Wei Xing

ORCID: 0000-0001-5729-5186
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Stability and Control of Uncertain Systems
  • Software-Defined Networks and 5G
  • Fault Detection and Control Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Embedded Systems Design Techniques
  • Advanced Control Systems Optimization
  • Security in Wireless Sensor Networks
  • VLSI and Analog Circuit Testing
  • Energy Harvesting in Wireless Networks
  • Network Time Synchronization Technologies
  • VLSI and FPGA Design Techniques
  • Distributed Sensor Networks and Detection Algorithms
  • Information and Cyber Security
  • Age of Information Optimization
  • Web Data Mining and Analysis
  • Security and Verification in Computing
  • Cognitive Radio Networks and Spectrum Sensing
  • Outsourcing and Supply Chain Management
  • Quantum Mechanics and Applications
  • Neural Networks Stability and Synchronization
  • Vehicular Ad Hoc Networks (VANETs)
  • Blockchain Technology Applications and Security
  • Optimization and Search Problems

Hainan University
2024-2025

Dalian University of Technology
2007-2024

Nanjing University of Aeronautics and Astronautics
2024

China Mobile (China)
2023

State Key Laboratory of Mobile Networks and Mobile Multimedia Technology
2023

Hefei University of Technology
2023

Air Force Engineering University
2020

Chinese University of Hong Kong
2015

University of Science and Technology Beijing
2014

Nanjing Normal University
2012

In this article, the problem of model-based dynamic event-triggered control (ETC) cyber-physical systems (CPSs) with quantization effects and denial-of-service (DoS) attacks is studied. With aid a technique combining CPSs ETC scheme, number transmissions significantly reduced to save scarce network resources. An average dwell-time (ADT) automaton time-ratio monitor are firstly introduced describe frequency duration DoS attacks, then unified hybrid framework quantizer established. presence...

10.1109/tnse.2022.3163783 article EN IEEE Transactions on Network Science and Engineering 2022-03-31

This article presents a co-design method of dynamic periodic event-triggering mechanism (DPETM) and output-based control law for networked systems (NCSs) subject to inevitable imperfections such as limited network resources, exogenous disturbances successive packet dropouts. The developed DPETM has the potential make full use scarce resources compared sampled-data on one hand, is natural practical digital platforms instead discretized version continuous event-triggered (CETC) other hand. In...

10.1109/tase.2023.3235375 article EN IEEE Transactions on Automation Science and Engineering 2023-01-19

remote state estimation for an arbitrary tree topology in cyber-physical systems (CPSs) subject to Denial-of-Service (DoS) attacks. A sensor transmits its local the root node of tree, and optimal child nodes until leaf are reached. In meanwhile, a malicious attacker can jam all communication channels strategically connected attacked node. With energy constraints mind, both defender adopt strategies that involve allocating determine which protect or attack at each time step. Bayesian...

10.1109/tsipn.2024.3394776 article EN IEEE Transactions on Signal and Information Processing over Networks 2024-01-01

This paper investigates the problem of optimizing transmission schedule between a sensor and relay in cyber-physical systems to achieve accurate remote state estimation. The considered system model represents plant as linear time-invariant system, wherein measurements are transmitted estimator using an intelligent relay. Both nodes capable harvesting energy from external environment, they required make decisions at each time step ensure stability system's operation. In addition, sharing...

10.1109/tgcn.2025.3528189 article EN IEEE Transactions on Green Communications and Networking 2025-01-01

The ability to find tables and extract information from them is a necessary component of data mining, question answering, other retrieval tasks. Documents often contain in order communicate densely packed, multi-dimensional information. Tables do this by employing layout patterns efficiently indicate fields records two-dimensional form.Their rich combination formatting content present difficulties for traditional language modeling techniques, however. This paper presents the use conditional...

10.1145/860476.860479 article EN Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval - SIGIR '03 2003-01-01

Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial explore CPS control. In this review, we systematically examine the prevalent attacks affecting CPSs, such as denial of service, false data injection, replay attacks, explaining...

