Login / Signup
Suying Sheng
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 8
Top Topics
Genetic Regulatory Networks
Bipartite Graph
Multiagent Systems
Cosine Transform
Top Venues
IEEE Access
Int. J. Fuzzy Syst.
CDC
J. Frankl. Inst.
</>
Publications
</>
Jiahao Zhang
,
Suying Sheng
,
Guoping Lu
Bipartite Leader-Following Consensus of Multiagent Systems on Switching Signed Networks Under Deception Attacks and Its Application to Image Communication.
IEEE Access
12 (2024)
Xinhua Wu
,
Suying Sheng
,
Guoping Lu
Bipartite Consensus of Fuzzy Multiagent Systems on Multilayer Coopetition Networks Using Output Measurements and Its Application to Image Communication.
IEEE Access
11 (2023)
Yansen Liu
,
Suying Sheng
,
Jiahao Zhang
,
Guoping Lu
Bipartite Synchronization of Multi-Agent Systems With Signed Graph Under Deception Attacks and Application in Speech Communication.
IEEE Access
11 (2023)
Xiaomei Zhang
,
Lin He
,
Lei Zhou
,
Suying Sheng
Bipartite synchronization of discrete-time networks with antagonistic interactions via hybrid control.
IMA J. Math. Control. Inf.
39 (4) (2022)
Suying Sheng
,
Xiaomei Zhang
,
Yue Lu
,
Guoping Lu
Consensus-Based Estimation for Type-2 Fuzzy Time-Delay Systems Under Deception Attacks and Partial Information Exchange.
Int. J. Fuzzy Syst.
23 (5) (2021)
Suying Sheng
,
Xiaomei Zhang
,
Qingqing Lu
,
Guoping Lu
State Estimation for Coupled and Switched Genetic Regulatory Networks.
Circuits Syst. Signal Process.
38 (10) (2019)
Suying Sheng
,
Xiaomei Zhang
,
Guoping Lu
Finite-time outer-synchronization for complex networks with Markov jump topology via hybrid control and its application to image encryption.
J. Frankl. Inst.
355 (14) (2018)
Xiaomei Zhang
,
Suying Sheng
,
Guoping Lu
,
Yufan Zheng
Synchronization for arrays of coupled jumping delayed neural networks and its application to image encryption.
CDC
(2017)
Suying Sheng
,
Xinhua Wu
A novel bit-level image encryption scheme using hyper-chaotic systems.
FSKD
(2013)
Suying Sheng
,
Xinhua Wu
A new digital anti-counterfeiting scheme based on chaotic cryptography.
ICTC
(2012)