Get my own profile
Public access
View all96 articles
58 articles
available
not available
Based on funding mandates
Co-authors
- Yue WangZhejiang UniversityVerified email at zju.edu.cn
- Xiaqing DingPhD student, Zhejiang UniversityVerified email at zju.edu.cn
- Huan YinResearch Assistant Professor, Hong Kong University of Science and TechnologyVerified email at ust.hk
- Zexi ChenZhejiang UniversityVerified email at zju.edu.cn
- Shoudong HuangProfessor, University of Technology Sydney (UTS)Verified email at uts.edu.au
- Xuecheng XuZhejiang UniversityVerified email at zju.edu.cn
- Yanmei JiaoHangzhou Normal UniversityVerified email at hznu.edu.cn
- Yong LiuInstitute of Cyber-Systems and Control, Zhejiang UniversityVerified email at iipc.zju.edu.cn
- Bo FuZhejiang UniversityVerified email at zju.edu.cn
- Yunkai WangZhejiang UniversityVerified email at zju.edu.cn
- Jian ChuProfessor of Cyber-Systems & Control, Zhejiang UniversityVerified email at zju.edu.cn
- Huifang MaDuke UniversityVerified email at duke.edu
- Yiyi LiaoZhejiang UniversityVerified email at zju.edu.cn
- Jiafan ZhangABB Corporate ResearchVerified email at cn.abb.com
- Haodong ZhangControl Science and Engineering, Zhejiang UniversityVerified email at zju.edu.cn
- Dongkun ZhangZhejiang UniversityVerified email at zju.edu.cn
- Professor Sarath KodagodaUniversity of Technology, SydneyVerified email at uts.edu.au
- Runjian ChenThe University of Hong KongVerified email at connect.hku.hk
- Yaliang WangMaster Student of Computer Science, Northwestern UniversityVerified email at u.northwestern.edu
- Lingyun ChenMunich Institute of Robotics and Machine Intelligence, TUMVerified email at tum.de