Follow
Huihui Gong
Title
Cited by
Cited by
Year
Stepsize range and optimal value for Taylor–Zhang discretization formula applied to zeroing neurodynamics illustrated via future equality-constrained quadratic programming
Y Zhang, H Gong, M Yang, J Li, X Yang
IEEE Transactions on Neural Networks and Learning Systems 30 (3), 959-966, 2018
462018
Video scene parsing: An overview of deep learning methods and datasets
X Yan, H Gong, Y Jiang, ST Xia, F Zheng, X You, L Shao
Computer Vision and Image Understanding 201, 103077, 2020
112020
Euler-precision ZED formula 3NgPED_G extended to future minimization with theoretical guarantees and numerical experiments
Y Zhang, H Gong, J Li, H Huang, M Yang
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation …, 2017
72017
Discrete Getz-Masden dynamic system 2 via Taylor-Zhang discretization formula solving for time-varying complex matrix inverse
Y Zhang, G Wu, X Yang, H Gong, M Yang
2017 Chinese Automation Congress (CAC), 6363-6368, 2017
62017
Taylor-Zhang discretization formula extended to time-varying four fundamental operations with numerical experiments
Y Zhang, H Gong, J Li, B Qiu, H Huang
IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society …, 2017
52017
ZG control and simulation of helicopter using Taylor-Zhang discretization formula
Y Zhang, Z Yin, H Huang, H Gong, H Xiao
2017 Chinese Automation Congress (CAC), 357-362, 2017
42017
Euler-precision formula ZD3NgyP_Z applied to discrete control simulation of agitation tank
Y Zhang, J Zhang, Y Ding, H Gong, J Li
2017 Chinese Automation Congress (CAC), 363-368, 2017
32017
Discrete time-varying four fundamental operations implemented by Euler forward difference
Y Zhang, H Gong, J Li, B Qiu, M Yang
2017 36th Chinese Control Conference (CCC), 9807-9812, 2017
32017
Symbolic solutions to division by zero problem via gradient neurodynamics
Y Zhang, H Gong, J Li, H Huang, Z Yin
Neural Information Processing: 24th International Conference, ICONIP 2017 …, 2017
22017
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
H Gong, M Dong, S Ma, S Camtepe, S Nepal, C Xu
IEEE Transactions on Multimedia, 2023
12023
About step-length of ZeaD (Zhang et al Discretization) formula 4IgS_Y for future minimization via fan equations
Y Zhang, Z Qi, H Gong, J Li, B Qiu
2018 Chinese Control And Decision Conference (CCDC), 314-319, 2018
12018
Numerical and practical experiments of acceleration-level fault-tolerant scheme for redundant manipulator MPaC
H Gong, Z Yin, D Chen, L Jin, Y Zhang
2017 17th International Conference on Control, Automation and Systems (ICCAS …, 2017
12017
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects
R Han, H Gong, S Ma, J Li, C Xu, E Bertino, S Nepal, Z Ma, JF Ma
IEEE Transactions on Information Forensics and Security, 2023
2023
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
H Gong, M Dong, S Ma, S Camtepe, S Nepal, C Xu
arXiv preprint arXiv:2309.16207, 2023
2023
Reducing Adversarial Training Cost with Gradient Approximation
H Gong, S Yang, S Ma, S Camtepe, S Nepal, C Xu
arXiv preprint arXiv:2309.09464, 2023
2023
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization (preprint)
H Gong, M Dong, S Ma, S Camtepe, S Nepal, C Xu
2023
Vulnerability Detection Using Deep Learning Based Function Classification
H Gong, S Ma, S Camtepe, S Nepal, C Xu
International Conference on Network and System Security, 3-22, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–17