Guanghui Wang

ORCID: 0000-0002-9275-8323
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Indoor and Outdoor Localization Technologies
  • Mobile Crowdsensing and Crowdsourcing
  • Blockchain Technology Applications and Security
  • Underwater Vehicles and Communication Systems
  • Cooperative Communication and Network Coding
  • Robotics and Sensor-Based Localization
  • IoT and Edge/Fog Computing
  • Error Correcting Code Techniques
  • Advanced Algorithms and Applications
  • Metaheuristic Optimization Algorithms Research
  • Mobile Ad Hoc Networks
  • Soil Mechanics and Vehicle Dynamics
  • Advanced Wireless Communication Techniques
  • Cryptography and Data Security
  • Power Systems and Technologies
  • Energy Efficient Wireless Sensor Networks
  • Stochastic Gradient Optimization Techniques
  • Advanced Sensor and Control Systems
  • Electric Motor Design and Analysis
  • Wireless Sensor Networks and IoT
  • Neural Networks Stability and Synchronization
  • Energy Harvesting in Wireless Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Communication Technologies

Zhengzhou University
2020-2025

Henan University
2006-2024

Qinghai University
2024

Toronto Metropolitan University
2024

Hubei University of Automotive Technology
2022-2024

Shandong University
2024

Beijing Aerospace Flight Control Center
2023

Changsha University of Science and Technology
2021-2023

Inner Mongolia Electric Power (China)
2022-2023

Shanghai Industrial Technology Institute
2023

A cyber physical system (CPS) is a complex that integrates computation, communication, and processes.Digital manufacturing method of using computers related technologies to control an entire production process.Industry 4.0 can make more efficient, flexible, sustainable through communication intelligence; therefore, it increase the competitiveness.Key such as Internet Things, cloud computing, machine-to-machine (M2M) communications, 3D printing, Big Data have great impacts on Industry 4.0.Big...

10.5815/ijem.2016.04.01 article EN International Journal of Engineering and Manufacturing 2016-07-06

We introduce ART, a distribution-free and model-agnostic framework for changepoint detection that provides finite-sample guarantees. ART transforms independent observations into real-valued scores via symmetric function, ensuring exchangeability in the absence of changepoints. These are then ranked aggregated to detect distributional changes. The resulting test offers exact Type-I error control, agnostic specific or model assumptions. Moreover, seamlessly extends multi-scale settings,...

10.48550/arxiv.2501.04475 preprint EN arXiv (Cornell University) 2025-01-08

Privacy-preserving localization in crowdsourcing has drawn much attention recently. Under the classical nonadjacent subtraction-based (NSL) model, existing solutions based on homomorphic encryption techniques are of high computational and communication overheads. In this paper, an adjacent (ASL) model is first proposed. Then, efficient privacy-preserving (EPPL) algorithm developed under ASL without using any technique. terms correctness, privacy, efficiency, a comprehensive analysis...

10.1109/jiot.2017.2772291 article EN IEEE Internet of Things Journal 2017-11-10

Abstract The chirality-controlled two-mode Lipkin–Meshkov–Glick (LMG) models are mimicked in a potential hybrid quantum system, involving two ensembles of solid-state spins coupled to pair interconnected surface-acoustic-wave cavities. With the assistance dichromatic classical optical drives featuring chiral designs, it can simulate LMG-type long-range spin-spin interactions with left-right asymmetry. For applications, this unconventional LMG model not only engineer both collective into...

10.1088/1361-6633/ad797d article EN Reports on Progress in Physics 2024-09-11

This paper investigates the problem of participant selection considering colluding attacks for crowdsourcing. Compared with existing work, a practical vulnerability-induced attack model is considered, where malicious participants different vulnerability levels collude each other to perform attacks, which makes more challenging. To address this problem, according structural characteristics model, we derive necessary condition and sufficient achieving possibility minimization selected...

