- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Stability and Control of Uncertain Systems
- Software-Defined Networks and 5G
- Fault Detection and Control Systems
- Physical Unclonable Functions (PUFs) and Hardware Security
- Embedded Systems Design Techniques
- Advanced Control Systems Optimization
- Security in Wireless Sensor Networks
- VLSI and Analog Circuit Testing
- Energy Harvesting in Wireless Networks
- Network Time Synchronization Technologies
- VLSI and FPGA Design Techniques
- Distributed Sensor Networks and Detection Algorithms
- Information and Cyber Security
- Age of Information Optimization
- Web Data Mining and Analysis
- Security and Verification in Computing
- Cognitive Radio Networks and Spectrum Sensing
- Outsourcing and Supply Chain Management
- Quantum Mechanics and Applications
- Neural Networks Stability and Synchronization
- Vehicular Ad Hoc Networks (VANETs)
- Blockchain Technology Applications and Security
- Optimization and Search Problems
Hainan University
2024-2025
Dalian University of Technology
2007-2024
Nanjing University of Aeronautics and Astronautics
2024
China Mobile (China)
2023
State Key Laboratory of Mobile Networks and Mobile Multimedia Technology
2023
Hefei University of Technology
2023
Air Force Engineering University
2020
Chinese University of Hong Kong
2015
University of Science and Technology Beijing
2014
Nanjing Normal University
2012
In this article, the problem of model-based dynamic event-triggered control (ETC) cyber-physical systems (CPSs) with quantization effects and denial-of-service (DoS) attacks is studied. With aid a technique combining CPSs ETC scheme, number transmissions significantly reduced to save scarce network resources. An average dwell-time (ADT) automaton time-ratio monitor are firstly introduced describe frequency duration DoS attacks, then unified hybrid framework quantizer established. presence...
This article presents a co-design method of dynamic periodic event-triggering mechanism (DPETM) and output-based control law for networked systems (NCSs) subject to inevitable imperfections such as limited network resources, exogenous disturbances successive packet dropouts. The developed DPETM has the potential make full use scarce resources compared sampled-data on one hand, is natural practical digital platforms instead discretized version continuous event-triggered (CETC) other hand. In...
remote state estimation for an arbitrary tree topology in cyber-physical systems (CPSs) subject to Denial-of-Service (DoS) attacks. A sensor transmits its local the root node of tree, and optimal child nodes until leaf are reached. In meanwhile, a malicious attacker can jam all communication channels strategically connected attacked node. With energy constraints mind, both defender adopt strategies that involve allocating determine which protect or attack at each time step. Bayesian...
This paper investigates the problem of optimizing transmission schedule between a sensor and relay in cyber-physical systems to achieve accurate remote state estimation. The considered system model represents plant as linear time-invariant system, wherein measurements are transmitted estimator using an intelligent relay. Both nodes capable harvesting energy from external environment, they required make decisions at each time step ensure stability system's operation. In addition, sharing...
The ability to find tables and extract information from them is a necessary component of data mining, question answering, other retrieval tasks. Documents often contain in order communicate densely packed, multi-dimensional information. Tables do this by employing layout patterns efficiently indicate fields records two-dimensional form.Their rich combination formatting content present difficulties for traditional language modeling techniques, however. This paper presents the use conditional...
Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial explore CPS control. In this review, we systematically examine the prevalent attacks affecting CPSs, such as denial of service, false data injection, replay attacks, explaining...
This article considers remote state estimation in cyber-physical systems (CPSs) with multiple sensors. Each plant is modeled by a discrete-time stochastic linear system measurements of each sensor transmitted to the corresponding estimator over shared communication network when their securities are interdependent due network-induced risks. A dynamic nonzero-sum game asymmetric information formulated which subject resource budget constraint needs decide whether invest security for sending...
In this paper, an event-based physical watermark is proposed and analyzed. It well known that adding watermarks into Cyber-Physical Systems (CPSs) effective way to combat malicious attacks. However, the classical ways are based on time, which leads great decreases in Linear Quadratic Gaussian (LQG) performances while increasing detection rates. To deal with performance loss after watermarks, designed detect replay A stochastic event scheduler innovation sequence constructed indicate or not....
This paper concentrates on the optimal denial-of-service (DoS) attack power allocation strategy for remote state estimation in cyber-physical systems with two-hop networks. An intelligent relay assumption that it can conduct some simple recursive algorithms aims at transmitting system process across a vulnerable communication channel to estimator, referred as cooperative sensor. In meantime, malicious attacker disrupts transmission strategically deteriorate performance of system, but do this...
Complex (or Composite) event processing systems have become more popular in a number of areas.Non-deterministic finite automata (NFA) are frequently used to evaluate CEP queries.However, it is complex or difficult use the traditional NFA-based method process patterns with conjunction and negation.In this paper, we proposed new system LogCEP using pushdown automaton support efficient negation.First, semantic query language specification presented.Then, an named LogPDA for system.LogPDA...
CVD diamond films have been used in many high-tech fields with the industrial and scientific developments, while lagging of polishing technology for has limited their widely applications. This paper presents a high-efficient low-cost wheel-grinding polishing, two key techniques this are introduced detail based on thermo-chemical technology. Furthermore, wheel grinding exhibits promising perspective application films.
A macro block is a functional unit that can be re-used in circuit designs. The problem of general mapping to identify such embedded parts, whose I/O signals are unknown, from the netlist may have been optimized various ways. results then used ease verification process or for replacement by more advanced intellectual property (IP) macros. In past literatures, mostly limited identification single adder multiplier with given, which already NP-hard. However, today's typical arithmetic circuits...
Dynamic programing (DP) algorithm is frequently utilized in studies to solve the energy management schemes (EMS) of hybrid electric vehicles (HEVs). The results this method are global optimal but computationally inefficient. This paper proposed a rapid approximate DP (RADP) improve time complexity an off-line EMS for series-parallel HEVs. key step shorten search domain at each grid point by calculating constraint variables and check constraints before implement Bellman equation. demonstrate...
This paper considers the problem of remote state estimation in a linear discrete invariant system, where smart sensor is utilized to measure system and generate local estimate. The communication depends on an event scheduler sensor. When channel between estimator activated, simply adopts estimate transmitted by Otherwise, it calculates based available information. closed-form minimum mean-square error (MMSE) introduced, we use Gaussian preserving event-based scheduling obtain ideal...