Lei Zhu

ORCID: 0000-0001-5925-5743
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Geotechnical Engineering and Underground Structures
  • Blockchain Technology Applications and Security
  • Geoscience and Mining Technology
  • Civil and Geotechnical Engineering Research
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Machine Fault Diagnosis Techniques
  • Infrastructure Maintenance and Monitoring
  • Network Security and Intrusion Detection
  • Smart Grid and Power Systems
  • Traffic Prediction and Management Techniques
  • Advanced Steganography and Watermarking Techniques
  • Advanced Fiber Optic Sensors
  • Geotechnical Engineering and Analysis
  • High-Voltage Power Transmission Systems
  • Grouting, Rheology, and Soil Mechanics
  • Geomechanics and Mining Engineering
  • Advanced Algorithms and Applications
  • Railway Engineering and Dynamics
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • Software Engineering Research
  • Topic Modeling
  • Coal Combustion and Slurry Processing

China Coal Research Institute (China)
2021-2025

Energy Research Institute
2021-2025

Xi'an University of Science and Technology
2008-2025

Xi'an University of Technology
2010-2024

China Coal Technology and Engineering Group Corp (China)
2019-2024

Wuhan Sixth Hospital
2024

Weatherford College
2024

Xi’an University
2023

Hefei University
2016-2021

Xi'an Railway Survey and Design Institute
2020

6 G and mobile Internet-of-Vehicles (IoV) technology require a secure, open, transparent system. Blockchain has the characteristics of decentralization, non-tampering, traceability, which can improve robustness, data privacy, security transparency overall Therefore, blockchain will be most promising to ensure privacy vehicle networks. In this article, we propose novel IoV block-streaming service awareness trusted verification in G. The edge node uploads microservices calling diagram network....

10.1109/tvt.2021.3063783 article EN IEEE Transactions on Vehicular Technology 2021-03-05

Slurry filling technology has been increasingly adopted in coal mines the northwest region. However, due to complexity of slurry transport pipelines, blockages remain a frequent issue. These can reduce operational efficiency, with different blockage types causing varying levels damage. Despite significance this issue, there is limited in-depth analysis literature, especially regarding role pressure pipeline blockages. This study utilizes FLUENT 2020R2 (the fluid simulation software) for...

10.3390/app15041957 article EN cc-by Applied Sciences 2025-02-13

Hypertensive heart disease was difficult to cure with drugs, and most patients had poor compliance, leading recurrent quality of life. The intelligent management mode based on the Internet Things avoided excessive dependence elderly medical institutions in traditional model enabled monitor themselves. This study aimed explore impact self-management ability prognosis hypertensive disease. A total 150 who received treatment from April 2020 2022 were selected divided into control group (n = 75...

10.1097/md.0000000000038179 article EN cc-by-nc Medicine 2024-05-31

With the development of intelligent transportation system, maintenance railway turnout is an essential daily task which was required to be efficiency and automatically. This paper presents diagnosis method based on deep learning curve segmentation Support Vector Machine. Firstly, we studied approach real-time monitoring power data collected form turnout, for step do a great help improve diagnose accuracy. Then well pre-processed sets, SVM algorithm applied classify samples report health...

10.3233/jifs-189688 article EN Journal of Intelligent & Fuzzy Systems 2021-01-22

In recent years, with the rapid increase in coverage and lines, security maintenance has become one of top concerns regard to railway transportation China. As key infrastructure, turnout system (RTS) plays a vital role transportation, which will cause incalculable losses when accidents occur. The traditional fault-diagnosis methods RTS are no longer applicable growing amount data, so intelligent fault diagnosis research hotspot. However, challenge is effectively extract deep features signal...

10.3390/s22239438 article EN cc-by Sensors 2022-12-02

Mobile edge computing (MEC), as the key technology to improve user experience in a 5G network, can effectively reduce network transmission delay. Task migration migrate complex tasks remote servers through wireless networks, solving problems of insufficient capacity and limited battery mobile terminals. Therefore, order solve problem "how realize low-energy dependent applications," subtask partitioning model with minimum energy consumption is constructed based on relationship between...

10.1186/s13638-019-1469-2 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-05-27

With the rapid development of 5G technology, its high bandwidth, reliability, low delay, and large connection characteristics have opened up a broader application field IoT. Moreover, AIoT (Artificial Intelligence Internet Things) has become new direction Through deep learning real-time data provided by Things, AI can judge user habits more accurately, make devices behave in line with expectations, intelligent, thus improving product experience. However, process, there is lot interaction...

