Sizhao Li

Orcid: 0000-0002-6557-262X

According to our database1, Sizhao Li authored at least 25 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT.
Frontiers Comput. Sci., June, 2024

Path Planning for Heterogeneous UAVs With Radar Sensors.
IEEE Internet Things J., March, 2024

Scheduling optimization for UAV communication coverage using virtual force-based PSO model.
Digit. Commun. Networks, 2024

2023
Adversarial Defense Method Based on Latent Representation Guidance for Remote Sensing Image Scene Classification.
Entropy, September, 2023

Intelligent agents path planning in wireless sensor networks based on Vor-PSO algorithm.
Int. J. Bio Inspired Comput., 2023

A reinforcement learning intelligent deductive model with pre-trained sequence information.
Int. J. Bio Inspired Comput., 2023

Gradient-free adversarial attack algorithm based on differential evolution.
Int. J. Bio Inspired Comput., 2023

Imitation Learning based Alternative Multi-Agent Proximal Policy Optimization for Well-Formed Swarm-Oriented Pursuit Avoidance.
CoRR, 2023

Decentralized Adaptive Formation via Consensus-Oriented Multi-Agent Communication.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

Cross-modal and Cross-medium Adversarial Attack for Audio.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
An Adversarial Attack Method against Specified Objects Based on Instance Segmentation.
Inf., 2022

Adversarial transformation network with adaptive perturbations for generating adversarial examples.
Int. J. Bio Inspired Comput., 2022

Intelligent fitting global real-time task scheduling strategy for high-performance multi-core systems.
CAAI Trans. Intell. Technol., 2022

A Momentum-Based Local Face Adversarial Example Generation Algorithm.
Algorithms, 2022

2021
Multiagent Minimum Risk Path Intrusion Strategy with Computational Geometry.
Wirel. Commun. Mob. Comput., 2021

Complex fuzzy aggregation operations with complex weights.
J. Intell. Fuzzy Syst., 2021

2019
Complex fuzzy arithmetic aggregation operators.
J. Intell. Fuzzy Syst., 2019

Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

2018
Race-Condition-Aware and Hardware-Oriented Task Partitioning and Scheduling Using Entropy Maximization.
IEEE Trans. Parallel Distributed Syst., 2018

The approximate parallelity of complex fuzzy sets.
J. Intell. Fuzzy Syst., 2018

Distances of complex fuzzy sets and continuity of complex fuzzy operations.
J. Intell. Fuzzy Syst., 2018

2017
Asymmetric Equivalences in Fuzzy Logic.
Symmetry, 2017

Cache Coherence Scheme for HCS-Based CMP and Its System Reliability Analysis.
IEEE Access, 2017

2015
Uncertainty Analysis of Race Conditions in Real-Time Systems.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

2014
Analysis of System Reliability for Cache Coherence Scheme in Multi-processor.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014


  Loading...