The following pages link to Xiao Jun Zhang (Q1953659):
Displaying 50 items.
- (Q281172) (redirect page) (← links)
- Random birth-and-death networks (Q281175) (← links)
- Simulation of multiphase flow of the oil-water separation in a rotating packed bed for oil purification (Q473591) (← links)
- (Q546486) (redirect page) (← links)
- Semi-supervised classification based on Gaussian mixture model for remote imagery (Q546488) (← links)
- Lattice BGK model simulation of asymmetric flow inside a continuous slab casting mold (Q620180) (← links)
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem (Q1640410) (← links)
- A new result on stability analysis for discrete system with interval time-varying delays (Q1739835) (← links)
- Finite 1-regular Cayley graphs of valency 5 (Q1953660) (← links)
- Further results on finite-time synchronization of delayed inertial memristive neural networks via a novel analysis method (Q1982401) (← links)
- New reliable nonuniform sampling control for uncertain chaotic neural networks under Markov switching topologies (Q2008500) (← links)
- New fractional-order integral inequalities: application to fractional-order systems with time-varying delay (Q2027426) (← links)
- Extended dissipative asynchronous filtering for T-S fuzzy switched systems with partial transition descriptions and incomplete measurements (Q2061164) (← links)
- Event-triggered consensus strategy for uncertain topological fractional-order multiagent systems based on Takagi-Sugeno fuzzy models (Q2126248) (← links)
- Delay-dependent consensus criteria for fractional-order Takagi-Sugeno fuzzy multi-agent systems with time delay (Q2127124) (← links)
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (Q2200702) (← links)
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage (Q2215031) (← links)
- Finite-time stability for fractional-order complex-valued neural networks with time delay (Q2284326) (← links)
- Exponential attractor for the Boussinesq equation with strong damping and clamped boundary condition (Q2314723) (← links)
- (Q2823916) (← links)
- (Q2823936) (← links)
- Lag synchronization of complex dynamical networks with hybrid coupling via adaptive pinning control (Q2827879) (← links)
- Further result on H∞ state estimation of static neural networks with interval time-varying delay (Q2828111) (← links)
- (Q2836765) (← links)
- (Q3121947) (← links)
- (Q3453441) (← links)
- A Method of Synthetic Scheduling Basing on the Grid Service (Q3568591) (← links)
- Optimal design of model following control with uncertain disturbance by using genetic algorithms (Q4264502) (← links)
- (Q4574982) (← links)
- MIMO Radar Transmit Beampattern Matching Design (Q4580515) (← links)
- (Q4596720) (← links)
- (Q4658853) (← links)
- (Q4796827) (← links)
- (Q4926986) (← links)
- OPEN VESICLES WITH TWO EDGES (Q4929700) (← links)
- Novel results on nonfragile sampled‐data exponential synchronization for delayed complex dynamical networks (Q4990587) (← links)
- Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC (Q5040411) (← links)
- (Q5195815) (← links)
- (Q5196670) (← links)
- (Q5276949) (← links)
- (Q5277537) (← links)
- (Q5455572) (← links)
- Leader-following consensus of fractional-order multi-agent systems based on event-triggered control (Q6166384) (← links)
- Adaptive fuzzy control for quasi-synchronization of uncertain complex dynamical networks with time-varying topology via event-triggered communication strategy (Q6178364) (← links)
- Engineered asymmetric diffractions of diagonal-line odd-symmetric phase gratings (Q6559628) (← links)
- Secure intermittent impulsive consensus control for fractional-order multiagent systems under denial-of-service and deception attacks (Q6571170) (← links)
- A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum (Q6571313) (← links)
- Event-triggered extended dissipativity control for semi-Markov jump systems under multiple types of deception attacks: a semi-Markov model approach (Q6591224) (← links)
- Practical attribute-based multi-keyword search scheme with sensitive information hiding for cloud storage systems (Q6606231) (← links)
- Verifiable attribute-based multi-keyword search scheme with sensitive information hiding for cloud-assisted e-healthcare sharing systems (Q6652426) (← links)