default search action
Liyong Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Bohan Feng, Youyi Bi, Mian Li, Liyong Lin:
A Decentralized Multi-Agent Path Planning Approach Based on Imitation Learning and Selective Communication. J. Comput. Inf. Sci. Eng. 24(8) (2024) - [j19]Ruochen Tai, Liyong Lin, Rong Su:
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. IEEE Trans. Autom. Control. 69(3): 1898-1905 (2024) - [j18]Bertil A. Brandin, Rong Su, Liyong Lin:
Supervisory Control of Time-Interval Discrete Event Systems. IEEE Trans. Autom. Control. 69(5): 3080-3095 (2024) - [j17]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Distributed Covert Sensor-Actuator Attackers. IEEE Trans. Autom. Control. 69(8): 4942-4957 (2024) - [i22]Jian Cao, Liyong Lin, Lele Li:
Towards Automatic Linearization via SMT Solving. CoRR abs/2408.13487 (2024) - 2023
- [j16]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. Autom. 150: 110860 (2023) - [j15]Ruochen Tai, Liyong Lin, Rong Su:
Synthesis of optimal covert sensor-actuator attackers for discrete-event systems. Autom. 151: 110910 (2023) - [j14]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of networked supervisory control with imperfect communication channels. Discret. Event Dyn. Syst. 33(1): 25-61 (2023) - [j13]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. IEEE Trans. Autom. Control. 68(6): 3453-3468 (2023) - [c24]Ruochen Tai, Liyong Lin, Rong Su:
Supervisor Fortification Against Covert Actuator Attacks. CDC 2023: 7917-7922 - [i21]Ruochen Tai, Liyong Lin, Rong Su:
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. CoRR abs/2307.15972 (2023) - [i20]Lele Li, Liyong Lin:
Scheduling Distributed Flexible Assembly Lines using Safe Reinforcement Learning with Soft Shielding. CoRR abs/2311.12572 (2023) - 2022
- [j12]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
A new modeling framework for networked discrete-event systems. Autom. 138: 110139 (2022) - [j11]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis. Autom. 142: 110279 (2022) - [j10]Ruochen Tai, Liyong Lin, Rong Su:
Identification of System Vulnerability Under a Smart Sensor Attack via Attack Model Reduction. IEEE Control. Syst. Lett. 6: 2948-2953 (2022) - [j9]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-assisted heuristic synthesis of covert attackers against unknown supervisors. Discret. Event Dyn. Syst. 32(3): 495-520 (2022) - [c23]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Distributed Control of Timed Networked System against Communication Delays. ICCA 2022: 1008-1013 - [c22]Chih-Wei Chang, Yang Lei, Serdar Charyyev, Shuai Leng, Tim Yoon, Jun Zhou, Xiaofeng Yang, Liyong Lin:
An unsupervised patient-specific metal artifact reduction framework for proton therapy. Medical Imaging: Image-Guided Procedures 2022 - [c21]Chih-Wei Chang, Yang Lei, Tonghe Wang, Liyong Lin, Jun Zhou, Jeffrey D. Bradley, Tian Liu, Xiaofeng Yang:
Using orthogonal 2D kV images for target localization via central matching networks. Medical Imaging: Image-Guided Procedures 2022 - [c20]Chih-Wei Chang, Yang Lei, Tonghe Wang, Jun Zhou, Liyong Lin, Jeffrey D. Bradley, Tian Liu, Xiaofeng Yang:
A deep learning approach to transform two orthogonal X-ray images to volumetric images for image-guided proton therapy. Medical Imaging: Image Processing 2022 - [i19]Ruochen Tai, Liyong Lin, Rong Su:
