- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Quantum Information and Cryptography
- Distributed Control Multi-Agent Systems
- Cryptography and Data Security
- Smart Grid Security and Resilience
- Control and Dynamics of Mobile Robots
- Internet Traffic Analysis and Secure E-voting
- Distributed systems and fault tolerance
- Advanced Memory and Neural Computing
- Adaptive Control of Nonlinear Systems
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Neural Networks Stability and Synchronization
- Digital and Cyber Forensics
Guangzhou University
2023-2024
Nanjing University
2019-2022
A fixed-time adaptive guaranteed performance tracking control is investigated for a category of nonholonomic mobile robots (NMRs) under asymmetric state constraints. For the sake favorable transient and steady-state properties system, prescribed function (PPF) introduced transform further constructed. Based on backstepping technique, an barrier Lyapunov formulated to ensure errors converge within human-specified time. On foundation this, occupation communication channel effectively reduced...
This work focuses on the consensus problem for multi-agent systems (MASs) with actuator failures and time-varying state constraints, presents a fixed-time self-triggered control protocol. The use of asymmetrical barrier Lyapunov functions (BLF) avoids violation constraints in MASs, ensuring stability safety. Meanwhile, system’s performance is further enhanced by leveraging proposed adaptive neural networks (NNs) method to mitigate effects nonlinear disturbances. Moreover, mechanism based...
Abstract Quantum key agreement (QKA) is to negotiate a final among several participants fairly and securely. In this paper, we show that some existing travelling-mode multiparty QKA protocols are vulnerable internal participant’s attacks. Dishonest can exploit favorable geographical location or collude with other predetermine the keys without being discovered. To resist such attacks, propose new protocol based on non-orthogonal Bell states. Theoretical analysis shows proposed secure against...
As the inevitable development trend of quantum key distribution, networks have attracted extensive attention, and many prototypes been deployed over recent years. Existing based on optical fibers or satellites can realize metro even global communications. However, for some application scenarios that require emergency temporary communications, such cannot meet requirements rapid deployment, low cost, high mobility. To solve this problem, we introduce an important concept classical networks,...
Due to the unconditional security of quantum communication and flexible economical implementation wireless communication, networks (QWNs) have attracted wide attention. Different from fiber-based or satellite-based characteristics high dynamics, limited node energy, resource competition. We found that existing network routing protocols suffer path collision, energy consumption, low utilization resources. In this paper, a more practical efficient entanglement protocol, which can find...
With the increasing frequency of data circulation and sharing in power monitoring systems, traditional network-centric protection strategies are insufficient to resist growing risk leakage. This article analyzes security risks existing typical scenarios based on demand for systems. A technology framework covering source layer, interaction terminal layer has been proposed from perspectives basic capabilities key technologies, as well an evaluation method sharing. provides a reference idea...