10.3390/s24123815 article EN cc-by Sensors 2024-06-13

This article considers remote state estimation in cyber-physical systems (CPSs) with multiple sensors. Each plant is modeled by a discrete-time stochastic linear system measurements of each sensor transmitted to the corresponding estimator over shared communication network when their securities are interdependent due network-induced risks. A dynamic nonzero-sum game asymmetric information formulated which subject resource budget constraint needs decide whether invest security for sending...

10.1109/tac.2021.3116093 article EN IEEE Transactions on Automatic Control 2021-09-28

In this paper, an event-based physical watermark is proposed and analyzed. It well known that adding watermarks into Cyber-Physical Systems (CPSs) effective way to combat malicious attacks. However, the classical ways are based on time, which leads great decreases in Linear Quadratic Gaussian (LQG) performances while increasing detection rates. To deal with performance loss after watermarks, designed detect replay A stochastic event scheduler innovation sequence constructed indicate or not....

10.1109/tcns.2023.3331161 article EN IEEE Transactions on Control of Network Systems 2023-11-08

This paper concentrates on the optimal denial-of-service (DoS) attack power allocation strategy for remote state estimation in cyber-physical systems with two-hop networks. An intelligent relay assumption that it can conduct some simple recursive algorithms aims at transmitting system process across a vulnerable communication channel to estimator, referred as cooperative sensor. In meantime, malicious attacker disrupts transmission strategically deteriorate performance of system, but do this...

10.1109/tgcn.2023.3235118 article EN IEEE Transactions on Green Communications and Networking 2023-01-09

Complex (or Composite) event processing systems have become more popular in a number of areas.Non-deterministic finite automata (NFA) are frequently used to evaluate CEP queries.However, it is complex or difficult use the traditional NFA-based method process patterns with conjunction and negation.In this paper, we proposed new system LogCEP using pushdown automaton support efficient negation.First, semantic query language specification presented.Then, an named LogPDA for system.LogPDA...

10.14257/ijhit.2014.7.6.06 article EN International Journal of Hybrid Information Technology 2014-11-30

CVD diamond films have been used in many high-tech fields with the industrial and scientific developments, while lagging of polishing technology for has limited their widely applications. This paper presents a high-efficient low-cost wheel-grinding polishing, two key techniques this are introduced detail based on thermo-chemical technology. Furthermore, wheel grinding exhibits promising perspective application films.

10.4028/www.scientific.net/amr.24-25.295 article EN Advanced materials research 2007-09-01

A macro block is a functional unit that can be re-used in circuit designs. The problem of general mapping to identify such embedded parts, whose I/O signals are unknown, from the netlist may have been optimized various ways. results then used ease verification process or for replacement by more advanced intellectual property (IP) macros. In past literatures, mostly limited identification single adder multiplier with given, which already NP-hard. However, today's typical arithmetic circuits...

10.7873/date.2015.0746 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2015-01-01

Dynamic programing (DP) algorithm is frequently utilized in studies to solve the energy management schemes (EMS) of hybrid electric vehicles (HEVs). The results this method are global optimal but computationally inefficient. This paper proposed a rapid approximate DP (RADP) improve time complexity an off-line EMS for series-parallel HEVs. key step shorten search domain at each grid point by calculating constraint variables and check constraints before implement Bellman equation. demonstrate...

10.1177/09544070221105399 article EN Proceedings of the Institution of Mechanical Engineers Part D Journal of Automobile Engineering 2022-06-17

10.1109/tnse.2024.3519624 article EN IEEE Transactions on Network Science and Engineering 2024-12-18

This paper considers the problem of remote state estimation in a linear discrete invariant system, where smart sensor is utilized to measure system and generate local estimate. The communication depends on an event scheduler sensor. When channel between estimator activated, simply adopts estimate transmitted by Otherwise, it calculates based available information. closed-form minimum mean-square error (MMSE) introduced, we use Gaussian preserving event-based scheduling obtain ideal...

10.3390/electronics10182215 article EN Electronics 2021-09-10
Coming Soon ...