Identification of System Vulnerability under a Smart Sensor Attack via Attack Model Reduction. CoRR abs/2201.10247 (2022) - [i18]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. CoRR abs/2203.08360 (2022) - [i17]Ruochen Tai, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Covert Actuator Attackers. CoRR abs/2205.02383 (2022) - 2021
- [j8]Liyong Lin, Rong Su:
Synthesis of covert actuator and sensor attackers. Autom. 130: 109714 (2021) - [c19]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CDC 2021: 7003-7008 - [i16]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels. CoRR abs/2103.07132 (2021) - [i15]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CoRR abs/2103.11197 (2021) - [i14]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked Supervisor Synthesis Against Lossy Channels with Bounded Network Delays as Non-Networked Synthesis. CoRR abs/2103.11273 (2021) - [i13]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction. CoRR abs/2104.04299 (2021) - [i12]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. CoRR abs/2104.14919 (2021) - [i11]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations. CoRR abs/2106.12268 (2021) - [i10]Liyong Lin, Rong Su:
A Topological Approach for Computing Supremal Sublanguages for Some Language Equations in Supervisory Control Theory. CoRR abs/2111.13840 (2021) - 2020
- [j7]Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of covert actuator attackers for free. Discret. Event Dyn. Syst. 30(4): 561-577 (2020) - [c18]Liyong Lin, Yuting Zhu, Rong Su:
A Topological Approach for Computing Supremal Sublanguages. ICARCV 2020: 1015-1019 - [c17]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Supervisor Synthesis for Networked Discrete Event Systems with Delays against Non-FIFO Communication Channels. ICARCV 2020: 1027-1032 - [c16]Yingzi Liu, Yang Lei, Tonghe Wang, Jun Zhou, Liyong Lin, Tian Liu, Pretesh Patel, Walter J. Curran, Lei Ren, Xiaofeng Yang:
Liver synthetic CT generation based on a dense-CycleGAN for MRI-only treatment planning. Medical Imaging: Image Processing 2020: 113132L - [i9]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of Networked Supervisory Control with Imperfect Communication Channels. CoRR abs/2010.11491 (2020)
2010 – 2019
- 2019
- [j6]Weilin Wang, Rong Su, Liyong Lin, Chaohui Gong:
Model Checking in Isomorphic Module Systems. IEEE Trans. Autom. Control. 64(2): 728-735 (2019) - [j5]Liyong Lin, Tomás Masopust, Walter Murray Wonham, Rong Su:
Automatic Generation of Optimal Reductions of Distributions. IEEE Trans. Autom. Control. 64(3): 896-911 (2019) - [c15]Liyong Lin, Sander Thuijsman, Yuting Zhu, Simon Ware, Rong Su, Michel A. Reniers:
Synthesis of Supremal Successful Normal Actuator Attackers on Normal Supervisors. ACC 2019: 5614-5619 - [c14]Yuting Zhu, Liyong Lin, Simon Ware, Rong Su:
Supervisor Synthesis for Networked Discrete Event Systems With Communication Delays and Lossy Channels. CDC 2019: 6730-6735 - [c13]Liyong Lin, Yuting Zhu, Rong Su:
Towards Bounded Synthesis of Resilient Supervisors. CDC 2019: 7659-7664 - [c12]Aida Rashidinejad, Bart Wetzels, Michel A. Reniers, Liyong Lin, Yuting Zhu, Rong Su:
Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook. ECC 2019: 1732-1739 - [c11]Yuting Zhu, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Actuator Enablement Attack. ECC 2019: 1760-1765 - [c10]Liyong Lin, Rong Su, Bertil A. Brandin, Simon Ware, Yuting Zhu, Yajuan Sun:
Synchronous Composition of Finite Interval Automata. ICCA 2019: 578-583 - [i8]Liyong Lin, Yuting Zhu, Rong Su:
