Fengling Han

ORCID: 0000-0001-8756-7197
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Adaptive Control of Nonlinear Systems
  • Advanced Steganography and Watermarking Techniques
  • Advanced Battery Technologies Research
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Iterative Learning Control Systems
  • Sensorless Control of Electric Motors
  • Network Security and Intrusion Detection
  • Chaos-based Image/Signal Encryption
  • Chaos control and synchronization
  • Nonlinear Dynamics and Pattern Formation
  • Microgrid Control and Optimization
  • Multilevel Inverters and Converters
  • Smart Grid and Power Systems
  • Advancements in Battery Materials
  • Digital Media Forensic Detection
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Network Traffic and Congestion Control
  • Face recognition and analysis
  • Advanced DC-DC Converters
  • Power Systems and Renewable Energy
  • Control Systems in Engineering
  • HVDC Systems and Fault Protection

RMIT University
2016-2025

Tulane University
2024

China United Network Communications Group (China)
2024

Tokyo Institute of Technology
2024

Hangzhou Dianzi University
2019

Swinburne University of Technology
2016

Shenyang University of Technology
2015

Chongqing University
2011

Beijing University of Technology
2009

Florida Institute of Technology
2006-2007

This paper proposes a terminal sliding-mode (TSM) observer for estimating the immeasurable mechanical parameters of permanent-magnet synchronous motors (PMSMs) used complex systems. The can track system states in finite time with high steady-state precision. A TSM control strategy is designed to guarantee global finite-time stability and, meanwhile, estimate PMSM. novel second-order algorithm soften switching signal observer. effect equivalent low-pass filter be properly controlled based on...

10.1109/tie.2012.2213561 article EN IEEE Transactions on Industrial Electronics 2012-08-16

Several recent studies have suggested Blockchain for Peer-to-Peer energy trading (P2P-ET) to achieve better security, privacy and fast payment settlement. Most of them however rely on either public Blockchains (which low performance) or permissioned blockchains decentralization level do not provide byzantine fault tolerance). Moreover, these solutions limitations when capturing the business model existing systems. This article proposes a Unified blockchain-based P2P-ET Architecture (UBETA)...

10.1109/tsg.2021.3056147 article EN IEEE Transactions on Smart Grid 2021-02-03

A revolution in advanced manufacturing has been driven by digital technology the fourth industrial revolution, also known as Industry 4.0, and resulted a substantial increase profits for industry. In new paradigm of 5.0, will step further be capable offering customized products better user experience. number key enabling technologies are expected to play crucial roles assisting 5.0 meeting higher demands data acquisition processing, communications, collaborative robots process. The aim this...

10.1109/tii.2023.3274224 article EN IEEE Transactions on Industrial Informatics 2023-05-08

This paper investigates the real-time estimation on state-of-charge (SoC) and state-of-health (SoH) of lithium-ion (Li-ion) batteries for purpose achieving reliable, safe, efficient use batteries. Three terminal sliding-mode observers (TSMOs) are designed; each observer is used to estimate one variable a Li-ion cell developing SoC algorithm. To SoH, two additional TSMOs subsequently presented. Finally, set complete algorithms SoH formulated. The output injection signals proposed designed be...

10.1109/tie.2019.2916389 article EN IEEE Transactions on Industrial Electronics 2019-05-17

10.1016/j.jnca.2009.02.009 article EN Journal of Network and Computer Applications 2009-03-15

Abstract With fast evolution of mobile devices and network, the need protecting user sensitive information locally performing secure authentication remotely become evermore increasing. Bio‐cryptography is emerging as a powerful solution which can combine advantages conventional cryptography biometric security. In this paper, we present an efficient bio‐cryptographic security protocol designed for client/server in current computing environment, with reasonable assumption that server secure....

10.1002/sec.225 article EN Security and Communication Networks 2010-12-03

Advanced security methods are necessary to introduce effective online voting in the whole world. Elections conducted on paper consume a lot of resources and contribute destruction forests, which leads climate deterioration. Recent experiences countries, such as United States, India, Brazil, demonstrated that further research is needed improve guarantees for future elections, ensure confidentiality votes enable verification their integrity validity. In this paper, we propose ranked choice...

10.1109/access.2018.2817518 article EN cc-by-nc-nd IEEE Access 2018-01-01

10.1016/j.amc.2006.07.030 article EN Applied Mathematics and Computation 2006-08-25

This article proposes a continuous adaptive integral-type sliding-mode control approach for class of mechatronic systems by taking into consideration matched and unmatched uncertainties, uncertainty in the gain. Four different controllers are designed to enable: 1) avoidance singularity preventing differentiating system states with fractional power; 2) attenuation chattering utilizing full-order sliding manifolds. The gain adaptation controller is presented avoid overestimation With place,...

10.1109/tii.2019.2954550 article EN IEEE Transactions on Industrial Informatics 2019-11-20

This paper investigates robust control strategies for wind energy conversion systems with variable-speed permanent magnet synchronous generators, which are integrated into the grid to provide reliable, secure, and efficient electrical power. A three-phase grid-side converter without a transformer is connected using an LCL filter low resistive losses. In these working conditions, instantaneous power proportional integral (PI) controller outer voltage-loop in used regulate DC-link voltage...

10.1109/tie.2018.2851959 article EN IEEE Transactions on Industrial Electronics 2018-07-09

Progress in Deep Learning (DL), particularly Convolutional Neural Networks (CNNs), has significantly improved the accuracy of steganographic image detection. However, applications CNNs have several challenges, mainly due to insufficient dataset quality and quantity, heightened imperceptibility low payload capacities, suboptimal feature learning procedures. This paper proposes an enhanced secret data detection approach with a CNN architecture that includes convolutional, depth-wise,...

10.1109/access.2023.3334650 article EN cc-by-nc-nd IEEE Access 2023-01-01

Steganalysis, a field devoted to detecting concealed information in various forms of digital media, including text, images, audio, and video files, has evolved significantly over time. This evolution aims improve the accuracy revealing potential hidden data. Traditional machine learning approaches, such as support vector machines (SVM) ensemble classifiers (ECs), were previously employed steganalysis. However, they demonstrated ineffective against contemporary prevalent steganographic...

10.1016/j.array.2024.100353 article EN cc-by Array 2024-06-05

Graphs are data structures used to represent irregular networks and prevalent in numerous real-world applications. Previous methods directly model graph achieve significant success. However, these encounter bottlenecks due the inherent irregularity of graphs. An innovative solution is converting graphs into textual representations, thereby harnessing powerful capabilities Large Language Models (LLMs) process comprehend In this paper, we present a comprehensive review methodologies for...

10.48550/arxiv.2501.01124 preprint EN arXiv (Cornell University) 2025-01-02

Cyber-physical-social systems (CPSSs) have emerged in many applications over recent decades, requiring increased attention to security concerns. The rise of sophisticated threats like Advanced Persistent Threats (APTs) makes ensuring CPSSs particularly challenging. Provenance graph analysis has proven effective for tracing and detecting anomalies within systems, but the sheer size complexity these graphs hinder efficiency existing methods, especially those relying on neural networks (GNNs)....

10.48550/arxiv.2501.02796 preprint EN arXiv (Cornell University) 2025-01-06
Coming Soon ...