Taowei Chen

ORCID: 0000-0002-1873-370X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Wireless Signal Modulation Classification
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Geophysical Methods and Applications
  • DNA and Biological Computing
  • Chaos control and synchronization
  • Modular Robots and Swarm Intelligence
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Fractal and DNA sequence analysis
  • Access Control and Trust
  • Sexual function and dysfunction studies
  • MicroRNA in disease regulation
  • Radar Systems and Signal Processing
  • Image and Signal Denoising Methods
  • Machine Fault Diagnosis Techniques
  • Energy Load and Power Forecasting
  • Integrated Circuits and Semiconductor Failure Analysis
  • Cryptographic Implementations and Security
  • High-Voltage Power Transmission Systems
  • Network Security and Intrusion Detection
  • Microgrid Control and Optimization
  • Advanced Technology in Applications

Yunnan University of Finance And Economics
2014-2024

China Southern Power Grid (China)
2023

University of Finance and Economics
2016-2022

Ningbo University
2019

Nanjing Drum Tower Hospital
2014

Southwest Jiaotong University
2007-2009

Shanghai University of Engineering Science
2006

Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has drawn researcher attention because it can provide key security auditing and transaction traceability in context data sharing. However, a majority existing blockchain-based CP-ABE schemes, private keys were still issued by one central authority that would lead to heavy computation, higher costs, restricted scalability within decentralized system. To address these challenges, we...

10.1016/j.jksuci.2024.101969 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2024-02-29

Inspired by economies of scale, the joint planning community-shared energy storage (CSES) among prosumers provides a new solution to issues high investment costs associated with independent construction individual storage. However, cooperation large-scale is rarely investigated and there an urgent need formulate appropriate strategy. Hence, multi-step clustering generalized Nash bargaining (GNB)-based CSES strategy for proposed. First, planning-oriented algorithm based on nonparametric...

10.1109/tste.2023.3323337 article EN IEEE Transactions on Sustainable Energy 2023-10-10

In everchanging threat emitter environment, specific identification (SEI) technology extracts subtle but persistent features from received pulse signal to create a fingerprint unique radar. Unlike conventional five parameters deinterleaving algorithm, which can be grossly ambiguous for radar sorting, the SEI provides hardware identification. this paper, we propose an approach extracting unintentional phase modulation caused by oscillator based on surrounding-line integral bispectrum. The...

10.1109/ijcnn.2008.4633806 article EN 2008-06-01

This paper discusses how to improve the accuracy of doctors' diagnosis and protect security patients' information. First, UPHFPR (Uncertain Probability Hesitant Fuzzy Preference Relationship) is applied select more accurate target for doctors. The framework involved an information entropy quantify access request risks privacy when doctors clinical data. Based on bounded rationality hypothesis, we build a multi-player evolutionary game model risk control, analyze participants' dynamic...

10.1016/j.aej.2022.03.075 article EN cc-by-nc-nd Alexandria Engineering Journal 2022-04-18

Due to the advantages in self-sovereignty identity management and scalability of blockchain, digital verification systems (DIVMS) blockchain-based verifiable certificates (VC) are getting more attention. However, user privacy systems’ traditional architectures cannot be guaranteed. In this paper, zero-knowledge succinct noninteractive arguments knowledge (zkSNARKs) referred as Groth16 introduced order implement protection user’s behavior DIVMS VC. proposed architecture, malleability attack...

10.1155/2022/6800938 article EN cc-by Security and Communication Networks 2022-11-30

To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying a trustworthy central authority, we propose lattice-inspired CP-ABE scheme for data access sharing based blockchain in this paper. Firstly, CP-ABE-based algorithm using learning with errors (LWE) assumption is constructed, which selective security under linear independence restriction random oracle model. Secondly, nodes can act as...

10.3390/app13137765 article EN cc-by Applied Sciences 2023-06-30

The proportion of photovoltaic power generation in the global energy structure is increasing year by year. Because its volatility and periodicity, grid-connected challenges safe stable operation grid. One ways to solve this problem data mining. Data mining needs high-quality support, cleaning one important means improve quality. Aiming at poor quality original PV data, paper analyzes two typical outliers proposes a output method based on Density-Based Spatial Clustering Applications with...

10.1109/ceepe58418.2023.10167409 article EN 2022 5th International Conference on Energy, Electrical and Power Engineering (CEEPE) 2023-05-12

In this paper, an approach for intra-pulse feature extraction of radar emitter signals is proposed based on wavelet transform. On the basis multi-resolution characteristics transform, two energy entropies, as a two-dimensional vector to reveal difference modulation signals, are respectively extracted from approximation coefficient and multi-scale detail coefficients preserved through inter-scale correlations denoise in transform domain. order demonstrate effectiveness feasibility approach,...

10.1109/cmc.2009.202 article EN 2009-01-01

10.1016/j.jksuci.2024.102247 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2024-11-01

An useful approach is proposed for intra-pulse feature extraction of radar emitter signals based on symbolic time series analysis(STSA). Embedding time-delay and modified Shannon entropy are used as two-dimensional vector to sort the interleaving signals. The can determine length symbol series. quantitatively reveal deterministic information complexity modulation In order show effectiveness feasibility introduced approach, experimental results indicate that features seven typical extracted...