Towards Bounded Synthesis of Resilient Supervisors Against Actuator Attacks. CoRR abs/1903.08358 (2019) - [i7]Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Actuator Attackers for Free. CoRR abs/1904.10159 (2019) - 2018
- [j4]Deguang Wang, Liyong Lin, Zhiwu Li, Walter Murray Wonham:
State-Based Control of Discrete-Event Systems Under Partial Observation. IEEE Access 6: 42084-42093 (2018) - [j3]Liyong Lin, Alin Stefanescu, Weilin Wang, Rong Su, Walter Murray Wonham:
Symbolic reachability analysis and maximally permissive entrance control for globally synchronized templates. Autom. 87: 290-300 (2018) - [i6]Liyong Lin, Tomás Masopust, Walter Murray Wonham, Rong Su:
Automatic Generation of Optimal Reductions of Distributions. CoRR abs/1803.11034 (2018) - [i5]Liyong Lin, Sander Thuijsman, Yuting Zhu, Simon Ware, Rong Su, Michel A. Reniers:
Synthesis of Successful Actuator Attackers on Supervisors. CoRR abs/1807.06720 (2018) - [i4]Liyong Lin, W. M. Wonham, Rong Su:
Timed Discrete-Event Systems are Synchronous Product Structures. CoRR abs/1807.06725 (2018) - [i3]Yuting Zhu, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Actuator Enablement Attack. CoRR abs/1811.02932 (2018) - 2017
- [j2]Liyong Lin, Simon Ware, Rong Su, Walter Murray Wonham:
Reduction of Distributions: Definitions, Properties, and Applications. IEEE Trans. Autom. Control. 62(11): 5755-5768 (2017) - [c9]Liyong Lin, Simon Ware, Rong Su, Walter Murray Wonham:
Reduction of distributions and its applications. ACC 2017: 3848-3853 - [i2]Quan Quan, Zhiyao Zhao, Liyong Lin, Peng Wang, Walter Murray Wonham, Kai-Yuan Cai:
Failsafe Mechanism Design of Multicopters Based on Supervisory Control Theory. CoRR abs/1704.08605 (2017) - 2016
- [j1]Liyong Lin, Alin Stefanescu, Rong Su:
On Distributed and Parameterized Supervisor Synthesis Problems. IEEE Trans. Autom. Control. 61(3): 777-782 (2016) - [i1]Ahmad Reza Shehabinia, Liyong Lin, Rong Su:
Timed Supervisory Control for Operational Planning and Scheduling under Multiple Job Deadlines. CoRR abs/1607.04255 (2016) - 2014
- [c8]Liyong Lin, Alin Stefanescu, Rong Su, Weilin Wang, Ahmad Reza Shehabinia:
Towards decentralized synthesis: Decomposable sublanguage and Joint Observability Problems. ACC 2014: 2047-2052 - [c7]Liyong Lin, Ahmad Reza Shehabinia, Rong Su, Bertil A. Brandin:
Automaton-based timed supervisory control for operational planning and scheduling under multiple job deadlines. CDC 2014: 5943-5948 - [c6]Sana Sami, Liyong Lin, Ahmad Reza Shehabinia, Rong Su, Chin Soon Chong, Su Min Jeon:
Discrete-event based vehicle dispatching and scheduling in multicommodity transportations. ICARCV 2014: 169-174 - [c5]Liyong Lin, Rong Su, Hendra Suratno, Gerald Lee Gim Seet:
Model based task programming for secure multimodal human-robot interaction. ICARCV 2014: 499-504 - [c4]Ahmad Reza Shehabinia, Liyong Lin, Rong Su, Chin Soon Chong:
Supervisory Control for a Class of Discrete Event Systems for Optimal Throughput. WODES 2014: 201-207 - 2013
- [c3]Weilin Wang, Rong Su, Liyong Lin:
On analysis of deadlock and blocking freeness in isomorphic module systems. ACC 2013: 923-928 - [c2]Rong Su, Liyong Lin:
Synthesis of control protocols for multi-agent systems with similar actions. CDC 2013: 6986-6991 - 2012
- [c1]Liyong Lin, Rong Su, Alin Stefanescu:
Remarks on the difficulty of top-down supervisor synthesis. ICARCV 2012: 270-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint