default search action
Chongrong Fang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xiaoyu Luo, Chengcheng Zhao, Chongrong Fang, Jianping He:
Submodularity-based false data injection attack scheme in multi-agent dynamical systems. Autom. 160: 111426 (2024) - [j10]Chongrong Fang, Wenzhe Zheng, Zhiyu He, Jianping He, Chengcheng Zhao, Jingpei Wang:
Towards resilient average consensus in multi-agent systems: a detection and compensation approach. Frontiers Inf. Technol. Electron. Eng. 25(2): 182-196 (2024) - [c18]Xiangyu Mao, Jianping He, Chengpu Yu, Chongrong Fang:
Conditions for parameter unidentifiability of linear ARX systems for enhancing security. L4DC 2024: 890-901 - 2023
- [j9]Xin Wang, Chongrong Fang, Ming Yang, Xiaoming Wu, Heng Zhang, Peng Cheng:
Resilient Distributed Classification Learning Against Label Flipping Attack: An ADMM-Based Approach. IEEE Internet Things J. 10(17): 15617-15631 (2023) - [j8]Ruopeng Geng, Chongrong Fang, Shiyang Guo, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng:
FlowPinpoint: Localizing Anomalies in Cloud-Client Services for Cloud Providers. IEEE Trans. Cloud Comput. 11(3): 3070-3084 (2023) - [j7]Hengye Zhu, Mengxiang Liu, Chongrong Fang, Ruilong Deng, Peng Cheng:
Detection-Performance Tradeoff for Watermarking in Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 18: 2780-2793 (2023) - [j6]Shuying Qin, Jianping He, Chongrong Fang, James Lam:
Differential Private Discrete Noise-Adding Mechanism: Conditions, Properties, and Optimization. IEEE Trans. Signal Process. 71: 3534-3547 (2023) - [c17]Jia Qi, Chongrong Fang, Jianping He:
Optimal Linear Attack in Cyber-Physical Systems with Periodic Detection. CDC 2023: 840-845 - [c16]Xiaoyu Luo, Chongrong Fang, Chengcheng Zhao, Peng Cheng, Jianping He:
Optimal Sequential False Data Injection Attack Scheme: Finite-Time Inverse Convergence. CDC 2023: 1820-1825 - [c15]Xuechao Zhang, Dong Wang, Sun Han, Weichuang Li, Bin Zhao, Zhigang Wang, Xiaoming Duan, Chongrong Fang, Xuelong Li, Jianping He:
Affordance-Driven Next-Best-View Planning for Robotic Grasping. CoRL 2023: 2849-2862 - [i5]Xuechao Zhang, Dong Wang, Sun Han, Weichuang Li, Bin Zhao, Zhigang Wang, Xiaoming Duan, Chongrong Fang, Xuelong Li, Jianping He:
Affordance-Driven Next-Best-View Planning for Robotic Grasping. CoRR abs/2309.09556 (2023) - 2022
- [j5]Ji-Ming Chen, Xiangshan Gao, Ruilong Deng, Yang He, Chongrong Fang, Peng Cheng:
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 1810-1825 (2022) - [j4]Chongrong Fang, Haoyu Liu, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng, Jiming Chen:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. IEEE/ACM Trans. Netw. 30(3): 1178-1192 (2022) - [c14]Shuying Qin, Jianping He, Chongrong Fang, James Lam:
Differential Private Discrete Noise Adding Mechanism: Conditions and Properties. ACC 2022: 946-951 - [c13]Chendi Qu, Jianping He, Jialun Li, Chongrong Fang, Yilin Mo:
Moving Target Interception Considering Dynamic Environment. ACC 2022: 1194-1199 - [c12]Wenzhe Zheng, Chongrong Fang, Jianping He, Yunfeng Peng:
Resilient Average Consensus of Second-Order Multi-Agent Systems. ACC 2022: 1466-1471 - [c11]Zitong Wang, Yushan Li, Chongrong Fang, Jianping He:
