Jinxiong Zhao

ORCID: 0000-0003-0189-4926
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Smart Grid and Power Systems
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Transition Metal Oxide Nanomaterials
  • Anomaly Detection Techniques and Applications
  • Technology and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Energy Load and Power Forecasting
  • Information and Cyber Security
  • Power Systems and Renewable Energy
  • Conducting polymers and applications
  • Topic Modeling
  • Adversarial Robustness in Machine Learning
  • Software System Performance and Reliability
  • Neural Networks and Applications
  • Thermal Expansion and Ionic Conductivity
  • Web Application Security Vulnerabilities
  • Microwave Dielectric Ceramics Synthesis
  • Cooperative Communication and Network Coding
  • Gas Sensing Nanomaterials and Sensors
  • Distributed Control Multi-Agent Systems
  • User Authentication and Security Systems
  • Blockchain Technology Applications and Security
  • Wireless Networks and Protocols

Electric Power Research Institute
2023

Northwestern Polytechnical University
2020-2023

State Grid Corporation of China (China)
2018-2019

Suzhou Institute of Nano-tech and Nano-bionics
2016-2017

Chinese Academy of Sciences
2016-2017

Xi'an Jiaotong University
2016

A recent technological trend in the field of electrochemical energy storage is to integrate and electrochromism functions one smart device, which can establish efficient user-device interactions based on a friendly human-readable output. This type newly born technology has drawn tremendous attention. However, there still plenty room for material innovation, would allow advancement research field. prototype Al-tungsten oxide electrochromic battery with interactive color-changing behavior...

10.1002/anie.201602657 article EN Angewandte Chemie International Edition 2016-05-09

Dual‐band electrochromic composite materials are of utmost importance in advancing the field toward achieving ideal smart window with independent control over visible and near‐infrared (NIR) radiation. However, such composites usually need deliberate architecting their mesoscale structure (e.g., via block copolymer‐templating method) to make electrolyte contact both NIR visible‐light modulating components. Herein, instead arduously making exterior pores, intrinsic structural tunnels utilized...

10.1002/adom.201700194 article EN Advanced Optical Materials 2017-04-27

In recent years, machine learning has made tremendous progress in the fields of computer vision, natural language processing, and cybersecurity; however, we cannot ignore that models are vulnerable to adversarial examples, with some minor malicious input modifications, while appearing unmodified human observers, outputs learning-based model can be misled easily. Likewise, attackers bypass machine-learning-based security defenses attack systems real time by generating examples. this paper,...

10.1155/2021/5578335 article EN cc-by Security and Communication Networks 2021-04-23

To protect the privacy of power data, we usually encrypt data before outsourcing it to cloud servers. However, is challenging search over encrypted data. In addition, need ensure that only authorized users can retrieve The attribute-based searchable encryption an advanced technology solve these problems. many existing schemes do not support large universe, expressive access policies, and hidden policies. this paper, propose keyword scheme for protection. Firstly, our proposed retrieval...

10.1016/j.hcc.2023.100115 article EN cc-by-nc-nd High-Confidence Computing 2023-03-02

At present, the ways for detecting SQL injection attacks include pre-compilation of statements, filtering user input at WEB layer to prevent injection, such as global parameters with Filter, strictly restricting operation authority database, and trying satisfy all. The lowest permissions operation, etc. detection method attack is mainly analyze incoming determine whether an illegal parameter passed in. However, due poor real-time performance analyzed traffic content accuracy, false positive...

10.1145/3331453.3361280 article EN Proceedings of the 3rd International Conference on Computer Science and Application Engineering 2019-10-21

Proactive defense is one of the most promising approaches to enhance cyber-security in power systems, while how balance its costs and benefits has not been fully studied. This paper proposes a novel method model cyber adversarial behaviors as attackers contending for defenders’ benefit based on game theory. We firstly calculate final hackers defenders different states basis constructed models then predict possible attack behavior evaluate best strategy systems. Based real system subnet, we...

10.1155/2021/6699108 article EN Security and Communication Networks 2021-02-12

Abstract A recent technological trend in the field of electrochemical energy storage is to integrate and electrochromism functions one smart device, which can establish efficient user–device interactions based on a friendly human‐readable output. This type newly born technology has drawn tremendous attention. However, there still plenty room for material innovation, would allow advancement research field. prototype Al‐tungsten oxide electrochromic battery with interactive color‐changing...

10.1002/ange.201602657 article EN Angewandte Chemie 2016-05-09

As the most basic means of network attack, port scanning is commonly used attack tool in penetration testing. Full-port system can identify potential threats to advance, however, existing full-port methods need scan full amount ports, which relatively time-consuming. In this paper, we propose a sampling-based method that minimize cost while maintaining accuracy. We use three tools perform controlled environment validate our method, and quantitatively analyze accuracy speed different scanners...

10.1109/itnec56291.2023.10082257 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2023-02-24

In order to effectively do network security protection, detecting system vulnerabilities becomes an indispensable process. Here, the vulnerability detection module with three functions is assembled into a device, and composite tool multiple proposed deal some frequent vulnerabilities. The includes total of types detection, including cross-site scripting attacks, SQL injection, directory traversal. First, let's first introduce principle each type vulnerability; then, method finally, detail...

10.1109/imcec46724.2019.8983828 article EN 2019-10-01

A key factor that affects the reliability of power system is robustness supports data transmission network and an important indicator for evaluating cyber whether it has active defense capabilities. This paper introduces artificial immune into security protection, uses theory danger to construct a with immunity. An model based on proposed, mapping relationship between behavior in analyzed, new self-adaptation, self-organization high parallelism established.

10.1109/icaml51583.2020.00011 article EN 2020-10-01

During major festivals, the power load of individual periods will increase exponentially. this period, electricity level reach 5 to 10 times usual, and peak-valley difference have a sudden increase. This bring great challenges supply quality timely repair station faults during important festivals. The accurate prediction can help stable operation reasonable allocation resources play an auxiliary role in decision-making. Based on real-time data 96-point certain area, paper uses long...

10.1109/imcec55388.2022.10019830 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2022-12-16

An important milestone in network development is ISO's (International Standardization Organization) definition of the OSI (Open System Interconnection) seven-layer model.The reference model a logical definition, that specification, it logically divides into seven layers.Each layer has related and corresponding physical devices, such as routers, switches, etc.It not only becomes basis for evaluation analysis various technologies before after, but also protocol design unification.Therefore,...

10.2991/tlicsc-18.2018.1 article EN cc-by-nc 2018-01-01

The traditional microcircuit card generally adopts the Crypto-1 private encryption algorithm, and its main components are a pseudo random number generator (PRNG), 48-bit linear feedback shift register (LFSR) nonlinear function. This paper mainly starts off from perspective of design flaw Filter Function algorithm: first, characteristics sequence generated when reader swipes card, same is re-established after each power failure; then, by controlling time position moment acquires energy...

10.1109/imcec46724.2019.8984143 article EN 2019-10-01

The deep integration of information flow and physical promotes the in-depth study electric cyberphysical systems(E-CPS), coupled with rapid development modern technology such as cloud computing, big data, internet things artificial intelligence, State Grid Corporation proposed an outline for construction ubiquitous Internet Things(UE-IoTs). In this manuscript, we first briefly introduce E-CPS UE-IoTs; Then, from essential mechanism two, close relationship between two was explored; Finally,...

10.1109/imcec46724.2019.8983978 article EN 2019-10-01
Coming Soon ...