Jiangpei Xu

ORCID: 0000-0002-0818-7186
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Time Synchronization Technologies
  • Advanced Malware Detection Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Cloud Data Security Solutions
  • Mobile Agent-Based Network Management
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Advanced Optical Network Technologies
  • Real-Time Systems Scheduling
  • Traffic Prediction and Management Techniques
  • Smart Grid and Power Systems
  • Speech and Audio Processing
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • RFID technology advancements
  • Indoor and Outdoor Localization Technologies
  • Sensorless Control of Electric Motors
  • Security and Verification in Computing
  • Network Traffic and Congestion Control
  • Advanced Decision-Making Techniques
  • Human Mobility and Location-Based Analysis
  • Stock Market Forecasting Methods
  • Energy Load and Power Forecasting
  • Logic, programming, and type systems
  • Physical Unclonable Functions (PUFs) and Hardware Security

Electric Power Research Institute
2023

State Grid Hebei Electric Power Company
2022

State Grid Corporation of China (China)
2019

Tsinghua University
2013

After the Smart City initiative was put forward, cities all over world started pilot practice of developing Cities. This triggered a series thoughts: what is City, how do we determine scope work and formulate new strategic agenda to make city smarter more sustainable? The answer lies not only in finding solutions, but also leads research on definition terminology determination corresponding tasks. Stakeholders (e.g., policy makers, municipalities, solution providers, industry, academia)...

10.3390/standards2030028 article EN cc-by Standards 2022-09-02

With the proliferating of electric vehicles, charging infrastructure has developed rapidly. Meanwhile, security issues smart station system are becoming increasingly serious. In this paper, we systematically analyze architecture and protocols between vehicles stations. Furthermore, present challenges including protocol, TCU, communication vehicle networking platform. As far as know, our work is first practical systematic for analysis stations system.

10.1109/aiam50918.2020.00061 article EN 2020-10-01

Recently, IoT devices have become the targets of large-scale cyberattacks, and their security issues been increasingly serious. However, due to limited memory battery power devices, it is hardly possible install traditional software, such as antivirus software for defense. Meanwhile, network-based traffic detection difficult obtain internal behavior states conduct in-depth analysis because more use encrypted traffic. Therefore, how complex behaviors inside perform defense an issue that needs...

10.1155/2022/1443978 article EN cc-by Security and Communication Networks 2022-03-18

The charging protocol is used to communicate between piles and electric vehicles. Its security crucial the pile system. However, it currently lacks analysis protection for protocol. In this paper, principle threats of vehicles are depicted analyzed. Furthermore, a fuzzy-based detection method presented. Finally, aiming at issues on protocol, authentication mechanism

10.1109/ispec48194.2019.8975079 article EN 2021 IEEE Sustainable Power and Energy Conference (iSPEC) 2019-11-01

To solve the problem of jitter and low network throughput caused by impact background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for flows, named hierarchical crossover mechanism based time-aware shaper (HC-TAS) improving traditional counterpart. Then, model, we designed an inbound algorithm frame length matching outbound queue status, making sure that smaller data frames will not be blocked large frames. This greatly improves utilization...

10.1155/2024/8882006 article EN Wireless Communications and Mobile Computing 2024-04-15

With the increasing value of industrial data, it has become an important demand to effectively protect security network data. In edge cloud collaborative environment Internet, how transmit and process private data avoid exposure tampering caused by attacks is urgent problem be solved. The privacy field equipment basis creating a secure for computing. Therefore, ensure equipment, resist attackers leakage research hotspot. This paper designs protection method based on fully homomorphic...

10.1109/icoin56518.2023.10049058 article EN 2022 International Conference on Information Networking (ICOIN) 2023-01-11

Abstract With the continuous development of mobile communication technology, edge computing technology has been gradually applied to some special business scenarios, such as disaster area rescue and forest fire warning. These application scenarios have certain requirements on delay task processing, need enough network connection resources. Due lack ground infrastructure, traditional scheme can no longer fully meet needs users. However, virtualized environment in cloud not only brings...

10.21203/rs.3.rs-2931330/v1 preprint EN cc-by Research Square (Research Square) 2023-05-25

Generally, Java Card mainly consists of the following parts: COS (Chip Operating System), JCVM (Java Virtual Machine), and API (Application Programming Interface). As a multi-application system, itself is very complicated, so it may inevitably exist some security vulnerabilities inside. Based on these parts Card, we can find out detectable points to its vulnerabilities. This paper presents method containing specific case test array access, aiming detect possible JCVM. In this paper, three...

