Convolutional sparse autoencoders for image classification W Luo, J Li, J Yang, W Xu, J Zhang IEEE transactions on neural networks and learning systems 29 (7), 3289-3294, 2017 | 164 | 2017 |
Testing and defending methods against DoS attack in state estimation H Zhang, Y Qi, H Zhou, J Zhang, J Sun Asian Journal of Control 19 (4), 1295-1305, 2017 | 97 | 2017 |
Sparseness analysis in the pretraining of deep neural networks J Li, T Zhang, W Luo, J Yang, XT Yuan, J Zhang IEEE transactions on neural networks and learning systems 28 (6), 1425-1438, 2016 | 85 | 2016 |
Linear reconstruction measure steered nearest neighbor classification framework J Zhang, J Yang Pattern recognition 47 (4), 1709-1720, 2014 | 29 | 2014 |
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper W Xu, H Zhang, X Cao, R Deng, H Li, J Zhang Information Sciences 546, 871-882, 2021 | 26 | 2021 |
Nearest orthogonal matrix representation for face recognition J Zhang, J Yang, J Qian, J Xu Neurocomputing 151, 471-480, 2015 | 26 | 2015 |
Deep retinex decomposition network for underwater image enhancement S Xu, J Zhang, X Qin, Y Xiao, J Qian, L Bo, H Zhang, H Li, Z Zhong Computers and Electrical Engineering 100, 107822, 2022 | 25 | 2022 |
Singular vector sparse reconstruction for image compression S Xu, J Zhang, L Bo, H Li, H Zhang, Z Zhong, D Yuan Computers & Electrical Engineering 91, 107069, 2021 | 24 | 2021 |
Modeling and detection scheme for zero-dynamics attack on wind power system Z Wang, H Zhang, X Cao, E Liu, H Li, J Zhang IEEE Transactions on Smart Grid 15 (1), 934-943, 2023 | 23 | 2023 |
Adaptive noise dictionary construction via IRRPCA for face recognition Y Chen, J Yang, L Luo, H Zhang, J Qian, Y Tai, J Zhang Pattern Recognition 59, 26-41, 2016 | 23 | 2016 |
Leveraging UAV-RIS reflects to improve the security performance of wireless network systems J Sun, H Zhang, X Wang, M Yang, J Zhang, H Li, C Gong IEEE Networking Letters 5 (2), 81-85, 2023 | 17 | 2023 |
Promoting or hindering: Stealthy black-box attacks against drl-based traffic signal control Y Ren, H Zhang, X Cao, C Yang, J Zhang, H Li IEEE Internet of Things Journal 11 (4), 5816-5825, 2023 | 15 | 2023 |
Optimal jamming strategy against two-state switched system Y Zhu, H Zhang, H Li, J Zhang, D Zhang IEEE Communications Letters 26 (3), 706-710, 2022 | 15 | 2022 |
Higher-level feature combination via multiple kernel learning for image classification W Luo, J Yang, W Xu, J Li, J Zhang Neurocomputing 167, 209-217, 2015 | 15 | 2015 |
An Improved grey wolf optimizer with weighting functions and its application to Unmanned Aerial Vehicles path planning H Li, T Lv, Y Shui, J Zhang, H Zhang, H Zhao, S Ma Computers and Electrical Engineering 111, 108893, 2023 | 13 | 2023 |
Abundant travelling wave solutions for KdV–Sawada–Kotera equation with symbolic computation J Zhang, J Zhang, L Bo Applied Mathematics and Computation 203 (1), 233-237, 2008 | 12 | 2008 |
Throughput maximization for usv-enabled underwater wireless networks under jamming attack H Zhang, L Wu, Y Zhi, C Yang, X Cao, J Zhang, H Li IEEE Sensors Journal 24 (14), 21987-21996, 2023 | 9 | 2023 |
Polynomial regressors based data-driven control for autonomous underwater vehicles H Li, W Xu, H Zhang, J Zhang, Y Liu Peer-to-Peer Networking and Applications 13 (5), 1767-1775, 2020 | 8 | 2020 |
Trajectory Tracking for Underwater Rescue Salvage Based on Backstepping Control* W Xu, H Li, J Zhang, Y Zhu, H Zhang 2019 Chinese Control Conference (CCC), 1956-1961, 2019 | 8 | 2019 |
Biological features de-identification in iris images H Zhang, H Zhou, W Jiao, J Shi, Q Zang, J Sun, J Zhang 2018 15th international symposium on pervasive systems, algorithms and …, 2018 | 7 | 2018 |