Guiyun Liu

ORCID: 0000-0002-4830-8878
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Harvesting in Wireless Networks
  • Distributed Sensor Networks and Detection Algorithms
  • Energy Efficient Wireless Sensor Networks
  • Opinion Dynamics and Social Influence
  • Target Tracking and Data Fusion in Sensor Networks
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Opportunistic and Delay-Tolerant Networks
  • Complex Network Analysis Techniques
  • Maritime Ports and Logistics
  • Network Security and Intrusion Detection
  • Distributed Control Multi-Agent Systems
  • Indoor and Outdoor Localization Technologies
  • Heat Transfer and Boiling Studies
  • Mobile Ad Hoc Networks
  • Heat Transfer and Optimization
  • Advanced MIMO Systems Optimization
  • Smart Grid Security and Resilience
  • UAV Applications and Optimization
  • Game Theory and Applications
  • Quantum Information and Cryptography
  • Piezoelectric Actuators and Control
  • Sustainable Supply Chain Management
  • Quantum Mechanics and Applications
  • Transportation Planning and Optimization
  • Security in Wireless Sensor Networks

Guangzhou University
2016-2025

Ningbo University
2011-2024

Southeast University
2022-2023

Jianghan University
2022

Hunan Cancer Hospital
2016-2019

Central South University
2016-2019

University of South China
2019

Wuhan University of Technology
2015

California Maritime Academy
2014

South China University of Technology
2010-2013

The unmanned aerial vehicle (UAV) route planning problem mainly centralizes on the process of calculating best between departure point and target as well avoiding obstructions to avoid collisions within a given flight area. A highly efficient approach is required for this complex high dimensional optimization problem. However, many algorithms are infeasible or have low efficiency, particularly in three-dimensional (3d) environment. In paper, modified sparrow search algorithm named CASSA has...

10.3390/s21041224 article EN cc-by Sensors 2021-02-09

This study studies coordinated control of a platoon vehicles consisting leader and multiple followers when suffer from disturbances. Small disturbances acting on one vehicle may cause large spacing errors between intervehicles. In addition, the propagate up or down in platoon. To mitigate adverse effect disturbances, law is proposed based only position information itself its preceding vehicle. analyse propagation among platoon, upper bounds two transfer functions are presented including...

10.1049/iet-cta.2014.0172 article EN IET Control Theory and Applications 2014-10-28

c-Fos is a major component of activator protein (AP)-1 complex. It has been implicated in cell differentiation, proliferation, angiogenesis, invasion, and metastasis. To investigate the role glioma radiosensitivity to understand underlying molecular mechanisms, we downregulated gene expression by lentivirus-mediated shRNA lines subsequently analyzed radiosensitivity, DNA damage repair capacity, cycle distribution. Finally, explored its prognostic value 41 malignant patients...

10.18632/oncotarget.11779 article EN Oncotarget 2016-09-01

Internet of Vehicles (IoV) is gradually becoming popular, but it also brings more opportunities for malware intrusion. The intrusion into IoV will cause a series security issues and increase the incidence road accidents. Therefore, suppressing measures to combat spread in be fundamental urgent. To address this critical issue, paper proposes fractional-order (FIOV) investigate propagation patterns Road Side Unit (RSU) Vehicles. accurately reflect actual malware, traffic density, channel...

10.1109/tase.2024.3521614 article EN IEEE Transactions on Automation Science and Engineering 2025-01-01

This study examines the intermittent control of a rumor propagation system with anti-rumor mechanism. The interaction mechanism is investigated, including existence and stability two boundary equilibriums, condition bistability behavior. Threshold parameters are identified which determine global exponential rumor-free equilibrium. To combat spreading, we design deterministic stochastic strategies aperiodically time. expressions minimum intensities obtained, related to ratio parameters....

10.1109/tcss.2023.3277465 article EN IEEE Transactions on Computational Social Systems 2023-06-07

The Internet of Underwater Things (IoUT) relies on wireless communication devices that are arranged in an open underwater environment and can interact with other through acoustic technology. However, due to their limited resources environment, IoUT has been suffering from a high risk malware attacks. As the two main parts IoUT, autonomous vehicles (AUVs) rechargeable sensor networks (UWRSNs) more favored by attackers be directly attacked malware, which lead cross-propagation when AUVs UWRSNs...

