发表论文
[1] IEEE Transactions on Vehicular Technologynull. 2024, [2] 崔允端, Shi, Wenbo, 邵翠萍, 彭磊, 李慧云. Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation. Ieee Transactions on Industrial Informatics[J]. 2024, [3] IEEE Transactions on Intelligent Vehiclesnull. 2024, [4] Yin Jianwen, Jiang Zhengmin, Liang Qingyi, Li wenfei, Pan Zhongmin, Li Huiyun, Liu Jia. Efficient-enhanced Reinforcement Learning for Autonomous Driving in Urban Traffic Scenarios. The 26th IEEE International Conference on Intelligent Transportation Systems (ITSC 2023)null. 2023, [5] Jiang Zhengmin, Pan Wenbo, Liu Jia, Dang Shaobo, Yang Zhiheng, Li Huiyun, Pan Yi. Efficient and Unbiased Safety Test for Autonomous Driving Systems. IEEE Transactions on Intelligent Vehicles[J]. 2023, [6] IEEE Transactions on Neural Networksnull. 2023, [7] Liu,Jia, Li,Huiyun, Yang,Zhiheng, Dang,Shaobo, Huang,Zhejun. Deep Dense Networks-Based Curriculum Reinforcement Learning for High-speed Overtaking. IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE[J]. 2022, [8] 崔允端, 彭磊, 李慧云. Filtered Probabilistic Model Predictive Control-based Reinforcement Learning for Unmanned Surface Vehicles. Ieee Transactions on Industrial Informatics[J]. 2022, [9] Li, Wenfei, Li, Huiyun, Huang, Zhejun, Liu, Jia, Dang, Shaobo, Du, Haiping. A new braking torque distribution strategy based on braking actuator characteristics and a command signal for a blended braking system. IET INTELLIGENT TRANSPORT SYSTEMS[J]. 2022, 16(6): 825-841, http://dx.doi.org/10.1049/itr2.12177.[10] Huang, Zhejun, Li, Huiyun, Li, Wenfei, Liu, Jia, Huang, Chao, Yang, Zhiheng, Fang, Wenqi. A New Trajectory Tracking Algorithm for Autonomous Vehicles Based on Model Predictive Control. SENSORS[J]. 2021, 21(21): http://dx.doi.org/10.3390/s21217165.[11] Li, Wenfei, Li, Huiyun, Xu, Kun, Huang, Zhejun, Li, Ke, Du, Haiping. Estimation of Vehicle Dynamic Parameters Based on the Two-Stage Estimation Method. SENSORS[J]. 2021, 21(11): http://dx.doi.org/10.3390/s21113711.[12] Jiang, Runsong, Liu, Zhangjie, Li, Huiyun. Evolution towards optimal driving strategies for large-scale autonomous vehicles. IET INTELLIGENT TRANSPORT SYSTEMS[J]. 2021, 15(8): 1018-1027, https://doaj.org/article/f898ba5e4f8d4e0da0bb72f1acb243c8.[13] Liu,Jia, Yang,Zhiheng, Huang,Zhejun, Li,Wenfei, Danger,Shaobo, Li,Huiyun. Simulation performance evaluation of pure pursuit, stanley, lqr, mpc controller for autonomous vehicles. 2021 IEEE International Conference on Real-time Computing and Robotics (RCAR)null. 2021, [14] 刘章杰, 李慧云. 基于多目标协同演化算法的大规模自动驾驶策略. 集成技术[J]. 2020, 9(5): 93-102, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000403.[15] 李看, 雷斌, 李慧云. 自动驾驶在拥堵路段的道路几何信息估计. 集成技术[J]. 2020, 9(5): 69-80, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000401.[16] Huang, Hui, Li, Huiyun, Shao, Cuiping, Sun, Tianfu, Fang, Wenqi, Dang, Shaobo. Data Redundancy Mitigation in V2X Based Collective Perceptions. IEEE ACCESS[J]. 2020, 8: 13405-13418, https://doaj.org/article/c2c20ec7a56a4c03a8a1b0731eb7802f.[17] 李慧云, 邵翠萍, 陈贝章, 胡延步, 杨赵南. 基于矩阵补全的无人车感知系统的攻击防御技术. 集成技术[J]. 2020, 9(5): 3-14, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000395.