Peng Zhai

ORCID: 0000-0003-1097-846X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Advanced Authentication Protocols Security
  • Smart Grid and Power Systems
  • Mobile Agent-Based Network Management
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Power Systems and Technologies
  • Mobile Ad Hoc Networks
  • Network Time Synchronization Technologies
  • Advanced Sensor and Control Systems
  • Hydraulic and Pneumatic Systems
  • Embedded Systems and FPGA Design
  • Real-Time Systems Scheduling
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Computational Techniques and Applications
  • Vehicle Dynamics and Control Systems
  • Service-Oriented Architecture and Web Services
  • Real-time simulation and control systems
  • High-Voltage Power Transmission Systems
  • Petri Nets in System Modeling
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Advanced Image and Video Retrieval Techniques
  • Neural Networks and Applications

Jining University
2009-2023

Beijing University of Technology
2018-2022

PRG S&Tech (South Korea)
2014

Liaocheng People's Hospital
2014

University of Wollongong
2013

Xi'an Shiyou University
2012

Microsoft Research (United Kingdom)
2007

The integration of information systems and physical is the development trend today’s manufacturing industry. Intelligent a new model manufacturing, based on advanced technology with human–machine–material collaboration. Internet Things core intelligent access control one main measures to ensure security IoT. In view problem that existing IoT does not support distributed fine-grained dynamic control, this paper uses characteristics blockchain, such as decentralization non-tampering, combined...

10.3390/app12073692 article EN cc-by Applied Sciences 2022-04-06

For the Steer-by-Wire system, it is necessary to develop advanced control systems and design architectures. In this paper, a new SBW system with consideration of variable gear-ratio presented. This includes two loops, which are called upper loop lower loop, respectively, achieve bilateral control. The force feedback motor, installed steering wheel, in front wheel adopted these PID controllers designed for them, so that signal road feeling can be tracked. To improve vehicle handling...

10.1109/iciea.2013.6566478 article EN 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA) 2013-06-01

AbstractTrust has been widely used as an effective means of dealing with security issues in open networks. By taking into consideration the requirement on dynamic adaptability and incorporating factors insufficient conglomerate incentive mechanisms trust evaluation, we propose this paper a evaluation model based multiple that is suitable for In proposed model, takes direct includes historical information to improve accuracy recommendation bonus-penalty factor reliability efficiency. The...

10.1080/10798587.2016.1167438 article EN Intelligent Automation & Soft Computing 2016-04-20

For the high accuracy synchronization requirement of IEC61850 based digital substation, to apply a combination time scheme Substation Automation System (SAS), PTP(pricision protocol) is adopted between bay level and process equipment, paper presents method adjusted frequency phase achieve precision on principle PTP. The result experiment shows algorithm more effective.

10.1109/iccect.2012.226 article EN International Conference on Control Engineering and Communication Technology 2012-12-01

Context-aware emotion recognition (CAER) is a complex and significant task that requires perceiving emotions from various contextual cues. Previous approaches primarily focus on designing sophisticated architectures to extract emotional cues images. However, their knowledge confined specific training datasets may reflect the subjective biases of annotators. Furthermore, acquiring large amounts labeled data often challenging in real-world applications. In this paper, we systematically explore...

10.48550/arxiv.2407.11300 preprint EN arXiv (Cornell University) 2024-07-15

Zero-shot coordination problem in multi-agent reinforcement learning (MARL), which requires agents to adapt unseen agents, has attracted increasing attention. Traditional approaches often rely on the Self-Play (SP) framework generate a diverse set of policies policy pool, serves improve generalization capability final agent. However, these frameworks may struggle capture full spectrum potential strategies, especially real-world scenarios that demand balance cooperation with competition. In...

10.48550/arxiv.2411.01166 preprint EN arXiv (Cornell University) 2024-11-02

Wireless sensor networks are a significant subfield of distributed systems, and large number their applications require time synchronization. Sensor nodes powered by batteries. In order to reduce the interference peripheral environment on node as much possible, size is relatively small circuit design, storage, calculation simple. Therefore, wireless network have limited energy, low computing power, communication capacity. addition, clock usually realized through local crystal oscillator CPU...