10.1109/icwapr.2007.4421631 article EN International Conference on Wavelet Analysis and Pattern Recognition 2007-11-01

the instinct characteristics of blockchain technology to write transactions on distributed ledgers offers new opportunities for government improve transparency, prevent fraud, and establish trust in public sector. However, there still exits challenge protect data confidentiality, authenticity ownership when sharing exchanging e-document decentralized network. In order address this concern, we propose a fusion scheme CP-ABE Blockchain called GovChain. GovChain, framework is used implement...

10.1145/3443467.3443764 article EN Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering 2020-11-06

We in this study investigated the role of imatinib-upregulated lncRNA (IUR) prostate carcinoma (PC). observed that IUR was downregulated PC, and its expression levels decreased with increase clinical stages. In PC tissues, microRNA (miR)-200 positively, while ZEB1 inversely correlated IUR. cells, miR-200 overexpression mediated ZEB1. upregulation miR-200, not significantly affected by overexpression. Cell invasion migration analysis showed resulted rates. played an opposite attenuated...

10.1152/physiolgenomics.00062.2019 article EN Physiological Genomics 2019-09-23

In this paper, an approach for intra-pulse feature extraction of radar emitter signals is proposed based on the autocorrelation function (ACF) first differencing. The envelop features, which can highlight differences in modulation information signals, are extracted from difference transformation. order to reduce dimensions set and heighten sorting rate criterion adopted degree separability select optimal subset. Computer simulations show that features seven typical by have good performance...

10.1109/csqrwc.2011.6037219 article EN 2011-07-01

Nowadays, there are many documents involved in cross-border trade transactions. A multitude of have to be inter-exchanged between two main categories actors: businesses(B) and government authorities(G). However, one the important problems is how effectively control access securely share scenario national G2G certain B2G border procedures. In order achieve fine-grained secure sharing crossborder transaction electronic platform, we present an attribute-based encryption(ABE) approach for...

10.1109/eitce47263.2019.9095045 article EN 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE) 2019-10-01

Blockchain systems offer a decentralized, immutable and transparent architecture that can give the ownership control of data back to users, empower trusted accountable sharing. However, there still exist different scalability, security potential privacy issues in blockchain networks, such as on-chain privacy, origin authentication, or compliance with regulations (e.g. GDPR). To address these challenges, we propose privacy-preserving user-controlled for sharing based on system...

10.1145/3460537.3460559 article EN 2021-03-26

This paper present a novel blockchain CP-ABE (Ciphertext-Policy Attribute-Based Encryption) data ciphertext sharing scheme, leveraging decentralized proxy re-encryption. It utilizes Ethereum and zero-knowledge proof technologies to develop key management system for multiparty secure computation. aims mitigate heavy computation leakage risks associated with traditional centralized systems. The approach begins the design of distributed master generation distribution protocol within access...

10.1117/12.3038887 article EN 2024-08-07

In this paper, we propose a modified marginalized autoencoders. Here, the noise adding way at fixed rate in autoencoders is replaced by adaptive injection. Compared with traditional autoencoders, proposed method obviously enlarges recognition performance. Furthermore, applied to identify high-speed train wheel wear conditions. Features of high speed wheels vibration signals are abstracted using and features used realize characteristics signal recognitions as input support vector machine...

10.1109/chicc.2016.7553994 article EN 2016-07-01

Abstract It is of great significance to ensure the safe and reliable operation power grid by effectively evaluating disaster risk lines arranging sequence line guard reasonably. A assessment method transmission based on TOPSIS proposed in this paper where six typical natural disasters are considered, comprehensive values different under combined with hazards accidents determined, multiple realized, its feasibility verified applying it a certain area China Southern grid.

10.1088/1757-899x/533/1/012001 article EN IOP Conference Series Materials Science and Engineering 2019-05-01

There are certain difficulties in the data acquisition and management of distributed photovoltaic (PV) systems, resulting a limited quantity quality data. Significant challenges were posed to forecasting PV output by these issues. Given shortage historical power stations, daily generation method based on model selection statistical scale-up is proposed this paper. Initially, entire region divided into smaller regions geographical location information stations. Subsequently, station with...

10.1109/icet58434.2023.10211638 article EN 2023-05-12

The article presents a plan for distributing access control and data sharing through CP-ABE. This allows provable security privacy protection without requiring authorization agencies. main key of the CP-ABE algorithm is managed in distributed manner based on blockchain proxy encapsulation technology, dual-chain model adopted to improve system performance security. At same time, block structure format specifications are designed achieve on-chain supervision with traceable management...

10.1109/icbctis59921.2023.00014 article EN 2023-06-01

Currently, with the continuous in-depth research and application of blockchain access control, security issues on have become a focus attention. Based CPABE, this paper proposes trusted secure control scheme based ciphertext policy. Firstly, decentralized attribute-based encryption algorithm (DABE) is adopted to achieve distributed calculation user attribute private keys, effectively solving problems high trust cost single point failure caused by key center generating keys in traditional...

10.1117/12.3004867 article EN 2023-10-20

This paper proposes a multi-objective optimization algorithm based on the membrane computing. Inspired by theory of optimization, structure, multiple sets and reaction rules is employed to tackle issues. Aiming at adaptability algorithm, cross-over mutation mechanism genetic are introduced combine with framework. Moreover, for sake improving diversity global search solution, non-dominated sorting crowding distance used update external archive. The experimental results demonstrate that...

10.1109/cisp-bmei.2017.8302326 article EN 2021 14th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI) 2017-10-01
Coming Soon ...