Distributed Topology-preserving Collaboration Algorithm against Inference Attack. ACC 2022: 2166-2171 - [c10]Xiaoyu Luo, Chengcheng Zhao, Chongrong Fang, Jianping He:
Submodularity-based False Data Injection Attack Scheme in Multi-agent Dynamical Systems. ACC 2022: 4998-5003 - [c9]Jisheng Xu, Zhiyu He, Chongrong Fang, Jianping He, Yunfeng Peng:
Inference Attack in Distributed Optimization via Interpolation and Manipulation. CDC 2022: 2250-2255 - [c8]Xiaoyu Luo, Chongrong Fang, Chengcheng Zhao, Jianping He:
A Model-free False Data Injection Attack Strategy in Networked Control Systems. CDC 2022: 2941-2946 - [c7]Yun Gao, Kai Luo, Chongrong Fang, Jianping He:
Fragility-Aware Stealthy Attack Strategy for Multi-Robot Systems against Multi-Hop Wireless Networks. CDC 2022: 4827-4832 - [c6]Xuechao Zhang, Xuda Ding, Yi Ren, Yu Zheng, Chongrong Fang, Jianping He:
Toward Global Sensing Quality Maximization: A Configuration Optimization Scheme for Camera Networks. IROS 2022: 13386-13391 - [i4]Wenzhe Zheng, Zhiyu He, Jianping He, Chengcheng Zhao, Chongrong Fang:
Resilient Average Consensus: A Detection and Compensation Approach. CoRR abs/2202.10814 (2022) - [i3]Shuying Qin, Jianping He, Chongrong Fang, James Lam:
Differential Private Discrete Noise Adding Mechanism: Conditions, Properties and Optimization. CoRR abs/2203.10323 (2022) - [i2]Chendi Qu, Jianping He, Jialun Li, Chongrong Fang, Yilin Mo:
Moving Target Interception Considering Dynamic Environment. CoRR abs/2205.07772 (2022) - [i1]Xuechao Zhang, Xuda Ding, Yi Ren, Yu Zheng, Chongrong Fang, Jianping He:
Toward Global Sensing Quality Maximization: A Configuration Optimization Scheme for Camera Networks. CoRR abs/2211.15166 (2022) - 2021
- [j3]Yining Qi, Chongrong Fang, Haoyu Liu, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen:
A survey of cloud network fault diagnostic systems and tools. Frontiers Inf. Technol. Electron. Eng. 22(8): 1031-1045 (2021) - 2020
- [j2]Chongrong Fang, Yifei Qi, Peng Cheng, Wei Xing Zheng:
Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems. Autom. 112 (2020) - [j1]Chongrong Fang, Yifei Qi, Jiming Chen, Rui Tan, Wei Xing Zheng:
Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations. IEEE Trans. Autom. Control. 65(9): 3927-3934 (2020) - [c5]Haoyu Liu, Chongrong Fang, Yining Qi, Jian Bai, Shaozhe Wang, Xiong Xiao, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen:
RAIN: Towards Real-Time Core Devices Anomaly Detection Through Session Data in Cloud Network. NOMS 2020: 1-6 - [c4]Chongrong Fang, Haoyu Liu, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyv, Peng Cheng, Jiming Chen:
VTrace: Automatic Diagnostic System for Persistent Packet Loss in Cloud-Scale Overlay Network. SIGCOMM 2020: 31-43
2010 – 2019
- 2017
- [c3]Chongrong Fang, Yifei Qi, Peng Cheng, Wei Xing Zheng:
Cost-effective watermark based detector for replay attacks on cyber-physical systems. ASCC 2017: 940-945 - 2016
- [c2]Zhihao Zhang, Chongrong Fang, Yuanchao Shu, Zhiguo Shi, Jiming Chen:
FindIt: Real-time Through-Wall Human Motion Detection Using Narrow Band SDR: Demo Abstract. SenSys 2016: 310-311 - 2015
- [c1]Dongxu Zheng, Xi Zhang, Yuanchao Shu, Chongrong Fang, Peng Cheng, Jiming Chen:
iParking: An intelligent parking system for large parking lots. INFOCOM Workshops 2015: 37-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint