Qiang Fu

ORCID: 0000-0002-5490-2419
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Wireless Body Area Networks
  • Control Systems in Engineering
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • Hydraulic and Pneumatic Systems
  • High voltage insulation and dielectric phenomena
  • Mechanical stress and fatigue analysis
  • Fluid Dynamics and Vibration Analysis
  • E-commerce and Technology Innovations
  • Lightning and Electromagnetic Phenomena
  • Refrigeration and Air Conditioning Technologies
  • Adaptive Control of Nonlinear Systems
  • Advanced Algorithms and Applications
  • Vibration and Dynamic Analysis
  • Embedded Systems and FPGA Design
  • Probabilistic and Robust Engineering Design
  • Digital Transformation in Industry
  • ECG Monitoring and Analysis
  • Spam and Phishing Detection
  • Nuclear Engineering Thermal-Hydraulics

Northeastern University
2016-2024

China Electronics Technology Group Corporation
2024

Shenyang University of Chemical Technology
2022-2024

Universidad del Noreste
2024

Chengdu Technological University
2022-2023

Qingdao University of Technology
2022-2023

Neusoft (China)
2020-2021

China National Institute of Standardization
2021

Ministry of Public Security of the People's Republic of China
2020

Zhongnan University of Economics and Law
2012

Due to manufacturing errors and material deteriorations in the metal rubber of clamps, clamp stiffness pipeline is uncertain. This paper presents a non-intrusive multi-dimensional Chebyshev polynomial approximation method (M-CPAM) evaluate uncertain characteristics frequency response function (FRF) clamp-pipeline system (CPS), where parameters are taken as unknown but bounded interval variables. Firstly, finite element model established. Secondly, variance-based global sensitivity analysis...

10.1109/access.2020.2972396 article EN cc-by IEEE Access 2020-01-01

10.1016/j.apm.2019.01.014 article EN publisher-specific-oa Applied Mathematical Modelling 2019-01-16

With rapid development of Internet, network security issues become increasingly serious. Temporary patches have been put on the infectious hosts, which may lose efficacy occasions. This leads to a time delay when vaccinated hosts change susceptible hosts. On other hand, worm infection is usually nonlinear process. Considering actual situation, variable rate introduced describe spread process worms. According above aspects, we propose time-delayed propagation model with rate. Then existence...

10.1155/2018/9756982 article EN cc-by Security and Communication Networks 2018-01-01

The Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model network. honeynet an active approach that can attract malware provide sample information immunization strategy of malware. An with quarantine network formulated to explore dynamics propagation, potency analyzed well....

10.1109/access.2020.2989612 article EN cc-by IEEE Access 2020-01-01

The design and implementation of a non-contact RF (radio frequency) sensor that can monitor vital signsrespiration rate heat is proposed.The designed low-cost system operates at 2.45 GHz by using one single Yagi antenna to transmit receive signals, realizes miniaturized PCB integrates both microwave transceivers receivers.The gain the 8.96 dB.The return loss -22.87 dB directionality satisfactory for monitoring signs.In comparison with pulse respiration sensor, it has been validated could...

10.22489/cinc.2016.319-267 article EN Computing in cardiology 2016-09-14

Fingerprinting techniques have been widely used in the security field. However, due to complexity and heterogeneousness of Industrial Control System (ICS) network, there is hardly any method fingerprint attack traffic against it. In this paper, we propose a ICS networks. The proposed can not only identify different kinds but also evaluate their potentially malicious intents. addition, able discover new from network traffic. Specifically, characterized as communication pattern, which intent...

10.1109/iciai.2019.8850807 article EN 2019-07-01

Abstract The QN9080DK is a development board from NXP specifically for the wireless access market, which has an integrated QN9080 Bluetooth system-on-a-chip (SOC) with Arm CortexM4F core and dedicated fusion sensor coprocessor. In this paper, help of MCUXpresso environment (IDE), SDK, CrotexM4F core, 5.0, serial communication, Arduino software hardware so on, fingerprint lock controller designed fabricated. functions user password unlocking, entry, unlocking permission deletion, etc. After...

10.1088/1742-6596/2173/1/012066 article EN Journal of Physics Conference Series 2022-01-01

Botnets, especially peer-to-peer (P2P) botnets have become the root because of many Internet attacks recently. A novel dynamical model is presented to describe propagation P2P which called SIIR model. To effectively suppress botnets, quarantine and virtual patching strategy are proposed two models given based on (SIIQR SIIQPR model). The can examine impact different containment strategies growth botnets. In addition, stability equilibrium investigated basic reproduction number obtained...

10.22541/au.170666943.34830226/v1 preprint EN Authorea (Authorea) 2024-01-31

As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence.The connection between the external internet is becoming increasingly close, which leads to frequent security accidents.This paper proposes a model for network.It includes malware containment strategy that integrates intrusion detection, quarantine, monitoring.Based on this model, role key nodes in spread studied, comparison experiment conducted validate...

10.32604/cmc.2024.048117 article EN Computers, materials & continua/Computers, materials & continua (Print) 2024-01-01

As an important pipeline support component, metal rubber clamp is mainly used for connection, fixation and vibration isolation. At present, the researches on hysteretic stiffness characteristics of clamps in aero engines are still their infancy. This work aims to develop a nonlinear mechanical calculation model effectively capture properties, such as hysteresis variable behavior. The equivalent was established by introducing tightening torque friction between wires control variables,...

10.1080/15397734.2024.2431858 article EN Mechanics Based Design of Structures and Machines 2024-11-26

This paper proposes a fault diagnosis and tolerant control method based on second-order speed prediction for motor Hall sensor faults in the antenna servo system. Firstly, signal sequence of permanent magnet brushless system was analyzed, state used as signal. Meanwhile, designed discrete motor. Then predicted generated real-time by using signal, controller with established. Finally, effectiveness proposed verified through experiments.

10.1117/12.3036977 article EN 2024-12-04

Abstract With the development of artificial intelligence (AI) and advancement industrial technology, electric vehicles have become main tools for people’s travel mobility. In order to cope with faster rhythms life meet aspirations live a better life, integration AI technology automobiles is becoming closer more popular. this study, transplantation TensorFlow Keras architecture on embedded platform implemented. An intelligent tracking car designed completed. It takes one i.MX RT1064 as core...

10.1088/1742-6596/2508/1/012049 article EN Journal of Physics Conference Series 2023-05-01

The malware attacks targeting the industrial control network are gradually increasing, and nonlinear phenomenon makes it difficult to predict propagation behavior of malware. Once dynamic system becomes unstable, will be out control, which seriously threaten security network. So, is necessary model study in In this paper, a SIDQR with dual delay proposed by fully considering characteristics By analyzing dynamics model, Hopf bifurcation discussed detail when value greater than zero,...

10.1155/2023/8823080 article EN cc-by Complexity 2023-10-30

Botnets, especially peer-to-peer (P2P) botnets have become the root because of many Internet attacks recently. To effectively suppress P2P botnets, quarantine and virtual patching strategy are proposed two dynamical models (SIIQR model SIIQPR model) given based on SIIR model. The can examine impact different containment strategies growth botnets. In addition, stability equilibrium is investigated basic reproduction number obtained, which governs whether or not extinct. contain propagation...

10.1155/2022/2851677 article EN Mathematical Problems in Engineering 2022-10-29
Coming Soon ...