default search action
Lei Ma 0013
Person information
- affiliation: China University of Mining and Technology, School of information and control engineering, Xuzhou, China
- affiliation (PhD 2019): Nanjing University of Science and Technology, School of Automation, China
Other persons with the same name
- Lei Ma — disambiguation page
- Lei Ma 0001 — Beijing Institute of Technology, China
- Lei Ma 0002 — Arizona State University, Department of Electrical Engineering, Tempe, AZ, USA
- Lei Ma 0003 — University of Alberta, Canada (and 4 more)
- Lei Ma 0004 — University of Electronic Science and Technology of China, School of Electronic Engineering, the Intelligent Visual Information Processing and Communication Laboratory, Chengdu, China
- Lei Ma 0005 — Nanjing University, Jiangsu Provincial Key Laboratory of Geographic Information Science and Technology, China
- Lei Ma 0006 — University of Tokyo, Graduate School of Engineering, Japan
- Lei Ma 0007 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Lei Ma 0008 — National Biomedical Imaging Center, College of Future Technology, Peking University, Beijing, China (and 7 more)
- Lei Ma 0009 — University of Leeds, UK
- Lei Ma 0010 — Kunming University of Science and Technology, Kunming, China
- Lei Ma 0011 — Beijing Polytechnic, Beijing, China
- Lei Ma 0012 — Queen's University Belfast, Belfast, UK
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Yao Xu, Linna Zhou, Jianguo Zhao, Lei Ma, Chunyu Yang:
Direct Data-Driven Optimal Set-Point Tracking Control of Linear Discrete-Time Systems. IEEE Trans. Circuits Syst. II Express Briefs 71(8): 3795-3799 (2024) - [j18]Ying Zhang, Lei Ma, Chunyu Yang, Guoqing Wang, Wei Dai:
Asynchronous Event-Triggered Control for Two-Time-Scale CPSs With Dual-Scale Channel: Dealing With Hybrid Attacks. IEEE Trans. Control. Netw. Syst. 11(2): 999-1011 (2024) - 2023
- [j17]Lei Ma, Ying Zhang, Zhixuan Su, Chunyu Yang, Chenxiao Cai:
Event-triggered consensus control for a class of two-time-scale multi-agent systems. Int. J. Control 96(4): 975-986 (2023) - [j16]Yao Xu, Chunyu Yang, Linna Zhou, Lei Ma, Song Zhu:
Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit. Neural Networks 166: 11-21 (2023) - [j15]Ying Zhang, Lei Ma, Chunyu Yang, Linna Zhou, Guoqing Wang, Wei Dai:
Formation Control for Multiple Quadrotors Under DoS Attacks via Singular Perturbation. IEEE Trans. Aerosp. Electron. Syst. 59(4): 4753-4762 (2023) - [j14]Guoqing Wang, Jiaxiang Zhao, Chunyu Yang, Lei Ma, Xiaoxiao Fan, Wei Dai:
Robust Kalman Filter for Systems With Colored Heavy-Tailed Process and Measurement Noises. IEEE Trans. Circuits Syst. II Express Briefs 70(11): 4256-4260 (2023) - [j13]Lei Ma, Chunyu Yang, Guoqing Wang, Wei Dai, Chenxiao Cai:
H∞ Control for a Class of Two-Time-Scale Cyber-Physical Systems: An Asynchronous Dynamic Event-Triggered Protocol. IEEE Trans. Cybern. 53(8): 5013-5023 (2023) - [j12]Lei Ma, Zhong Chu, Chunyu Yang, Guoqing Wang, Wei Dai:
Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS. IEEE Trans. Inf. Forensics Secur. 18: 1709-1719 (2023) - [j11]Chunyu Yang, Zhong Chu, Lei Ma, Guoqing Wang, Wei Dai:
Joint Watermarking-Based Replay Attack Detection for Industrial Process Operation Optimization Cyber-Physical Systems. IEEE Trans. Ind. Informatics 19(8): 8910-8922 (2023) - 2022
- [j10]Guoqing Wang, Chunyu Yang, Lei Ma, Wei Dai:
Centralized and Distributed Robust State Estimation Over Sensor Networks Using Elliptical Distribution. IEEE Internet Things J. 9(21): 21825-21837 (2022) - [j9]Yifang Yan, Chunyu Yang, Lei Ma, Linna Zhou:
Asynchronous event-triggered H... control problem for two-time-scale systems based on double-rate sampled-data. J. Frankl. Inst. 359(16): 8848-8868 (2022) - [j8]Ying Zhang, Lei Ma, Chunyu Yang, Wei Dai:
Reinforcement Learning-Based Sliding Mode Tracking Control for the Two-Time-Scale Systems: Dealing With Actuator Attacks. IEEE Trans. Circuits Syst. II Express Briefs 69(9): 3819-3823 (2022) - [j7]Lei Ma, Hongyu Liu, Linna Zhou, Chunyu Yang, Wei Dai, Guoqing Wang:
Security Control for Multi-Time-Scale CPSs Under DoS Attacks: An Improved Dynamic Event-Triggered Mechanism. IEEE Trans. Netw. Sci. Eng. 9(3): 1813-1826 (2022) - [c2]Ying Zhang, Lei Ma, Chunyu Yang, Linna Zhou:
Formation Control for Quadrotor Swarms with Deception Attacks Via Singular Perturbation. ROBIO 2022: 189-194 - 2021
- [j6]Lei Ma, Ying Zhang, Chunyu Yang, Linna Zhou:
Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: The input-to-state stability. J. Frankl. Inst. 358(12): 6309-6325 (2021) - [j5]Ying Zhang, Lei Ma, Guoqing Wang, Chunyu Yang, Linna Zhou, Wei Dai:
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case. IEEE Trans. Netw. Sci. Eng. 8(4): 3369-3379 (2021) - [j4]Lei Ma, Zidong Wang, Chenxiao Cai, Fuad E. Alsaadi:
A Dynamic Event-Triggered Approach to H∞ Control for Discrete-Time Singularly Perturbed Systems With Time-Delays and Sensor Saturations. IEEE Trans. Syst. Man Cybern. Syst. 51(11): 6614-6625 (2021) - 2020
- [j3]Linna Zhou, Jianguo Zhao, Lei Ma, Chunyu Yang:
Decentralized composite suboptimal control for a class of two-time-scale interconnected networks with unknown slow dynamics. Neurocomputing 382: 71-79 (2020) - [j2]Lei Ma, Zidong Wang, Chenxiao Cai, Fuad E. Alsaadi:
Dynamic Event-Triggered State Estimation for Discrete-Time Singularly Perturbed Systems With Distributed Time-Delays. IEEE Trans. Syst. Man Cybern. Syst. 50(9): 3258-3268 (2020) - [c1]Biao Zheng, Chenxiao Cai, Lei Ma:
CT images segmentation method of rectal tumor based on modified U-net. ICARCV 2020: 672-677
2010 – 2019
- 2016
- [j1]Chunyu Yang, Lei Ma, Xiaoping Ma, Xuesong Wang:
Stability analysis of singularly perturbed control systems with actuator saturation. J. Frankl. Inst. 353(6): 1284-1296 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint