics error system globally exponentially stable prescribed performance. Some improved conditions are established by using delay partitioning method and free-matrix-based integral inequality. gain matrix optimal performance index obtained via solving convex optimization subject LMIs (linear inequality). Numerical...

10.1186/s13662-016-1056-3 article EN cc-by Advances in Difference Equations 2017-01-16

According to the tedious design conditions and difficulty determine optimal plan in underground foundation engineering field at present, genetic algorithm was proposed applied into of conventional reinforced concrete strip foundation.The coding method, operation procedure penalty function were improved according specific issues.The project cost selected as objective function, bending resistance, shearing resistance detailing requirements ruled by specification constraint condition,...

10.2174/1874110x01509010335 article EN The Open Cybernetics & Systemics Journal 2015-05-29

Abstract Let $f(z)=\sum\limits_{j=0}^{\infty} a_j z^j$ be a transcendental entire function and let $f_\omega(z)=\sum\limits_{j=0}^{\infty}\chi_j(\omega) random function, where $\chi_j(\omega)$ are independent identically distributed variables defined on probability space $(\Omega, \mathcal{F}, \mu)$ . In this paper, we first define family of functions, which includes Gaussian, Rademacher Steinhaus functions. We prove that, for almost all functions in the any constant C > 1, there exist...

10.1017/s0013091523000639 article EN Proceedings of the Edinburgh Mathematical Society 2023-10-19

Network coding in cyclic networks meets more problems than acyclic networks. Recently, S.-Y.R.Li et al.proposed a framework of convolutional network (CNC) as well its four properties for with theoretic fundamentals discrete valuation ring (DVR). The properties, multicast (CM), broadcast (CB), dispersion (CD) and basic code (BCNC), are notions increasing strength this order regard to linear independence among the global encoding kernels. existence BCNC then implies ofthe rest. That is, is...

10.1109/icis.2009.52 article EN 2009-01-01

We propose a spot-size converter (SSC) by exploiting the high-efficiency mode conversion capability that long-period grating (LPG) possesses. Our proof-of-concept LPG-based SSC, fabricated with optical polymer material on silicon nitride (Si <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">3</sub> N xmlns:xlink="http://www.w3.org/1999/xlink">4</sub> ) platform, has length of ∼700 μm, can improve coupling efficiency between LP <italic...

10.1109/jphot.2022.3157946 article EN cc-by IEEE photonics journal 2022-03-09
Coming Soon ...