Bo Zhou

ORCID: 0000-0002-7824-3673
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Service-Oriented Architecture and Web Services
  • Face and Expression Recognition
  • Business Process Modeling and Analysis
  • Network Security and Intrusion Detection
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Advanced Software Engineering Methodologies
  • Neural Networks and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Reinforcement Learning in Robotics
  • Advanced Memory and Neural Computing
  • Text and Document Classification Technologies
  • Autonomous Vehicle Technology and Safety
  • Neural Networks Stability and Synchronization
  • Data Quality and Management
  • Smart Parking Systems Research
  • Distributed systems and fault tolerance
  • Mobile Ad Hoc Networks
  • Imbalanced Data Classification Techniques
  • Machine Learning and ELM
  • Advanced Malware Detection Techniques
  • Access Control and Trust
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Information and Cyber Security

Second People’s Hospital of Yibin
2025

Liverpool John Moores University
2015-2024

Anhui Agricultural University
2024

Chongqing Jiaotong University
2010-2024

Huawei Technologies (United Kingdom)
2023-2024

Ipswich Hospital
2024

Lanzhou University of Technology
2024

China Telecom (China)
2023

Xi'an Jiaotong University
2018-2023

Beijing City University
2021-2023

In this paper, the boundedness and complete stability of complex-valued neural networks (CVNNs) with time delay are studied. Some conditions to guarantee CVNNs derived using local inhibition. Moreover, under conditions, a compact set that globally attracts all trajectories network is also given. Additionally, several in terms real-valued linear matrix inequalities (LMIs) for established via energy minimization method approach converts LMIs ones. Examples simulation results given show...

10.1109/tnnls.2013.2247626 article EN IEEE Transactions on Neural Networks and Learning Systems 2013-04-16

Due to the many beneficial effects on physical and mental health strong association with fitness rehabilitation programs, activity (PA) recognition has been considered as a key paradigm for Internet of Things healthcare. Traditional PA techniques focus repeated aerobic exercises or stationary PA. As crucial indicator in human health, it covers range bodily movement from aerobics anaerobic that may all bring benefits. However, existing approaches are mostly designed specific scenarios often...

10.1109/jiot.2018.2846359 article EN IEEE Internet of Things Journal 2018-06-12

10.1016/j.compeleceng.2014.04.015 article EN Computers & Electrical Engineering 2014-05-09

Formation lithology identification is of great importance for reservoir characterization and petroleum exploration. Previous methods are based on cutting logging well-logging data have a significant time lag. In recent years, many machine learning been applied to by utilizing data, which may be affected drilling fluid. Drilling string vibration high-density ancillary it has the advantages low-latency, can acquired in real-time. more accessible available compared ultra-deep well drilling....

10.3390/en13040888 article EN cc-by Energies 2020-02-17

Currently the false data injection (FDI) attack bring direct challenges in synchronized phase measurement unit (PMU) based network state estimation wide-area system, resulting degraded system reliability and power supply security. This paper assesses performance of electric cyber-physical paradigm considering presence FDI attacks. The adverse impact on is evaluated through simulations for a range scenarios using IEEE 14-bus model. In addition, an algorithmic solution proposed to address...

10.1109/jiot.2017.2769134 article EN IEEE Internet of Things Journal 2017-11-02

In recent years, Blockchain has been expected to create a secure mechanism for exchanging not only cryptocurrency but also other types of assets without the need powerful and trusted third-party. This could enable new era Internet usage called Value (IoV) in which any such as intellectual digital properties, equity wealth can be digitized transferred an automated, secure, convenient manner. IoV, is used guarantee security transactions that are nearly impossible altered; thus it impractical...

10.1109/icc.2018.8423014 article EN 2018-05-01

Configuration bugs are one of the dominant causes software failures. Previous studies show that a configuration bug could cause huge financial losses in system. The importance has attracted various research studies, e.g., To detect, diagnose, and fix bugs. Given report, an approach can identify whether is help developers reduce debugging effort. We refer to this problem as reports prediction. address problem, we develop new automated framework applies text mining technologies on...

