Weicong Huang

ORCID: 0000-0003-0971-8791
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Quantum Information and Cryptography
  • Distributed Control Multi-Agent Systems
  • Cryptography and Data Security
  • Smart Grid Security and Resilience
  • Control and Dynamics of Mobile Robots
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance
  • Advanced Memory and Neural Computing
  • Adaptive Control of Nonlinear Systems
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Neural Networks Stability and Synchronization
  • Digital and Cyber Forensics

Guangzhou University
2023-2024

Nanjing University
2019-2022

10.1007/s12083-025-01960-7 article EN Peer-to-Peer Networking and Applications 2025-03-28

A fixed-time adaptive guaranteed performance tracking control is investigated for a category of nonholonomic mobile robots (NMRs) under asymmetric state constraints. For the sake favorable transient and steady-state properties system, prescribed function (PPF) introduced transform further constructed. Based on backstepping technique, an barrier Lyapunov formulated to ensure errors converge within human-specified time. On foundation this, occupation communication channel effectively reduced...

10.3390/math12101471 article EN cc-by Mathematics 2024-05-09

This work focuses on the consensus problem for multi-agent systems (MASs) with actuator failures and time-varying state constraints, presents a fixed-time self-triggered control protocol. The use of asymmetrical barrier Lyapunov functions (BLF) avoids violation constraints in MASs, ensuring stability safety. Meanwhile, system’s performance is further enhanced by leveraging proposed adaptive neural networks (NNs) method to mitigate effects nonlinear disturbances. Moreover, mechanism based...

10.3390/act12090364 article EN cc-by Actuators 2023-09-19

Abstract Quantum key agreement (QKA) is to negotiate a final among several participants fairly and securely. In this paper, we show that some existing travelling-mode multiparty QKA protocols are vulnerable internal participant’s attacks. Dishonest can exploit favorable geographical location or collude with other predetermine the keys without being discovered. To resist such attacks, propose new protocol based on non-orthogonal Bell states. Theoretical analysis shows proposed secure against...

10.1038/s41598-019-51987-z article EN cc-by Scientific Reports 2019-11-11

As the inevitable development trend of quantum key distribution, networks have attracted extensive attention, and many prototypes been deployed over recent years. Existing based on optical fibers or satellites can realize metro even global communications. However, for some application scenarios that require emergency temporary communications, such cannot meet requirements rapid deployment, low cost, high mobility. To solve this problem, we introduce an important concept classical networks,...

10.48550/arxiv.1904.11865 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Due to the unconditional security of quantum communication and flexible economical implementation wireless communication, networks (QWNs) have attracted wide attention. Different from fiber-based or satellite-based characteristics high dynamics, limited node energy, resource competition. We found that existing network routing protocols suffer path collision, energy consumption, low utilization resources. In this paper, a more practical efficient entanglement protocol, which can find...

10.1103/physreva.105.042619 article EN Physical review. A/Physical review, A 2022-04-27

With the increasing frequency of data circulation and sharing in power monitoring systems, traditional network-centric protection strategies are insufficient to resist growing risk leakage. This article analyzes security risks existing typical scenarios based on demand for systems. A technology framework covering source layer, interaction terminal layer has been proposed from perspectives basic capabilities key technologies, as well an evaluation method sharing. provides a reference idea...

10.1109/nana60121.2023.00046 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2023-08-01
Coming Soon ...