[18] Sun, Tianfu, Yang, Riyang, Li, Huiyun, Zhang, Xin, Xu, Tiantian. Active Motor Rotor Temperature Management Based on One-Node Thermal Network Model Predictive Control. IEEE TRANSACTIONS ON POWER ELECTRONICS[J]. 2020, 35(10): 11213-11221, https://www.webofscience.com/wos/woscc/full-record/WOS:000545474200106.[19] 陈贝章, 李慧云. 一种基于地磁信号的激光同时定位与建图的闭环检测方法. 集成技术[J]. 2020, 9(5): 58-68, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000400.[20] 吕迪, 徐坤, 李慧云, 潘仲鸣. 融合类人驾驶行为的无人驾驶深度强化学习方法. 集成技术[J]. 2020, 9(5): 34-47, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000398.[21] Junta Wu, Huiyun Li. Deep Ensemble Reinforcement Learning with Multiple Deep Deterministic Policy Gradient Algorithm. MATHEMATICAL PROBLEMS IN ENGINEERING[J]. 2020, 2020: [22] 李慧云. 序言:新能源汽车与智能网联汽车专题Ⅱ. 集成技术[J]. 2020, 9(5): 1-2, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000394.[23] Fang, Wenqi, Zhang, Shitian, Huang, Hui, Dang, Shaobo, Huang, Zhejun, Li, Wenfei, Wang, Zheng, Sun, Tianfu, Li, Huiyun. Learn to Make Decision with Small Data for Autonomous Driving: Deep Gaussian Process and Feedback Control. JOURNAL OF ADVANCED TRANSPORTATION[J]. 2020, 2020: https://doaj.org/article/4ab5c802bf4748e1b772fc7189250dfe.[24] 胡延步, 邵翠萍, 李慧云. 基于多现场可编程门阵列异构平台的流水线技术优化方法. 集成技术[J]. 2020, 9(5): 81-92, http://lib.cqvip.com/Qikan/Article/Detail?id=7103000402.[25] Yang, Liuqing, Li, Huiyun. Vehicle-to-vehicle communication based on a peer-to-peer network with graph theory and consensus algorithm. IET INTELLIGENT TRANSPORT SYSTEMS[J]. 2019, 13(2): 280-285, http://dx.doi.org/10.1049/iet-its.2018.5014.[26] Li, Huiyun, Shao, Cuiping, Wang, Zheng. Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2019, 16(3): 476-483, https://www.webofscience.com/wos/woscc/full-record/WOS:000468227400010.[27] Shao, Cuiping, Li, Huiyun, Fang, Jiayan, Deng, Qihua. An Error Location and Correction Method for Memory Based on Data Similarity Analysis. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS[J]. 2019, 27(10): 2354-2364, https://www.webofscience.com/wos/woscc/full-record/WOS:000489728200012.[28] Shao, Cuiping, Li, Huiyun, Wang, Zheng, Fang, Jiayan. A Generic Block-Level Error Confinement Technique for Memory Based on Principal Component Analysis. APPLIED SCIENCES-BASEL[J]. 2019, 9(22): http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000502570800010.[29] Dong, Shi, Chen, Mingsong, Peng, Lei, Li, Huiyun, IEEE. Parking rank: A novel method of parking lots sorting and recommendation based on public information. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT)null. 2018, 1381-1386, http://dx.doi.org/10.1109/ICIT.2018.8352381.[30] Shao, Cuiping, Li, Huiyun. Identifying Single-Event Transient Location Based on Compressed Sensing. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS[J]. 2018, 26(4): 768-777, https://www.webofscience.com/wos/woscc/full-record/WOS:000428615000015.[31] Li Wenda, Meng Xianjie, Wang Zheng, Fang Wenqi, Zou Jie, Li Huiyun, Sun Tianfu, Liang Jianing, IEEE. Low-cost vector map assisted navigation strategy for autonomous vehicle. 