10.1109/compsac.2014.17 article EN 2014-07-01

Explicitly or implicitly, most dimensionality reduction methods need to determine which samples are neighbors and the similarities between in original high-dimensional space. The projection matrix is then learnt on assumption that neighborhood information, e.g., similarities, known fixed prior learning. However, it difficult precisely measure intrinsic of space because curse dimensionality. Consequently, selected according such obtained corresponding might not be optimal sense classification...

10.1109/tnnls.2018.2886317 article EN IEEE Transactions on Neural Networks and Learning Systems 2019-01-10

The integrated scheduling of quay cranes, internal vehicles, and yard cranes in container terminals aims to improve port operations often requires robustness under uncertainty with cascade effects. In terminal operations, equipment operating time poses challenges effective scheduling, as even small fluctuations can create effects throughout the rendering original schedule ineffective. This research develop a new method that enables balance between optimization scheduling. Additionally,...

10.1016/j.trc.2023.104447 article EN cc-by-nc Transportation Research Part C Emerging Technologies 2023-12-06

10.1007/s10207-023-00662-6 article EN International Journal of Information Security 2023-02-06

Aiming at the problem of source-load uncertainty caused by increasing penetration renewable energy and large-scale integration electric vehicles (EVs) into modern power system, a robust optimal operation scheduling algorithm for regional integrated systems (RIESs) with such uncertain situations is urgently needed. Based on this background, aiming irregular charging demand EV, paper first proposes an EV model based trip chain theory. Secondly, multi-RIES optimization including shared storage...

10.3390/en17112453 article EN cc-by Energies 2024-05-21

To evaluate the clinical utility of improved machine learning models in predicting poor prognosis following endovascular intervention for intracranial aneurysms and to develop a corresponding visualization system. A total 303 patients with treated at four hospitals (FuShun County Zigong City People's Hospital, Nanchong Central The Third Hospital Yibin, Sixth Yibin) from January 2022 September 2023 were selected. These divided into good group (n = 207) 96). An model was employed analyze...

10.3389/fneur.2024.1482119 article EN cc-by Frontiers in Neurology 2025-01-08

Trust has been exploring in the era of Internet Things (IoT) as an extension traditional triad security, privacy and reliability for offering secure, reliable seamless communications services. It plays a crucial role supporting IoT entities to reduce possible risks before making decisions. However, despite large amount trust-related research IoT, prevailing trust evaluation model still debatable under development. In this article, we clarify concept Social (SIoT) ecosystems propose...

10.1109/glocom.2017.8254523 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

The future security of Internet Things is a key concern in the cyber-security field. One issues ability to generate random numbers with strict power and area constrains. "True Random Number Generators" have been presented as potential solution this problem but improvements output bit rate, consumption, design complexity must be made. In work we present novel experimentally verified Generator" that uses exclusively conventional CMOS technology well offering over previous designs complexity,...

10.1038/s41598-020-74351-y article EN cc-by Scientific Reports 2020-10-14

This paper focuses on imbalanced dataset classification problem by using SVM and oversampling method. Traditional method increases the occurrence of over-lapping between classes, which leads to poor generalization classification. To solve this proposes a combined quasi-linear assembled SMOTE. The is an with kernel function. It realizes approximate nonlinear separation boundary mulit-local linear boundaries interpolation. SMOTE implements considering data distribution information avoids...

10.1109/ijcnn.2013.6707035 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2013-08-01

A novel True Random Number Generator (TRNG), using random telegraph noise (RTN) as the entropy source, is proposed to address speed, design area, power and cost simultaneously. For first time, breaks inherent speed limitation generates true numbers up 3Mbps with ultra-low power. This over 10 times faster than state-of-the-art RTN-TRNG [6]. Moreover, new does not require selection of devices thus avoids use large transistor array laborious post-selection process. reduces circuit area cost....

10.1109/vlsit.2018.8510671 article EN 2018-06-01

The modelling of healthcare process is inherently complicated due to its multi-disciplinary character. Business Process Model and Notation (BPMN) has been considered applied model demonstrate the flexibility variability activities that involved in process. However, with growing usage digital information IoT technology system, issue security privacy becomes main concern term both store management electronic health record (EHR). Therefore, it very important capture requirements at conceptual...

10.1109/cit/iucc/dasc/picom.2015.346 article EN 2015-10-01
Coming Soon ...