Lulu Liang

ORCID: 0000-0001-8766-4763
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Metaheuristic Optimization Algorithms Research
  • IoT and Edge/Fog Computing
  • Adhesion, Friction, and Surface Interactions
  • Smart Grid Security and Resilience
  • Insect and Arachnid Ecology and Behavior
  • Energy Harvesting in Wireless Networks
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Force Microscopy Techniques and Applications
  • Wireless Networks and Protocols
  • Innovative Energy Harvesting Technologies
  • Surface Modification and Superhydrophobicity
  • Cybercrime and Law Enforcement Studies
  • Robot Manipulation and Learning
  • Cloud Data Security Solutions
  • Indoor and Outdoor Localization Technologies
  • Oral microbiology and periodontitis research
  • Context-Aware Activity Recognition Systems
  • Distributed Sensor Networks and Detection Algorithms
  • Software-Defined Networks and 5G
  • Millimeter-Wave Propagation and Modeling

Beijing Institute of Technology
2019-2025

Shandong University of Science and Technology
2022-2024

Stomatology Hospital
2024

Guangzhou Development Zone Hospital
2024

China Medical University
2022-2024

Wuhan Sports University
2023

Guangxi University
2022

Zhejiang A & F University
2021

Guiyang Medical University
2019

Affiliated Hospital of Guizhou Medical University
2019

In recent years, Internet of things (IoT) is widely used in various domains. However, the security IoT system becomes a challenge. If attacked, great property loss will happen. this paper, denial service (DoS) attack to an shown. The tool Kali Linux, A Denial Service (DOS) launched by using 3 different methods. comparison between DoS methods also given.

10.1109/itme.2016.0087 article EN 2016-12-01

Solar interface water evaporation has been demonstrated to be an advanced method for freshwater production with high solar energy utilization. The development of evaporators lower cost and higher efficiency is a key challenge in the manufacture practical devices. Herein, bamboo leaf‐derived carbon‐based evaporator designed based on light trace simulation. And then, it manufactured by vertical arrangement carbonization leaves subsequent polyacrylamide modification. vertically arranged carbon...

10.1002/eem2.12251 article EN Energy & environment materials 2021-07-28

Inverse Kinematics of robots is a fundamental problem in robotics that involves calculating the joint angles robot to achieve desired end-effector position and orientation. Analytical solutions are generally used when robots’ configurations consistent. However, practical applications, different manufacturers may have varying base coordinates, end axis rotation directions, which limits generality analytical solutions. This paper introduces general framework for solving inverse solution with...

10.1177/09544062251318236 article EN Proceedings of the Institution of Mechanical Engineers Part C Journal of Mechanical Engineering Science 2025-02-26

In current medical diagnostics, skin patches often experience reduced adhesion forces or even complete failure due to perspiration, thereby compromising the quality and stability of biosignal monitoring. Inspired by hexagonal prism structure tree frogs frame honeybees, we designed a honeybee-treefrog bionic hierarchical patterned surface (HTP) fabricated with polydimethylsiloxane (PDMS), integrating advantages both organisms significantly enhance wet performance. The performance HTP under...

10.1021/acsami.5c02890 article EN ACS Applied Materials & Interfaces 2025-03-21

The most important goal in event-driven wireless sensor networks is to transmit the event information users as soon possible. One of factors that would make it possible reach this design efficient detecting protocols. In paper, we present an protocol (EEDP) specified for monitoring applications. occuring area, each node broadcasts its primary detection result a decision corporately. And then decision-made will choose next hop using underlying routing forward single alarm packet. To improve...

10.1109/jsen.2012.2187440 article EN IEEE Sensors Journal 2012-02-10

This study extends research on the relationship between physical activity and adolescent resilience by using cross-lagged analysis. Therefore, it used Adolescent Resilience Rating Scale Physical Activity to conduct a one-year longitudinal follow-up survey 818 adolescents (50.6% boys), aged 12–17. They completed questionnaires, providing data resilience. The results indicated there were significant gender differences in activity, but was no difference resilience; positive correlation had...

10.3389/fpsyg.2023.1095999 article EN cc-by Frontiers in Psychology 2023-02-17

Biofilm formation constitutes the primary cause of various chronic infections, such as wound gastrointestinal inflammation and dental caries. While preliminary achievement biofilm inhibition is possible, challenge lies in difficulty eliminating bactericidal effects current drugs that lead to microbiota imbalance. This study, utilizing vitro vivo models caries, aims efficiently inhibit without inducing effects, even against pathogenic bacteria. The tetrahedral framework nucleic acid (tFNA)...

