- Smart Grid Security and Resilience
- Infrastructure Resilience and Vulnerability Analysis
- Microtubule and mitosis dynamics
- Supramolecular Chemistry and Complexes
- Distributed Control Multi-Agent Systems
- Opinion Dynamics and Social Influence
- Smart Grid Energy Management
- Information and Cyber Security
- Complex Network Analysis Techniques
- Game Theory and Applications
- Microgrid Control and Optimization
- Network Security and Intrusion Detection
- Synthesis and Characterization of Heterocyclic Compounds
- Quantum Computing Algorithms and Architecture
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Cancer-related molecular mechanisms research
- COVID-19 epidemiological studies
- Military Defense Systems Analysis
- Quantum Information and Cryptography
- Wood and Agarwood Research
- Opportunistic and Delay-Tolerant Networks
Fordham University
2020-2025
Sun Yat-sen University
2022-2024
Shandong University of Science and Technology
2021-2024
Sichuan University
2023-2024
Shantou University
2024
Shantou University Medical College
2024
Macao Polytechnic University
2024
Guangzhou City Polytechnic
2024
Wuhan University
2024
Sun Yat-sen Memorial Hospital
2024
The integration of microgrids that depend on the renewable distributed energy resources with current power systems is a critical issue in smart grid. In this paper, we propose non-cooperative game-theoretic framework to study strategic behavior generate energies and characterize generation solutions by using Nash equilibrium concept. Our not only incorporates economic factors but also takes into account stability efficiency microgrids, including flow constraints voltage angle regulations. We...
In this paper, we aim to establish a holistic framework that integrates the cyber-physical layers of cloud-enabled Internet Controlled Things (IoCT) through lens contract theory. At physical layer, device uses cloud services operate system. The quality is unknown device, and hence designs menu contracts enable reliable incentive-compatible service. Based on received contracts, service provider (SP) serves by determining its optimal cyber defense strategy. A contract-based FlipCloud game used...
Renal fibrosis is a common pathological feature and outcome of almost all chronic kidney diseases, it characterized by metabolic reprogramming toward aerobic glycolysis. Mesenchymal stem cell-derived exosomes (MSC-Exos) have been proposed as promising therapeutic approach for renal fibrosis. In this study, we investigated the effect MSC-Exos on glycolysis underlying mechanisms. We demonstrated that significantly ameliorated unilateral ureter obstruction (UUO)-induced inhibiting in tubular...
Triple-negative breast cancer (TNBC), an aggressive subtype of with higher rates early relapse and metastasis, is frequently associated aberrant activation epithelial-mesenchymal transition (EMT). Nonetheless, how EMT initiated regulated during TNBC progression not well understood. Here, we report that NUMB a negative regulator in both human mammary epithelial cells cells. Reduced expression was significantly elevated TNBC. Conversely, overexpression strongly attenuated the program...
With the increasing connectivity enabled by Internet of Things (IoT), security becomes a critical concern, and users should invest to secure their IoT applications. Due massive devices in network, cannot be aware policies taken all its connected neighbors. Instead, user makes decisions based on cyber risks that he perceives observing selected number nodes. To this end, we propose model which incorporates limited attention or bounded rationality nature players IoT. Specifically, each...
The cloud-enabled Internet of controlled things (IoCT) envisions a network sensors, controllers, and actuators connected through local cloud in order to intelligently control physical devices. Because services are vulnerable advanced persistent threats (APTs), each device the IoCT must strategically decide whether trust that may be compromised. In this paper, we present iSTRICT, an interdependent strategic mechanism for IoCT. iSTRICT is composed three layers. layer, uses FlipIt games...
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure resilient networked system is essential for providing reliable dependable services. To this end, we establish two-player three-stage game framework capture the dynamics in infrastructure protection recovery phases. Specifically, goal of network designer keep connected before after attack, while adversary aims disconnect by compromising set links. With costs creating removing links, two players aim...
The global accumulation and adverse effects of nanoplastics (NPs) are a growing concern for the environment human health. In recent years, more studies have begun to focus on toxicity plastic particles early animal development. Different particle sizes different toxicities biological Nevertheless, potential toxicological 20 nm NPs, especially neurodevelopment, not been well investigated. this paper, we used fluorescence microscopy determine neurotoxicity in zebrafish at concentrations NPs....
The pursuit of sustainability motivates microgrids that depend on distributed resources to produce more renewable energies. An efficient operation and planning relies a holistic framework takes into account the interdependent decision-making generators existing power grids microgrid in integrated system. To this end, we use Stackelberg game-theoretic study interactions between (leaders) (followers). Entities both sides make strategic decisions amount generation maximize their payoffs. Our...
Repository-level code generation remains challenging due to complex dependencies and the limitations of large language models (LLMs) in processing long contexts. While retrieval-augmented (RAG) frameworks are widely adopted, effectiveness different retrieved information sources-contextual code, APIs, similar snippets-has not been rigorously analyzed. Through an empirical study on two benchmarks, we demonstrate that in-context potential API significantly enhance LLM performance, whereas often...
Modern control systems are featured by their hierarchical structure composed of cyber, physical and human layers. The intricate dependencies among multiple layers units modern require an integrated framework to address cross-layer design issues related security resilience challenges. To this end, game theory provides a bottom-up modeling paradigm capture the strategic interactions components complex system enables holistic view understand cyber-physical-human systems. In review, we first...
Network connectivity plays an important role in the information exchange between different agents multi-level networks. In this paper, we establish a game-theoretic framework to capture uncoordinated nature of decision-making at layers Specifically, design decentralized algorithm that aims maximize algebraic global network iteratively. addition, show designed converges Nash equilibrium asymptotically and yields network. To study resiliency, introduce three adversarial attack models...
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure resilient networked system is essential for providing reliable dependable services. To this end, we establish two-player three-stage game framework capture the dynamics in infrastructure protection recovery phases. Specifically, goal of network designer keep connected before after attack, while adversary aims disconnect by compromising set links. With costs creating removing links, two players aim...
The increasing connectivity between critical infrastructures creates a network of networks in which the interdependencies play an important role understanding emerging functions and performances. To this end, paper aims to establish game-theoretic framework capture interactions two system designers who aim maximize individual utilities. In particular, we use game model investigate decentralized interdependent for maximizing algebraic global network. We develop alternating algorithm, show its...
With the remarkable growth of Internet and communication technologies over past few decades, Things (IoTs) is enabling ubiquitous connectivity heterogeneous physical devices with software, sensors, actuators. IoT networks are naturally two layers cloud cellular coexisting underlaid device-to-device communications. The IoTs plays an important role in information dissemination for mission-critical civilian applications. However, vulnerable to cyber attacks including denial-of-service jamming...
Due to the increasing adoption of smart sensing and Internet things (IoT) devices, wind energy system (WES) becomes more vulnerable cyber physical attacks. Therefore, designing a secure resilient WES is critical. This paper first proposes system-of-systems (SoS) framework for cyber-physical WES. Specifically, on one hand, we adopt game-theoretic model capture interactions between defender adversary at layer. The outcome this defense game reflected by control-aware Nash equilibria. On other...