10.1155/2021/5510857 article EN cc-by Mobile Information Systems 2021-06-24

Abstract Identifying the change‐prone parts of software could help managers and developers to effectively allocate maintenance resource time during early phases life cycle. Change‐proneness prediction on file level with binary classification methods makes such identification possible. As fact that files frequently account for a small part all files, performance standard is not satisfying. In this paper, we employ imbalanced learning methods, including bagging, resampling, especially their...

10.1002/smr.2111 article EN Journal of Software Evolution and Process 2018-10-12

The pervasiveness of personalized collaborative recommender systems has shown the powerful capability in a wide range E-commerce services such as Amazon, TripAdvisor, Yelp, etc. However, fundamental vulnerabilities leave space for malicious users to affect recommendation results attackers desire. A vast majority existing detection methods assume certain properties attacks are given advance. In reality, improving performance is usually constrained due challenging issues: (a) various types...

10.1109/tifs.2020.2977023 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

This paper analyses characteristics of single-phase ground fault and presents a line selecting method based on wavelet transform. Base Sampling frequency, it selects the special frequency band, singularity detection with is employed to obtain polarities magnitudes abrupt current, through comparing circuit can be determined. So technique correct, feasible, proved by great deal simulating tests.

10.1109/gcis.2010.36 article EN 2010-12-01

Internet of things is characterized by limited energy and distributed topology. In this scenario, a secure energy-saving routing algorithm plays significant role in ensuring the performance things. Due to different standards communication stacks, traditional security mechanisms heavily rely on trust management function well. article, we propose an energy-aware trustworthy multi-hop model for To balance consumption trust, whole from source destination should be considered appraisal, rather...

10.1177/1550147718818689 article EN cc-by International Journal of Distributed Sensor Networks 2018-12-01

In a high-speed rail system, the driver repeatedly adjusts train’s speed and traction while driving, causing high level of energy consumption. This also leads to instability operation, affecting passengers’ experiences operational efficiency system. To solve this problem, we propose variational graph auto-encoder (VGAE) model using neural network learn posterior distribution. can effectively capture correlation between components system simulate drivers’ operating state accurately. The...

10.3390/app14052037 article EN cc-by Applied Sciences 2024-02-29

<title>Abstract</title> Gangue-filled mining technology represents the significant advancement in green mining. To investigate mechanism of pressure reduction gangue-filled and sensitivity main controlling factors, mechanical model was first developed based on advanced support The method for calculating filled derived from beam structural stress characteristics. Then, numerical simulation methods were employed to analyze patterns geological conditions. Finally, orthogonal experiments...

10.21203/rs.3.rs-4974774/v1 preprint EN Research Square (Research Square) 2024-10-04

Diffusion models, such as Stable Diffusion, have made significant strides in visual generation, yet their paradigm remains fundamentally different from autoregressive language complicating the development of unified language-vision models. Recent efforts like LlamaGen attempted image generation using discrete VQVAE tokens, but large number tokens involved renders this approach inefficient and slow. In work, we present Meissonic, which elevates non-autoregressive masked modeling (MIM)...

10.48550/arxiv.2410.08261 preprint EN arXiv (Cornell University) 2024-10-10

Slurry filling technology has gradually been adopted in coal mines the northwest region. However, due to complexity of slurry transport pipelines, blockages remain a frequent issue. Pipeline can adversely impact production, reducing operational efficiency, with different blockage types causing varying degrees harm. Despite significance this issue, there is limited in-depth analysis literature, especially regarding role pressure pipeline blockages. This study utilizes FLUENT software for...

10.20944/preprints202412.1497.v1 preprint EN 2024-12-18

In recent years, with the continuous promotion of blockchain technology, application smart contracts has shown an explosive growth trend, and contract vulnerabilities seriously threaten ecological security blockchain. Aiming at inefficiency existing Symbolic Execution vulnerability detection this paper proposes effective method source code level. Firstly, we define critical path. As attackers typically aim to steal or freeze funds, path related fund transfer as path, its instructions are...

10.1145/3594556.3594618 article EN 2023-07-10

In a (k, n) secret sharing scheme, k or more qualified shareholders can reconstruct the secret, but less than of them are unable to get any information about secret. The schemes with cheating detection were designed solve problem that some vicious participants (cheaters) release forged shares in reconstruction. We divide cheaters into inside and outside based on their different identities. who aim cheat other honest shareholders, disqualified do not receive from dealer, they try filch valid...

10.1109/nana.2016.45 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2016-07-01

Recently, more and shield-driven construction projects have to cross over or under the existing metro line in soft soil China. To evaluate influence of such construction, three major factors were studied this article based on monitoring data. They vertical interval between two tunnels, projection angel synchronous grouting rate. The linear regression formulas also obtained show trends displacement during overcrossing undercrossing projects.

10.4028/www.scientific.net/amm.204-208.1413 article EN Applied Mechanics and Materials 2012-10-01
Coming Soon ...