- Network Time Synchronization Technologies
- Advanced Malware Detection Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Cloud Data Security Solutions
- Mobile Agent-Based Network Management
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Advanced Optical Network Technologies
- Real-Time Systems Scheduling
- Traffic Prediction and Management Techniques
- Smart Grid and Power Systems
- Speech and Audio Processing
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- RFID technology advancements
- Indoor and Outdoor Localization Technologies
- Sensorless Control of Electric Motors
- Security and Verification in Computing
- Network Traffic and Congestion Control
- Advanced Decision-Making Techniques
- Human Mobility and Location-Based Analysis
- Stock Market Forecasting Methods
- Energy Load and Power Forecasting
- Logic, programming, and type systems
- Physical Unclonable Functions (PUFs) and Hardware Security
Electric Power Research Institute
2023
State Grid Hebei Electric Power Company
2022
State Grid Corporation of China (China)
2019
Tsinghua University
2013
After the Smart City initiative was put forward, cities all over world started pilot practice of developing Cities. This triggered a series thoughts: what is City, how do we determine scope work and formulate new strategic agenda to make city smarter more sustainable? The answer lies not only in finding solutions, but also leads research on definition terminology determination corresponding tasks. Stakeholders (e.g., policy makers, municipalities, solution providers, industry, academia)...
With the proliferating of electric vehicles, charging infrastructure has developed rapidly. Meanwhile, security issues smart station system are becoming increasingly serious. In this paper, we systematically analyze architecture and protocols between vehicles stations. Furthermore, present challenges including protocol, TCU, communication vehicle networking platform. As far as know, our work is first practical systematic for analysis stations system.
Recently, IoT devices have become the targets of large-scale cyberattacks, and their security issues been increasingly serious. However, due to limited memory battery power devices, it is hardly possible install traditional software, such as antivirus software for defense. Meanwhile, network-based traffic detection difficult obtain internal behavior states conduct in-depth analysis because more use encrypted traffic. Therefore, how complex behaviors inside perform defense an issue that needs...
The charging protocol is used to communicate between piles and electric vehicles. Its security crucial the pile system. However, it currently lacks analysis protection for protocol. In this paper, principle threats of vehicles are depicted analyzed. Furthermore, a fuzzy-based detection method presented. Finally, aiming at issues on protocol, authentication mechanism
To solve the problem of jitter and low network throughput caused by impact background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for flows, named hierarchical crossover mechanism based time-aware shaper (HC-TAS) improving traditional counterpart. Then, model, we designed an inbound algorithm frame length matching outbound queue status, making sure that smaller data frames will not be blocked large frames. This greatly improves utilization...
With the increasing value of industrial data, it has become an important demand to effectively protect security network data. In edge cloud collaborative environment Internet, how transmit and process private data avoid exposure tampering caused by attacks is urgent problem be solved. The privacy field equipment basis creating a secure for computing. Therefore, ensure equipment, resist attackers leakage research hotspot. This paper designs protection method based on fully homomorphic...
Abstract With the continuous development of mobile communication technology, edge computing technology has been gradually applied to some special business scenarios, such as disaster area rescue and forest fire warning. These application scenarios have certain requirements on delay task processing, need enough network connection resources. Due lack ground infrastructure, traditional scheme can no longer fully meet needs users. However, virtualized environment in cloud not only brings...
Generally, Java Card mainly consists of the following parts: COS (Chip Operating System), JCVM (Java Virtual Machine), and API (Application Programming Interface). As a multi-application system, itself is very complicated, so it may inevitably exist some security vulnerabilities inside. Based on these parts Card, we can find out detectable points to its vulnerabilities. This paper presents method containing specific case test array access, aiming detect possible JCVM. In this paper, three...
In the high-power drive system such as traction of rail transit, hybrid PWM strategy is widely used due to switching frequency limitation voltage source inverter. Since traditional multi-mode SVPWM fails reach maximum utilization DC bus in low at medium and high band, this paper designs a based on SHEPWM for system. By eliminating selective low-order current harmonics, can realize smooth transition six-step operation mode, hence reaching power output. Finally, case studies harmonic analysis...
Charging protocol is the communication between charging pile and electric vehicle during process, which safety very important. However, due to lack of security assurance mechanism, vulnerable malicious attacks such as forgery attack, man-in-the-middle replay etc. These may end up with denial service, system halt smart pile, lead other problems power theft. The issues mentioned above would cause serious damages facilities. In this paper, a lightweight authentication method proposed solve...
With the development of power internet things (IOT), load forecasting will play an important role system. It can optimize generation planning and improve economical operation IOT. In this paper, a new loading algorithm for IOT is proposed using training data dimension expansion ensemble learning. offline phase, obtained meteorological time information normalized to remove unit effect at first. Then, Hampel filter used cope with outliers from sensors. Through preprocessing, fingerprint...
Locating the electric equipment is a critical issue in power internet of things. In indoor environment, problem localization becomes difficult, because equipments are near-field (NF) region array. this paper, we focus on locating NF environment. A fourth-order cumulant matrix constructed to decouple angle and range parameters firstly. Then, covariance matching criterion employed find two without discretizing or spaces. Simulation test carried out evaluate performance our method.
In recent years, the Internet of things has developed rapidly, but security problems are becoming more and serious. Sensor nodes important sources data in things. The abnormal failure sensing Things will affect connectivity network. If accuracy reliability corresponding perception can be effectively improved, we timely accurately find out emergency monitor working status Therefore, it is great significance to detect streams sensor network confirm its source. Compared with traditional...
Real-time and certainty are important performance indicators of substation network data transmission. There many time-sensitive in the site, transmission these has very high real-time deterministic requirements. Due to fusion communication high-bandwidth IT network, delay jitter some increased. In order reduce flow substation, this paper designs implements a synchronization scheduling algorithm based on gating shaping.
In view of the problem that flow intelligent substation traffic scheduling increases, resulting in transmission delay also this paper proposed a joint optimization method Time Sensitive Network (TSN) path selection and scheduling, which combines resource sensing K-Shortest Path Algorithm (KPA) algorithm constraint based gating method. This can select an optimal for TT flows plan non flows. Based on mechanism TSN, constraints objective functions are established, is proposed. Finally, test...
This paper proposes an early warning mechanism of network traffic based on quantum adaptive particle swarm optimization-radial basis function (QAPSO-RBF) neural network. The QAPSO-RBF prediction model predicts the range threshold in order to detect abnormal firstly. Then intelligent substation operating state evaluation is proposed. By analyzing real-time traffic, a stable current communication obtained. can effectively and warn experimental results show effectiveness high accuracy model.
Time sensitive Networking (TSN) is an industrial network technology being actively promoted by the industry at present. It one of most promising technologies to ensure real-time and deterministic transmission information in production. This paper mainly focuses on time switching scheduling for multimodal networks. First all, it introduces relevant protocol standards networks, analyzes advantages disadvantages different protocols. improves gated algorithm mechanism IEEE 802.1qbv protocol,...