2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018)null. 2018, 536-539, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000458319800130.[32] Sun, Min, Li, Zhongmin, Peng, Lei, Li, Huiyun, Fang, Xiangyan, IEEE. FLOPS: An Efficient and High-precision Prediction on Available Parking Spaces in a Long Time-span. 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC)[J]. 2018, 2937-2942, [33] Fang Xiangyan, Xiang Rong, Peng Lei, Li Huiyun, Sun Yuqiang, IEEE. SAW: A Hybrid Prediction Model for Parking Occupancy under the Environment of Lacking Real-time Data. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY[J]. 2018, 3134-3137, [34] Wang Jianxun, Wu Shiqian, 李慧云, Zou Jie, IEEE. Path Planning Combining Improved Rapidly-Exploring Random Trees with Dynamic Window Approach in ROS. PROCEEDINGS OF THE 2018 13TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2018)null. 2018, 1296-1301, [35] Yang Zhiheng, Li Jun, Li HuiYun. Real-time Pedestrian and Vehicle Detection for Autonomous Driving. 2018, http://ir.siat.ac.cn:8080/handle/172644/13728.[36] Sun, Yuqiang, Peng, Lei, Li, Huiyun, Sun, Min, IEEE. Exploration on Spatiotemporal Data Repairing of Parking Lots Based on Recurrent GANs. 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC)null. 2018, 467-472, [37] 邬可可, 李慧云, 闫立军. 一种防御差分功耗分析的ECC同种映射模型. 计算机工程[J]. 2017, 43(10): 115-119,125, http://lib.cqvip.com/Qikan/Article/Detail?id=673381843.[38] Shao, Cuiping, Li, Huiyun, Zhou, Jianbin. Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test. IET INFORMATION SECURITY[J]. 2017, 11(6): 312-318, https://www.webofscience.com/wos/woscc/full-record/WOS:000413935100002.[39] Du, Guanghua, Guo, Jinlong, Wu, Ruqun, Guo, Na, Liu, Wenjing, Ye, Fei, Sheng, Lina, Li, Qiang, Li, Huiyun. The first interdisciplinary experiments at the IMP high energy microbeam. NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION B-BEAM INTERACTIONS WITH MATERIALS AND ATOMS[J]. 2015, 348: 18-22, http://dx.doi.org/10.1016/j.nimb.2015.01.066.[40] Guanghua Du, Jinlong Guo, Ruqun Wu, Na Guo, Wenjing Liu, Fei Ye, Lina Sheng, Qiang Li, Huiyun Li. The first interdisciplinary experiments at the IMP high energy microbeam. NUCLEAR INST. AND METHODS IN PHYSICS RESEARCH, B. 2015, 18-22, http://dx.doi.org/10.1016/j.nimb.2015.01.066.[41] Li, Huiyun, Du, Guanghua, Shao, Cuiping, Dai, Liang, Xu, Guoqing, Guo, Jinlong. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits. IEEE TRANSACTIONS ON NUCLEAR SCIENCE[J]. 2015, 62(3): 1341-1348, [42] Li, Huiyun, Hu, Xiaobo, Shao, Cuiping, Zhou, Jianbin, Xu, Guoqing. SEU reliability evaluation of 3D ICs. ELECTRONICS LETTERS[J]. 2015, 51(4): 362-363, https://www.webofscience.com/wos/woscc/full-record/WOS:000349702900036.[43] Jiang Li, Huang Xiangwei, Xie Hongfeng, Xu Qiang, Li Chao, Liang Xiaoyao, Li Huiyun, IEEE. A Novel TSV Probing Technique With Adhesive Test Interposer. 2015 33RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD)null. 2015, 597-604, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000370645200094.[44] Zhang, Xiaolong, Li, Huiyun, Jiang, Li, Xu, Qiang. A Low-Cost TSV Test and Diagnosis Scheme Based on Binary Search Method. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS[J]. 2015, 23(11): 2639-2647, https://www.webofscience.com/wos/woscc/full-record/WOS:000364209000025.[45] Ling, Jianhui, Li, Huiyun, Xu, Guoqing, Xiong, Liying, IEEE. Stochastic Wire-length Model with TSV Placement on Periphery Area. 2014 IEEE 16TH ELECTRONICS PACKAGING TECHNOLOGY CONFERENCE (EPTC)null. 2014, 5-10, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380491200038.[46] Shao, Cuiping, Li, Huiyun, Xu, Guoqing, Xiong, Liying. Design for security test against fault injection attacks. ELECTRONICS LETTERS[J]. 2014, 50(23): 1677-U119, http://dx.doi.org/10.1049/el.2014.1666.[47] Ye Can, Li Huiyun, Xu Guoqing, IEEE. An Early Warning Model of Traffic Accidents Based on Fractal Theory. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC)null. 2014, 2280-2285, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000357868702057.[48] Wu, Keke, Li, Huiyun, Zhu, Dingju. Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems. SECURITY AND COMMUNICATION NETWORKS[J]. 2012, 5(6): 648-657, https://www.webofscience.com/wos/woscc/full-record/WOS:000304157500008.[49] 朱洪宇, 李慧云, 徐国卿. 一种基于直方图的ADC静态参数内建自测试设计方案. 微电子学与计算机[J]. 2012, 29(12): 112-115, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=4714391&detailType=1.[50] Li, Huiyun, Yuan, Hai. Dependability evaluation of integrated circuits at design time against laser fault injection. SECURITY AND COMMUNICATION NETWORKS[J]. 2012, 5(5): 450-461, https://www.webofscience.com/wos/woscc/full-record/WOS:000302947400002.[51] Li, Huiyun, Wu, Keke, Yu, Fengqi. Enhanced correlation power analysis attack against trusted systems. SECURITY AND COMMUNICATION NETWORKS[J]. 2011, 4(1): 3-10, https://www.webofscience.com/wos/woscc/full-record/WOS:000286073200002.[52] Wu Keke, Li Huiyun, Zhu Dingju, Yu Fengqi. Efficient Solution to Secure ECC Against Side-channel Attacks. CHINESE JOURNAL OF ELECTRONICS[J]. 2011, 20(3): 471-475, http://lib.cqvip.com/Qikan/Article/Detail?id=38822535.[53] Li Huiyun, Wu Keke, Xu Guoqing, Yuan Hai, Luo Peng. Simple power analysis attacks using chosen message against ecc hardware implementations. WORLD CONGRESS ON INTERNET SECURITY, WORLDCIS-2011null. 2011, 68-72, http://124.16.136.157/handle/311060/14227.[54] Li Huiyun. Dependability Evaluation of Integrated Circuit at Design Time against Laser Fault Injection. Wiley Journal of Security and Communication Networks. 2011, [55] 邬可可, 李慧云, 于峰崎. 对同步流密码设备的相关性功耗分析(CPA)攻击. 高技术通讯[J]. 2009, 19(11): 1142-1147, http://lib.cqvip.com/Qikan/Article/Detail?id=32249622.[56] Wu Keke, Li Huiyun, Peng Bo, Yu Fengqi, Wang GJ, Chen J, Fellows MR, Ma HD. Correlation Power Analysis Attack against Synchronous Stream Ciphers. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5null. 2008, 2067-+, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000269081801040.[57] Wang Jianping, Li Huiyun, Yu Fengqi, IEEE. Design of Secure and Low-cost RFID Tag Baseband. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15null. 2007, 2066-2069, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000262098301159.