10.1109/jiot.2023.3331736 article EN IEEE Internet of Things Journal 2023-11-10

Ship pollution accidents can cause serious harm to marine ecosystems and economic development. This study proposes a ship accident analysis method based on knowledge graph solve the problem that complex information is challenging present clearly. Based of 411 along coast China, Word2vec’s word vector models, BERT–BiLSTM–CRF model BiLSTM–CRF model, were applied extract entities relations, Neo4j database was used for data storage visualization. Furthermore, case retrieval correlation analyzed...

10.3390/su16135296 article EN Sustainability 2024-06-21

With the development of wireless rechargeable sensor networks (WRSNs ), security issues WRSNs have attracted more attention from scholars around world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering removal, charging and reinfection process is proposed. Subsequently, local global stabilities disease-free equilibrium points are analyzed simulated after obtaining basic reproductive number R0. Detailedly, simulations further reveal...

10.3390/s21010123 article EN cc-by Sensors 2020-12-27

Energy constraint hinders the popularization and development of wireless sensor networks (WSNs). As an emerging technology equipped with rechargeable batteries, (WRSNs) are being widely accepted recognized. In this paper, we research security issues in WRSNs which need to be addressed urgently. After considering charging process, activating anti-malware program launching malicious attack process modeling, susceptible–infected–anti-malware–low-energy–susceptible (SIALS) model is proposed....

10.3390/s21020594 article EN cc-by Sensors 2021-01-15

With the rapid development of science and technology, application wireless sensor networks (WSNs) is more widely. It has been widely concerned by scholars. Viruses are one main threats to WSNs. In this paper, based on principle epidemic dynamics, we build a SEIR propagation model with mutated virus in WSNs, where E nodes infectious cannot be repaired S or R nodes. Subsequently, basic reproduction number R0, local stability global system analyzed. The cost function Hamiltonian constructed...

10.3390/math9090929 article EN cc-by Mathematics 2021-04-22

During the transmission of power measurement data through communication networks from remote terminal unit (RTU) to state estimator in Supervisory Control and Data Acquisition (SCADA), cyber-physical systems (PCPSs) are more susceptible cyber-attacks. To mitigate that threat, this paper is concerned with a new recovery strategy on machine learning against false injection attacks (FDIAs) PCPSs. Firstly, view limited resources (such as energy) adversaries system protections, sparse target...

10.1177/00202940241268444 article EN cc-by Measurement and Control 2024-08-31

With the rapid development of high-speed railway around world, more advanced nondestructive evaluation (NDE) and structural health monitoring (SHM) techniques are required to detect damage in its forming stage before jeopardizes safety structures. In this aspect, guided-wave-based diagnostic imaging is a recent research focus, aimed at intuitionally showing healthy status structure under inspection. However, present mostly two-dimensional methods, which fail inspect complicated solid study,...

10.1002/stc.1966 article EN Structural Control and Health Monitoring 2016-11-20

The risk of ship-bridge collisions should be evaluated using advanced models to consider different anti-collision and bridge-protection measures. This study aimed propose a method evaluate the effectiveness active passive safety measures in preventing collision. A novel collision probability formulation taking into consideration was proposed. model applied at Jintang Bridge China where surrounding vessel traffic is ultra-crowded. We calculated between bridge passing automatic identification...

10.3390/s22082857 article EN cc-by Sensors 2022-04-08

SUMMARY In this paper, the problem of decentralized parameter estimation over noisy channels in a cluster‐based sensor network is studied. Each cluster head generates local estimate by adopting sample mean estimator. The estimates from all heads are compressed using one‐bit quantizer and then bits transmitted to fusion center independent binary symmetric channels. Two maximum likelihood estimators proposed for estimating based on received two different scenarios: (i) clusters have same...

10.1002/dac.1308 article EN International Journal of Communication Systems 2011-07-22

In present paper, a delayed SEIR model of malware propagation on mobile wireless sensor networks is formulated. Basic reproduction number the calculated by employing next generation matrix method and impact time delay due to incubation period discussed with help eigenvalue method. What more, properties Hopf bifurcation are derived using center manifold To minimize infectious nodes cost related detoxication, an optimal control strategy presented constructing suitable Hamiltonian function....

10.1016/j.rinp.2022.105926 article EN cc-by-nc-nd Results in Physics 2022-08-28
Coming Soon ...