Lijun Cai

ORCID: 0000-0002-9665-592X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Superconducting Materials and Applications
  • Magnetic confinement fusion research
  • Fusion materials and technologies
  • Network Security and Intrusion Detection
  • Particle accelerators and beam dynamics
  • Complex Network Analysis Techniques
  • Advanced Malware Detection Techniques
  • Opinion Dynamics and Social Influence
  • Physics of Superconductivity and Magnetism
  • Information and Cyber Security
  • Internet Traffic Analysis and Secure E-voting
  • Plasma Diagnostics and Applications
  • Anomaly Detection Techniques and Applications
  • Spacecraft and Cryogenic Technologies
  • HVDC Systems and Fault Protection
  • Software System Performance and Reliability
  • Nuclear Materials and Properties
  • Peer-to-Peer Network Technologies
  • Supply Chain and Inventory Management
  • Advanced Graph Neural Networks
  • Digital and Cyber Forensics
  • Nuclear reactor physics and engineering
  • High-Voltage Power Transmission Systems
  • High voltage insulation and dielectric phenomena
  • Advanced Clustering Algorithms Research

Institute of Information Engineering
2018-2025

Chinese Academy of Sciences
2015-2025

Southwestern Institute of Physics
2015-2024

China National Nuclear Corporation
2019-2024

CRRC (China)
2024

Nanjing Drum Tower Hospital
2023

Southeast University
2023

Hunan University
2016-2021

University of Chinese Academy of Sciences
2020

Heilongjiang Academy of Agricultural Machinery Engineering
2018

Abstract Since the last IAEA Fusion Energy Conference in 2018, significant progress of experimental program HL-2A has been achieved on developing advanced plasma physics, edge localized mode (ELM) control physics and technology. Optimization confinement performed. In particular, high- β N H-mode plasmas exhibiting an internal transport barrier have obtained (normalized pressure reached up to 3). Injection impurity improved confinement. ELM using resonance magnetic perturbation or injection a...

10.1088/1741-4326/ac3be6 article EN Nuclear Fusion 2021-11-23

Abstract The perpetual battle between defenses and attacks in computing systems keeps evolving. In response to the growing complexity of attacks, data provenance has emerged as a vital solution for analysing alarms conducting attack investigation by capturing intricate relationships among system entities. Despite its potential, challenges dealing with large-scale graphs high volume persist, leading inefficiencies alarm analysis investigation. To tackle these challenges, we present...

10.1093/comjnl/bxaf006 article EN The Computer Journal 2025-02-01

Abstract Since the first plasma realized in 2020, a series of key systems on HL-3 (known as HL-2M before) tokamak have been equipped/upgraded, including in-vessel components (the wall, lower divertor, and toroidal cryogenic/water-cooling/baking/glow discharge systems, etc.), auxiliary heating system 11 MW, 28 diagnostic (to measure density, electron temperature, radiation, magnetic field, etc.). Magnet field were commissioned firstly for divertor discharges. During 2nd experimental campaign...

10.1088/1741-4326/ad6e9e article EN cc-by Nuclear Fusion 2024-08-13

Abstract The controllability of the heat load and impurity in divertor is very important, which could be one critical problems to solved order ensure success for a steady state tokamak. HL-2M has advantage poloidal field (PF) coils placed inside demountable toroidal (TF) close main plasma. As result, it possible make highly accurate configuration control advanced HL-2M. target geometry been designed compatible with different configurations study physics support high performance plasma...

10.1088/0029-5515/56/12/126013 article EN Nuclear Fusion 2016-09-14

Data mining task is a challenge on finding high-quality community structure from largescale networks. The distance dynamics model was proved to be active regular-size network community, but it difficult discover the effectively large-scale (0.1-1 billion edges), due limit of machine hardware and high time complexity. In this paper, we proposed parallel detection algorithm based called P-Attractor, which capable handling problem large networks community. Our first developed graph partitioning...

10.1109/access.2018.2859788 article EN cc-by-nc-nd IEEE Access 2018-01-01

The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this its very long computation time in large-scale networks. To identify network with high speed and quality, paper, we propose fast detection algorithm, F-Attractor, which based on model. main contributions F-Attractor are as follows. First, use two prejudgment rules from different perspectives: node edge. Based these rules, develop strategy...

10.23919/tst.2017.8195341 article EN Tsinghua Science & Technology 2017-12-01

Abstract Externally applied resonant magnetic perturbations (RMPs), generated by coils located outside the plasma (referred to as RMP coils), provide an effective way control edge localized mode (ELM) in tokamak devices. Due discrete nature of toroidal distribution these window-frame coils, sidebands always exist together with fundamental harmonics designed for ELM control. In this work, MARS-F code (Liu et al 2000 Phys. Plasmas 7 3681) is investigate detailed features spectra considering...

10.1088/1741-4326/acea93 article EN cc-by Nuclear Fusion 2023-07-26

10.1109/tifs.2024.3410511 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

10.1016/j.fusengdes.2021.112928 article EN Fusion Engineering and Design 2021-11-15

The insider threat continues to be a paramount cyber security challenge that threatens individuals, financial enterprises and governmental organizations. To deter threats, traditional detection, which mainly focuses on policy checks anomaly detection for users' computers network activities, has been studied widely. However, because insiders have intrinsic authorized access at attack under normal behavior profiles, it is necessary integrate the attackers' psychological characteristics. This...

10.1109/bigdataservice.2018.00011 article EN 2018-03-01

Graph clustering aims to identify clusters that feature tighter connections between internal nodes than external nodes. We noted conventional approaches based on a single vertex or edge cannot meet the requirements of in higher-order mixed structure formed by multiple complex network. Considering above limitation, we are aware fact coefficient can measure degree which graph tend cluster, even if only small area is given. In this paper, introduce new cluster quality score, i.e., local motif...

10.1109/jiot.2019.2923228 article EN IEEE Internet of Things Journal 2019-06-18
Coming Soon ...