当前位置: 实验室首页 > 研究团队 > 教师 > 正文
邰若晨
来源: 时间:2025-02-21 浏览:

undefined


姓名:邰若晨

职称:教授

电话:027-87558001

邮箱:ruochen_tai@hust.edu.cn


个人简介      

邰若晨,教授,国家级青年人才。2016年获得南京理工大学学士学位,2019年获得上海交通大学硕士学位,2023年获得新加坡南洋理工大学博士学位,2023年至2024年期间在新加坡南洋理工大学从事博士后研究工作。长期从事信息物理系统安全与智能机器人技术相关领域的研究,近年来在IEEE Transactions on Automatic Control、Automatica、IEEE/ ASME Transactions on Mechatronics、IEEE Control Systems Letters、中国科学·技术科学、IEEE Conference on Decision and Control等重要期刊和会议上发表20余篇学术论文,其中在控制领域顶刊IEEE Transactions on Automatic Control和Automatica发表第一作者论文6篇(常文3篇);获授权国家发明专利2项;获IEEE International Conference on Robotics and Biomimetics (ROBIO)最佳论文奖提名;获新加坡南洋理工大学2024年最佳博士论文奖;担任18th International Conference on Control, Automation, Robotics and Vision (ICARCV 2024)的Track Co-Chair(PC member);与新加坡、美国、法国、荷兰、塞浦路斯等国多所大学开展全方位学术交流和合作研究。


科学研究

研究方向:

1) 信息物理系统安全(包括但不限于工业控制系统安全、无人驾驶信息安全、多机器人协作安全、智能交通系统安全等);

2) 智能机器人技术(包括但不限于多机器人协同感知、多机器人任务规划与自主决策、软体机器人的感知、建模、控制、规划等)。

发表论文:

1) 信息物理系统安全

[1] R. Tai, L. Lin, Y. Zhu, and R. Su, “Synthesis of Distributed Covert Sensor-Actuator Attacks,” IEEE Transactions on Automatic Control, 69(8), pp. 4942-4957, 2024.

[2] R. Tai, L. Lin, and R. Su, “On decidability of existence of fortified supervisors against covert actuator attackers,” IEEE Transactions on Automatic Control, 69(3), pp. 1898-1905, 2024.

[3] R. Tai, L. Lin, and R. Su, “Synthesis of optimal covert sensor–actuator attackers for discrete-event systems,” Automatica, 151, pp. 110910, 2023.

[4] R. Tai, L. Lin, Y. Zhu, and R. Su, “Privacy-preserving co-synthesis against sensor–actuator eavesdropping intruder,” Automatica, 150, pp. 110860, 2023.

[5] R. Tai, L. Lin, Y. Zhu, and R. Su, “Synthesis of Distributed Covert Sensor-Actuator Attacks,” IEEE Transactions on Automatic Control, 68(6), pp. 3453-3468, 2023.

[6] R. Tai, L. Lin, Y. Zhu, and R. Su, “A new modeling framework for networked discrete-event systems,” Automatica, 138, pp. 110139, 2022.

[7] R. Tai, L. Lin, and R. Su, “Identification of System Vulnerability under A Smart Sensor Attack via Attack Model Reduction,” IEEE Control Systems Letters, 6, pp. 2948-2953, 2022.

[8] R. Tai, L. Lin, and R. Su, “On Decidability of Existence of Resilient Supervisors Against Covert Sensor-Actuator Attacks,” Proc. 63nd IEEE Conference on Decision and Control (CDC 2024), 2024.

[9] R. Tai, L. Lin, and R. Su, “Supervisor Fortification Against Covert Actuator Attacks,” Proc. 62nd IEEE Conference on Decision and Control (CDC 2023), pp. 7917-7922, 2023.

[10] R. Tai, L. Lin, R. Su, and S. S. Ge, “Covert Attack Synthesis for Networked Discrete-Event Systems,” IFAC-PapersOnLine, 56(2), pp. 3566-3571, 2023.

[11] Y. Shen, C. Zhou, X. Hu, C. Cheng, X. He, R. Tai∗, “Design of Privacy-Preserving Control Strategy for Data Opacity of Industrial Internet,” SCIENTIA SINICA Technologica (中国科学·技术科学), 52(1), pp. 138-151, 2022.

[12] L. Lin, Y. Zhu, R. Tai, S. Ware, and R. Su, “Networked Supervisor Synthesis Against Lossy Channels with Bounded Network Delays as Non-Networked Synthesis,” Automatica, 142, pp. 110279, 2022.

[13] L. Lin, R. Tai, Y. Zhu, and R. Su, “Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors,” Journal of Discrete Event Dynamic Systems: Theory and Applications, 32, pp. 495-520, 2022.

[14] Y. Zhu, L. Lin, R. Tai, and R. Su, “Overview of Networked Supervisory Control with Imperfect Communication Channels,” Journal of Discrete Event Dynamic Systems: Theory and Applications, 33, pp. 25-61, 2022.

[15] L. Lin, R. Tai, Y. Zhu, and R. Su, “Heuristic Synthesis of Covert Attackers Against Unknown Supervisors,” Proc. 60th IEEE Conference on Decision and Control (CDC 2021), pp. 7003-7008, 2021.

[16] Y. Zhu, L. Lin, R. Tai, and R. Su, “Distributed Control of Timed Networked System Against Communication Delays,” Proc. 17th IEEE International Conference on Control & Automation (ICCA 2022), pp. 1008-1013, 2022.

[17] Y. Zhu, L. Lin, R. Tai, and R. Su, “Supervisor Synthesis for Networked Discrete Event Systems with Delays Against Non-FIFO Communication Channels,” Proc. 16th International Conference on Control, Automation, Robotics and Vision (ICARCV 2020), pp. 1027-1032, 2020.


2) 智能机器人技术

[1] Y. Shen, R. Tai, J. Zhang, L. Deng, Y. Yuan, R. Su, F. Zhang, and H. Ding,“Planning and Motion Control for Underwater Bimanual Soft Manipulator in Underwater Grasping Task,” IEEE/ASME Transactions on Mechatronics, 29(4), pp. 2487-2498, 2024.

[2] R. Tai, J. Wang, and W. Chen, “A Prioritized Planning Algorithm of Trajectory Coordination Based on Time Windows for Multiple AGVs with Delay Disturbance,” Robotic Intelligence and Automation, 39(5), pp. 753-768, 2019.

[3] J. Wang, R. Tai, and J. Xu, “A Bi-Level Probabilistic Path Planning Algorithm for Multiple Robots with Motion Uncertainty,” Complexity, 2020.

[4] R. Tai, J. Wang, W. Tian, W. Chen, H. Wang and Y. Zhou, “A Time-Efficient Approach to Solve Conflicts and Deadlocks for Scheduling AGVs in Warehousing Applications,” 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR 2018), pp.166-171, 2018.

[5]Y. Shen, Y. Hong, W. Zhou, R. Tai, Y. Yuan, and H. Ding, “Manipulability and Robustness Optimization of the Cable-Driven Redundant Soft Manipulator,” 2021 IEEE International Conference on Robotics and Biomimetics (ROBIO 2021), pp. 864-869, 2021. (最佳论文奖提名)


授权发明专利:

[1] 程骋;胡飞宇;沈逸;岳作功;杨立仁;邰若晨. 基于并联驱动方式的柔性机械臂腕,2025-01-14,中国,ZL202410349300.4

[2] 杨立仁;杨皓天;胡飞宇;沈逸;岳作功;程骋;邰若晨. 并联柔性机械腕的控制方法,2024-10-08,中国,ZL202410653854.3