10.1109/tvt.2022.3171396 article EN IEEE Transactions on Vehicular Technology 2022-04-29

10.1109/cvprw63382.2024.00804 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2024-06-17

Big Data analyzes correlations from huge raw data and predicts outcomes. It has great impacts on scientific discoveries value creation. High Performance Computing (HPC) uses parallel processing advanced programs or software packages to complete complicated jobs quickly. Finite Element Method (FEM) is very powerful in computation engineering analysis. created values almost every area of engineering. In a lot applications, Analysis (FEA) strongly relies computer technology HPC. will play an...

10.3844/ajeassp.2015.767.774 article EN cc-by American Journal of Engineering and Applied Sciences 2015-04-01

In this article, a novel multiple three-phase PM assisted synchronous reluctance machine with delta windings is proposed for enhanced fault tolerance. The connected offer an additional degree of freedom the phase currents. Hence, drive could provide higher torque under open-circuit condition. More importantly, inherently contain zero sequence current path and help reducing turn in event most challenging short-circuit fault. Owing to current, residual flux linkage more effectively nullified...

10.1109/tie.2022.3156146 article EN IEEE Transactions on Industrial Electronics 2022-03-09

This paper presents a power electronic circuit used to extract usable electrical from backpack-based energy harvesting system. The rectified output of generator is connected SEPIC converter which emulates resistive load, resulting in efficient conversion. harvested stored ultracapacitors, where it then charge electrochemical batteries and/or an load. A switchable load engaged dissipate any excess that cannot be or stored. As shown experimental results presented this paper, 16 W electric...

10.1109/ecce.2009.5316179 article EN 2009-09-01

This article proposes a decomposition-based multi-objective differential evolution particle swarm optimization (DMDEPSO) algorithm for the design of tubular permanent magnet linear synchronous motor (TPMLSM) which takes into account multiple conflicting objectives. In process, objectives are evaluated by an artificial neural network response surface (ANNRS), is trained samples TPMSLM whose performances calculated finite element analysis (FEA). DMDEPSO hybridizes (DE) and (PSO) together,...

10.1080/0305215x.2012.720682 article EN Engineering Optimization 2012-10-03

In network function virtualization (NFV), implemented in software on the generally shared servers is called virtualized (VNF).The characteristics of provide service chain (SFC) provisioning with required flexibility by allowing for placing VNFs anywhere and anytime.However, there may be a large number low utilization across at low-load time, leading to enormous loss energy.VNF consolidation, as an effective way address this issue, allows energy saving consolidating into fewer...

10.1109/access.2019.2915919 article EN cc-by-nc-nd IEEE Access 2019-01-01

Low-rank adaptation (LoRA) and its variants are widely employed in fine-tuning large models, including language models for natural processing diffusion computer vision. This paper proposes a generalized framework called SuperLoRA that unifies extends different LoRA variants, which can be realized under hyper-parameter settings. Introducing grouping, folding, shuffling, projecting, tensor factoring, offers high flexibility compared with other demonstrates superior performance transfer...

10.48550/arxiv.2403.11887 preprint EN arXiv (Cornell University) 2024-03-18

Model quantization has drawn much attention for federated learning (FL) over the Internet of Things (IoT) since it is an effective way to address critical bottleneck communication efficiency. State-of-the-art studies have generally assumed homogeneous model quantization, where all clients' updates are quantized using same number bits and aggregated with weight at server. However, in practical IoT scenarios, various devices may apply heterogeneous due their different hardware capabilities,...

10.1109/jiot.2023.3296493 article EN IEEE Internet of Things Journal 2023-07-18

Localization has drawn much attention in the Internet of Things (IoT) era. Under traditional multilateration techniques, existing solutions usually need multiple anchor nodes to perform localization, which introduces more system complexity and cost. In this paper, single localization (SAL) is first modeled, where a multi-antenna node able estimate location target using both angle distance information. Then, according SAL, we propose an accurate distributed (ADL) algorithm, can not only with...

10.1109/icc.2019.8761230 article EN 2019-05-01
Coming Soon ...