10.1155/2022/2766796 article EN Mobile Information Systems 2022-02-27

Training time is an important consideration in classification practices. Various algorithms like SVM usually suffer from high computational cost during the training process. In this paper, we proposed a hybrid algorithm, by combining RNN and together. rapid neural network with randomly generated input weights, which performs as fast, light weighted data selector. Selected are then used to train alternative SVM. The definition of crucial corresponding selection method defined for paper. We...

10.1109/smc.2015.184 article EN 2015-10-01

Effective and steady routing protocol will be an important factor to ensure performance of network. Protocol test is means guarantee the rightness effectiveness implementations a protocol. conformance focuses on implementation under requirement standards. According characteristic BGP4+ protocol, design testing system for introduced. In our design, environment multiple virtual testers with controlling channel used XML language chosen as case describing language. This gets both good ability...

10.1109/csss.2012.153 article EN International Conference on Computer Science and Service System 2012-08-01

Most of the traditional drilling fault diagnosis & decision systems use static data mining technology, so update knowledge base becomes its bottlenecks in development. In order to meet actual needs, this paper puts forward method, which combines dynamic technology with case-based reasoning design systems. First, system overall, then describe realization how realize and detail, finally, introduce some question about base.

10.4028/www.scientific.net/amr.524-527.1350 article EN Advanced materials research 2012-05-01

Time synchronization is critical in distributed network system. A variety of protocols, middleware and business applications rely on proper time across the computational infrastructure depend clock accuracy. The "Network Protocol" (NTP) current widely accepted standard for synchronizing clocks over Internet. In order to reduce access frequency NTP server, efficiently decreases over-loaded phenomena server. more exactly errors was conclude by adopting Allan variance analysis resource, types...

10.1109/icacte.2010.5579064 article EN 2010-08-01

To improve the security of authentication system and strengthen privacy protection in mobile Internet environment, this paper proposes a provably secure Chebyshev chaotic map (CCM)-based scheme (CCMbAS). The proposed transformed traditional public key into private combined two keys to compute one-time used encrypt information. is verified using review BAN logic ProVerif simulation tool. verification results confirm that well secured against all existing threats. Compared with similar...

10.1155/2022/7318948 article EN Mobile Information Systems 2022-10-12

WMNs (Wireless Mesh Networks) are a new wireless broadband network structure based completely on IP technologies and have rapidly become access measure to offer high capacity, speed wide coverage.WMN is such that doesn't need rely fixed infrastructure operated over an open, medium.Any user within the covered area of radio wave may network.Therefore, authentication for first line defense can prevent unauthorized users from accessing network.An scheme thus key mechanism ensure secure access.In...

10.2991/csss-14.2014.65 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2014-01-01

The type of business relationships between the Internet autonomous systems (AS) determines BGP interdomain routing. Previous works on inferring AS relied connectivity information betweenASes.In this paper we thoroughly investigate route policy ASes, then present a method that can conduct new policies.On basis that, also polices verification based relationships.Through find out abnormal prefix advertise to verify policies.We accumulate data from RouteViews, RIPE RIS and public Route Servers...

10.2991/lemcs-14.2014.200 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2014-01-01

The core purpose of data commoditization transformation is to lower the threshold utilization and facilitate analysis mining at user end. In this paper, we propose a degree evaluation model for trading websites. First, index system commercialization constructed, combining abstract indexes reflecting commonality industry-specific standards assess commercialization; second, fuzzy multi-attribute group decision-making method utilized conduct in response issue preference; function corresponding...

10.1145/3659211.3659230 article EN 2023-12-08

Time synchronization is one of classical issues in network technique. It also a hotspot to apply Network Protocol (NTP) Integrated Automation System Coal Mine. Aimed the feature and time precision request each level for Mine, this paper develops algorithm by means Allan variance analyze noise link, which we adopt method combination adjusted frequency phase attain between Client Server. Under requirement, result experiment shows more effective lowering access NTP server compared with...

10.1109/cctae.2010.5544567 article EN International Conference on Computer and Communication Technologies in Agriculture Engineering 2010-06-01

Trust evaluation is a key issue in the interaction between network entities open networks. The attacks of malicious have become major obstacle to development Few traditional trust models considered incorporating incentive mechanisms reduce influence recommendation values from evaluation. This paper proposed dynamic model, considering procedure entities, introducing reward-punishment factor and reliability factor. function reward honest interactions while punishing fraudulent interactions....

10.13052/jwe1540-9589.197811 article EN Journal of Web Engineering 2020-12-25
Coming Soon ...