default search action
Yuanqing Qin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin:
Composite Finite-Time Resilient Control for Cyber-Physical Systems Subject to Actuator Attacks. IEEE Trans. Cybern. 53(2): 1063-1077 (2023) - 2022
- [j26]Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xiaoya Hu:
$L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. IEEE Trans. Netw. Sci. Eng. 9(2): 648-659 (2022) - 2021
- [j25]Yue Zhao, Ze Chen, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin:
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems. IEEE CAA J. Autom. Sinica 8(8): 1440-1450 (2021) - [j24]Yuanqing Qin, Yue Zhao, Kaixing Huang, Yu-Chu Tian, Chunjie Zhou:
Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks. Int. J. Syst. Sci. 52(4): 821-831 (2021) - [j23]Yuanqing Qin, Yuan Peng, Kaixing Huang, Chunjie Zhou, Yu-Chu Tian:
Association Analysis-Based Cybersecurity Risk Assessment for Industrial Control Systems. IEEE Syst. J. 15(1): 1423-1432 (2021) - 2020
- [j22]Qianxiang Zhu, Yuanqing Qin, Yue Zhao, Chunjie Zhou:
A hierarchical colored Petri net-based cyberattacks response strategy making approach for critical infrastructures. Int. J. Distributed Sens. Networks 16(1) (2020) - [j21]Kaixing Huang, Chunjie Zhou, Yuanqing Qin, Weixun Tu:
A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 67(3): 2371-2379 (2020) - [j20]Yuanqing Qin, Qi Zhang, Chunjie Zhou, Naixue Xiong:
A Risk-Based Dynamic Decision-Making Approach for Cybersecurity Protection in Industrial Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 50(10): 3863-3870 (2020)
2010 – 2019
- 2019
- [j19]Qianxiang Zhu, Yuanqing Qin, Chunjie Zhou, Li Fei:
Hierarchical Flow Model-Based Impact Assessment of Cyberattacks for Critical Infrastructures. IEEE Syst. J. 13(4): 3944-3955 (2019) - [j18]Xuan Li, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin:
A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems. IEEE Trans. Ind. Informatics 15(5): 2544-2554 (2019) - [j17]Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xinjue Junping:
A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems. IEEE Trans. Syst. Man Cybern. Syst. 49(8): 1720-1730 (2019) - 2018
- [j16]Qianxiang Zhu, Yuanqing Qin, Chunjie Zhou, Weiwei Gao:
Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems. Int. J. Distributed Sens. Networks 14(6) (2018) - [j15]Kaixing Huang, Chunjie Zhou, Yu-Chu Tian, Shuang-Hua Yang, Yuanqing Qin:
Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 65(10): 8153-8162 (2018) - [j14]Xuan Li, Chunjie Zhou, Yu-Chu Tian, Naixue Xiong, Yuanqing Qin:
Asset-Based Dynamic Impact Assessment of Cyberattacks for Risk Analysis in Industrial Control Systems. IEEE Trans. Ind. Informatics 14(2): 608-618 (2018) - [j13]Qi Zhang, Chunjie Zhou, Yu-Chu Tian, Naixue Xiong, Yuanqing Qin, Bowen Hu:
A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems. IEEE Trans. Ind. Informatics 14(6): 2497-2506 (2018) - 2017
- [j12]Kaixing Huang, Qi Zhang, Chunjie Zhou, Naixue Xiong, Yuanqing Qin:
An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning. IEEE Trans. Syst. Man Cybern. Syst. 47(10): 2704-2713 (2017) - 2016
- [j11]Shuang Huang, Chunjie Zhou, Lili Yang, Yuanqing Qin, Xiongfeng Huang, Bowen Hu:
Transient fault tolerant control for vehicle brake-by-wire systems. Reliab. Eng. Syst. Saf. 149: 148-163 (2016) - [j10]Shuang Huang, Chunjie Zhou, Naixue Xiong, Shuang-Hua Yang, Yuanqing Qin, Qi Zhang:
A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems. IEEE Trans. Syst. Man Cybern. Syst. 46(8): 1021-1035 (2016) - [j9]Qi Zhang, Chunjie Zhou, Naixue Xiong, Yuanqing Qin, Xuan Li, Shuang Huang:
Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 46(10): 1429-1444 (2016) - 2015
- [j8]Shuang Huang, Chunjie Zhou, Shuang-Hua Yang, Yuanqing Qin:
Cyber-physical system security for networked industrial processes. Int. J. Autom. Comput. 12(6): 567-578 (2015) - [j7]Yuanqing Qin, Fang Wang, Chunjie Zhou:
A Distributed UWB-based Localization System in Underground Mines. J. Networks 10(3): 134-140 (2015) - [j6]Chunjie Zhou, Xiongfeng Huang, Naixue Xiong, Yuanqing Qin, Shuang Huang:
A Class of General Transient Faults Propagation Analysis for Networked Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 45(4): 647-661 (2015) - [j5]Chunjie Zhou, Shuang Huang, Naixue Xiong, Shuang-Hua Yang, Huiyun Li, Yuanqing Qin, Xuan Li:
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation. IEEE Trans. Syst. Man Cybern. Syst. 45(10): 1345-1360 (2015) - 2014
- [j4]Fang Wang, Yuanqing Qin, Tonghui Qian, Qi Zhang:
A Newton Iteration Based WSN Localization System in Underground Tunnels. J. Networks 9(11): 2971-2980 (2014) - 2012
- [j3]Chunjie Zhou, Yu-Feng Shi, Shuang-Hua Yang, Quan Yin, Yuanqing Qin:
Characteristic Model-Based Adaptive Discrete-Time Sliding Mode Control for the Swing Arm in a Fourier Transform Spectrometer. IEEE Trans. Syst. Man Cybern. Part C 42(6): 1633-1643 (2012) - 2011
- [j2]Chunjie Zhou, Hui Chen, Yuanqing Qin, Yu-Feng Shi, Guangcan Yu:
Self-organization of reconfigurable protocol stack for networked control systems. Int. J. Autom. Comput. 8(2): 221-235 (2011) - [j1]Xiongfeng Huang, Chunjie Zhou, Yuanqing Qin, Ye Wang, Mingyue Yang:
Transient Fault Tolerance and System Safety Enhancement Based on System Theory. J. Softw. 6(10): 2082-2089 (2011) - 2010
- [c1]Hui Chen, Chunjie Zhou, Yuanqing Qin, Art Vandenberg, Athanasios V. Vasilakos, Naixue Xiong:
Petri Net Modeling of the Reconfigurable Protocol Stack for Cloud Computing Control Systems. CloudCom 2010: 393-400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint