Inspired by privacy problems where the behavior of a system should not b...
In this paper, we revisit the verification of strong K-step opacity (K-S...
Opacity, as an important property in information-flow security, characte...
This paper deals with the state estimation problem in discrete-event sys...
G-images refer to image data defined on irregular graph domains. This wo...
Traditional clustering methods are limited when dealing with huge and
he...
This paper focuses on the problem of cyber attacks for discrete event sy...
Due to its inferior characteristics, an observed (noisy) image's direct ...
Information granules have been considered to be the fundamental construc...
As an important technology in artificial intelligence Granular Computing...
This paper proposes a semi-structural approach to verify the nonblocking...
Although spatial information of images usually enhance the robustness of...
Instead of directly utilizing an observed image including some outliers,...
The problem of cyber attacks with bounded sensor reading edits for
parti...