- Smart Grid Security and Resilience
- Concrete and Cement Materials Research
- Piezoelectric Actuators and Control
- Traffic Prediction and Management Techniques
- Innovative concrete reinforcement materials
- Network Security and Intrusion Detection
- High Entropy Alloys Studies
- Advanced MEMS and NEMS Technologies
- Grouting, Rheology, and Soil Mechanics
- Civil and Geotechnical Engineering Research
- Autonomous Vehicle Technology and Safety
- Innovations in Concrete and Construction Materials
- Nonlinear Dynamics and Pattern Formation
- COVID-19 Clinical Research Studies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced ceramic materials synthesis
- Esophageal and GI Pathology
- Pharmacological Effects of Medicinal Plants
- Advanced Vision and Imaging
- Adversarial Robustness in Machine Learning
- Network Time Synchronization Technologies
- Soil, Finite Element Methods
- Pharmacy and Medical Practices
- Additive Manufacturing Materials and Processes
- Wireless Communication Security Techniques
Ministry of Education of the People's Republic of China
2020-2024
Southeast University
2020-2024
Sichuan Agricultural University
2022-2024
Southeast University
2020
Henan Polytechnic University
2020
Wuhan Pulmonary Hospital
2020
Third Affiliated Hospital of Guangzhou Medical University
2016
Guangzhou Medical University
2016
Suzhou Traditional Chinese Medicine Hospital
2015
Manchester Airport
2015
This article studies the secure state estimation and control problem of cyber-physical systems, where there are multiple heterogeneous sensing nodes one actuator which both under threat intermittent false data injection attacks. A specific filter gain is proposed by solving equality constrained optimization so that attack on does not affect <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">a posteriori</i> error system. new method to construct...
High-temperature affordable flexible polymer-based pressure sensors integrated with repeatable early fire warning service are strongly desired for harsh environmental applications, yet their creation remains challenging. This work proposed an approach preparing such advanced based on silver nanoparticles and ammonium polyphosphate (APP)-modified laminar-structured bulk wood sponge (APP/Ag@WS). Such demonstrated excellent performance, including a short response time (minimum of 0.44 s),...
This paper studies the secure and safe control problem of connected automated vehicles (CAVs) with false data injection (FDI) attacks. A controller a novel surrounding vehicles' state estimator an attack detector is proposed. The estimation for collectively processed by combining deep neural network-based predictions model-based estimations. Additionally, weight in loss function proposed more accurate that are closer to ego vehicle. For detection, scheme utilizes outcomes train detection...
In this paper, a motion planning for autonomous driving on highway is studied. A high-level controller with discrete action space designed based deep Q network (DQN). An occupancy grid state presentation aiming at specific scenarios proposed and then novel attention mechanism named external spatial (ESA) to improve the performance. Con-sidering both computational complexity interpretability, lightweight data-driven safety layer consisting of two-dimensional linear biased support vector...
Here, the authors study distributed time‐varying output formation‐containment control of heterogeneous multi‐agent systems, where multiple targets have dynamics and unknown inputs. A adaptive observer‐based controller is proposed. Firstly, consensus‐based finite impulse response filters are established to estimate inputs states targets. Then, by constructing an augmented system with centre targets' outputs as its using observers, regulation‐based developed make agents encircle certain...
Chemical components with anti-oxidant, anti-inflammatory, and anti-cancer properties extracted from Alnus bark leaves have been extensively studied. However, less attention has paid to extractives pods, which are mostly treated as waste. Here, of cremastogyne pods 12 provenances in Sichuan Province were studied for high value-added utilization The analyzed by Gas Chromatography-Mass Spectrometer (GC-MS), Ultraviolet-visible spectroscopy (UV-Vis spectra), 1,1-diphenyl-2-picrylhydrazyl (DPPH)...
Considering the nonlinear mechanical-magnetic coupling effects, an accurate mathematical model was established for analyzing large stroke penta-stable mechanism possessing multistability transforming capability, with which can be switched from pentastability to quadristability. The any number of stable states achieved by integrating spatially arranged magnets and deformation beams as fundamental energy storage elements maintain states. By theoretically influence mechanical on magnetic field...
Mimic defense is an active theory, which aims to fundamentally change the "easy attack and difficult defend" situation of network security. In this paper, we propose evaluation method based on probability being successfully, improve scheme historical confidence. We combine two schemes with TOPSIS (technique for order performance by similarity ideal solution) algorithm, finally form a complete heterogeneous variant dynamic scheduling model. Different from traditional multi-mode voting...
Different from multistable mechanisms incorporating multiple bistable elements, a novel universal mechanism possessing the capability of being triggered in all in-plane directions was first designed and fabricated by using symmetric 3-D magnetic structures, which mainly consists one ring supported elastic rod axially magnetized pillar fixed on aluminum case. The isotropic multistability originated nonlinear interactions among inertial force, force. According to pseudo-rigid-body model charge...
Attacks on the cyber-physical systems (CPSs) are increasing recently, which makes research of CPSs' security issues more urgent. χ <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> -detector, most common attack detector, has a fatal defect, that it requires all covariance matrices observation residual be reversible. In this paper, we propose novel method to construct an detection variable obeying distribution without special requirements,...