10.1109/wocc.2013.6676466 article EN 2013-05-01

In the high-power drive system such as traction of rail transit, hybrid PWM strategy is widely used due to switching frequency limitation voltage source inverter. Since traditional multi-mode SVPWM fails reach maximum utilization DC bus in low at medium and high band, this paper designs a based on SHEPWM for system. By eliminating selective low-order current harmonics, can realize smooth transition six-step operation mode, hence reaching power output. Finally, case studies harmonic analysis...

10.1109/acpee51499.2021.9436967 article EN 2022 7th Asia Conference on Power and Electrical Engineering (ACPEE) 2021-04-01

Charging protocol is the communication between charging pile and electric vehicle during process, which safety very important. However, due to lack of security assurance mechanism, vulnerable malicious attacks such as forgery attack, man-in-the-middle replay etc. These may end up with denial service, system halt smart pile, lead other problems power theft. The issues mentioned above would cause serious damages facilities. In this paper, a lightweight authentication method proposed solve...

10.1145/3434581.3434728 article EN Proceedings of the 2020 International Conference on Aviation Safety and Information Technology 2020-10-14

With the development of power internet things (IOT), load forecasting will play an important role system. It can optimize generation planning and improve economical operation IOT. In this paper, a new loading algorithm for IOT is proposed using training data dimension expansion ensemble learning. offline phase, obtained meteorological time information normalized to remove unit effect at first. Then, Hampel filter used cope with outliers from sensors. Through preprocessing, fingerprint...

10.1155/2022/6730677 article EN cc-by Journal of Sensors 2022-06-20

Locating the electric equipment is a critical issue in power internet of things. In indoor environment, problem localization becomes difficult, because equipments are near-field (NF) region array. this paper, we focus on locating NF environment. A fourth-order cumulant matrix constructed to decouple angle and range parameters firstly. Then, covariance matching criterion employed find two without discretizing or spaces. Simulation test carried out evaluate performance our method.

10.1109/aeeca55500.2022.9918836 article EN 2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA) 2022-08-20

In recent years, the Internet of things has developed rapidly, but security problems are becoming more and serious. Sensor nodes important sources data in things. The abnormal failure sensing Things will affect connectivity network. If accuracy reliability corresponding perception can be effectively improved, we timely accurately find out emergency monitor working status Therefore, it is great significance to detect streams sensor network confirm its source. Compared with traditional...

10.1109/icece54449.2021.9674234 article EN 2021-12-17

Real-time and certainty are important performance indicators of substation network data transmission. There many time-sensitive in the site, transmission these has very high real-time deterministic requirements. Due to fusion communication high-bandwidth IT network, delay jitter some increased. In order reduce flow substation, this paper designs implements a synchronization scheduling algorithm based on gating shaping.

10.1109/cieec58067.2023.10166131 article EN 2022 IEEE 5th International Electrical and Energy Conference (CIEEC) 2023-05-12

In view of the problem that flow intelligent substation traffic scheduling increases, resulting in transmission delay also this paper proposed a joint optimization method Time Sensitive Network (TSN) path selection and scheduling, which combines resource sensing K-Shortest Path Algorithm (KPA) algorithm constraint based gating method. This can select an optimal for TT flows plan non flows. Based on mechanism TSN, constraints objective functions are established, is proposed. Finally, test...

10.1016/j.egyr.2023.05.101 article EN cc-by-nc-nd Energy Reports 2023-06-06

This paper proposes an early warning mechanism of network traffic based on quantum adaptive particle swarm optimization-radial basis function (QAPSO-RBF) neural network. The QAPSO-RBF prediction model predicts the range threshold in order to detect abnormal firstly. Then intelligent substation operating state evaluation is proposed. By analyzing real-time traffic, a stable current communication obtained. can effectively and warn experimental results show effectiveness high accuracy model.

10.1109/ei247390.2019.9062168 article EN 2019-11-01

Time sensitive Networking (TSN) is an industrial network technology being actively promoted by the industry at present. It one of most promising technologies to ensure real-time and deterministic transmission information in production. This paper mainly focuses on time switching scheduling for multimodal networks. First all, it introduces relevant protocol standards networks, analyzes advantages disadvantages different protocols. improves gated algorithm mechanism IEEE 802.1qbv protocol,...

10.1109/icwcapp57292.2022.00046 article EN 2022-08-01
Coming Soon ...