10.1111/cpr.13678 article EN cc-by Cell Proliferation 2024-05-29

Accompanied with accelerated development of the Internet Things (IoT) and smart home industry, access control systems, e.g. locks, are getting popular in recent years. In this paper, we propose a system that allows users to enter buildings via mobile phones. Also,

10.4108/eai.18-6-2016.2264493 article EN 2016-01-01

Accompanied with accelerated development of the Internet Things (IoT) and smart home industry, access control systems, e.g. locks, are getting popular in recent years. In this paper, we propose a system that allows users to enter buildings via mobile phones. Also, protocol is designed secure communications system. addition, some investigation results regarding security usability found: (1) most people pay more attention system; (2) prefer using fingerprint as primary unlocking mechanism.

10.5555/3021385.3021389 article EN International Conference on Mobile Multimedia Communications 2016-06-18

Antibiotic was detected in many environments, and it had posed a serious threat to human health. The advanced oxidation process has been considered an effective way treat antibiotics. In this work, using industrial waste red mud (RM) as raw material, series of modified RM (MRM-T; T donates the calcination temperature) obtained via facile method applied activate sodium bisulfite (NaHSO3) for lomefloxacin (LOM) degradation. Among all MRM-T, MRM-700 exhibited superior catalytic activity,...

10.1007/s11356-022-23706-1 article EN cc-by Environmental Science and Pollution Research 2022-11-21

In monitoring wireless sensor networks (WSNs), the occurrence of an emergency will generate a large amount data in very short time. Among them, some urgent information is more critical and needs to be transmitted out reliably as soon possible. this scenario, congestion inevitable due limited resources, especially near sink. To address problem, we propose novel reliable transmission protocol for (RETP-UI) WSNs. RETP-UI, not only current queue length but also ratio length's fluctuation adopted...

10.1109/glocom.2010.5684267 article EN 2010-12-01

Risk assessment and management for information system are very important assuring the security. It requires not only careful but also systematic analysis of threat vulnerability information. Depending on result, we could determine extent to which events adversely impact organization likelihood that such will occur. Under FISMA(Federal Information Security Management Act) 2002, Technology Laboratory (ITL) at National Institute Standards (NIST) develops a series publications protect system. In...

10.1109/isias.2013.6947735 article EN 2013-12-01

Power control technology in wireless sensor network (WSN) is of great significance to ensure the coverage, reduce power consumption nodes, and optimize performance. In this paper, a new based on routing protocol (PCBRP) MAC layer proposed. It operates with help calculates optimal transmission according distance between neighbor nodes. A mapping table including node's address established during route building procedure. The can be gotten through searching next hop latter data transmission....

10.1109/icfn.2010.9 article EN 2010-01-01

Due to flexibility, low cost and rapid deployment, wireless sensor networks (WSNs)have been drawing more interest from governments, researchers, application developers, manufacturers in recent years. Nowadays, we are the age of industry 4.0, which traditional industrial control systems will be connected with each other provide intelligent manufacturing. Therefore, WSNs can play an extremely crucial role monitor environment condition parameters for smart factories. Nevertheless, introduction...

10.1109/codit.2017.8102711 article EN 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT) 2017-04-01

ABSTRACT Protocols for sensor networks have traditionally been designed using the best effort delivery model. However, there are many specific applications that need reliable transmissions. In event‐driven wireless networks, occurrence of an event may generate a large amount data in very short time. Among them, some critical urgent information needs to be transmitted reliably timely manner. this scenario, congestion is inevitable because constraints available resources. How control important...

10.1002/wcm.2239 article EN Wireless Communications and Mobile Computing 2012-06-07

This paper gives out a survey on event monitoring in Event-driven wireless sensor networks (EWSNs). In EWSNs, there are mainly two tasks, one is accurate detection with higher probability and lower false-alarm probability. The other reliable dissemination of the information after detection. this paper, we firstly address design issues for dissemination, then some existing scheme protocols introduced compared. Finally, several problems to be solved outlined.

10.1109/wicom.2011.6040345 article EN 2011-09-01

The dynamic adhesive systems in nature have served as inspirations for the development of intelligent surfaces. However, mechanisms underlying rapid controllable contact adhesion observed biological never been adequately explained. Here, control principle unfolding footpads (alterable area) honeybees is investigated. can passively unfold, even without neuro-muscular reflexes, response to specific dragging activity (generating shear force) toward their bodies. This passive attributed...

10.1016/j.mtbio.2023.100704 article EN cc-by-nc-nd Materials Today Bio 2023-06-16
Coming Soon ...