- Privacy-Preserving Technologies in Data
- Access Control and Trust
- Advanced Authentication Protocols Security
- Smart Grid and Power Systems
- Mobile Agent-Based Network Management
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Power Systems and Technologies
- Mobile Ad Hoc Networks
- Network Time Synchronization Technologies
- Advanced Sensor and Control Systems
- Hydraulic and Pneumatic Systems
- Embedded Systems and FPGA Design
- Real-Time Systems Scheduling
- IPv6, Mobility, Handover, Networks, Security
- Advanced Computational Techniques and Applications
- Vehicle Dynamics and Control Systems
- Service-Oriented Architecture and Web Services
- Real-time simulation and control systems
- High-Voltage Power Transmission Systems
- Petri Nets in System Modeling
- Cloud Data Security Solutions
- User Authentication and Security Systems
- Advanced Image and Video Retrieval Techniques
- Neural Networks and Applications
Jining University
2009-2023
Beijing University of Technology
2018-2022
PRG S&Tech (South Korea)
2014
Liaocheng People's Hospital
2014
University of Wollongong
2013
Xi'an Shiyou University
2012
Microsoft Research (United Kingdom)
2007
The integration of information systems and physical is the development trend today’s manufacturing industry. Intelligent a new model manufacturing, based on advanced technology with human–machine–material collaboration. Internet Things core intelligent access control one main measures to ensure security IoT. In view problem that existing IoT does not support distributed fine-grained dynamic control, this paper uses characteristics blockchain, such as decentralization non-tampering, combined...
For the Steer-by-Wire system, it is necessary to develop advanced control systems and design architectures. In this paper, a new SBW system with consideration of variable gear-ratio presented. This includes two loops, which are called upper loop lower loop, respectively, achieve bilateral control. The force feedback motor, installed steering wheel, in front wheel adopted these PID controllers designed for them, so that signal road feeling can be tracked. To improve vehicle handling...
AbstractTrust has been widely used as an effective means of dealing with security issues in open networks. By taking into consideration the requirement on dynamic adaptability and incorporating factors insufficient conglomerate incentive mechanisms trust evaluation, we propose this paper a evaluation model based multiple that is suitable for In proposed model, takes direct includes historical information to improve accuracy recommendation bonus-penalty factor reliability efficiency. The...
For the high accuracy synchronization requirement of IEC61850 based digital substation, to apply a combination time scheme Substation Automation System (SAS), PTP(pricision protocol) is adopted between bay level and process equipment, paper presents method adjusted frequency phase achieve precision on principle PTP. The result experiment shows algorithm more effective.
Context-aware emotion recognition (CAER) is a complex and significant task that requires perceiving emotions from various contextual cues. Previous approaches primarily focus on designing sophisticated architectures to extract emotional cues images. However, their knowledge confined specific training datasets may reflect the subjective biases of annotators. Furthermore, acquiring large amounts labeled data often challenging in real-world applications. In this paper, we systematically explore...
Zero-shot coordination problem in multi-agent reinforcement learning (MARL), which requires agents to adapt unseen agents, has attracted increasing attention. Traditional approaches often rely on the Self-Play (SP) framework generate a diverse set of policies policy pool, serves improve generalization capability final agent. However, these frameworks may struggle capture full spectrum potential strategies, especially real-world scenarios that demand balance cooperation with competition. In...
Wireless sensor networks are a significant subfield of distributed systems, and large number their applications require time synchronization. Sensor nodes powered by batteries. In order to reduce the interference peripheral environment on node as much possible, size is relatively small circuit design, storage, calculation simple. Therefore, wireless network have limited energy, low computing power, communication capacity. addition, clock usually realized through local crystal oscillator CPU...
Training time is an important consideration in classification practices. Various algorithms like SVM usually suffer from high computational cost during the training process. In this paper, we proposed a hybrid algorithm, by combining RNN and together. rapid neural network with randomly generated input weights, which performs as fast, light weighted data selector. Selected are then used to train alternative SVM. The definition of crucial corresponding selection method defined for paper. We...
Effective and steady routing protocol will be an important factor to ensure performance of network. Protocol test is means guarantee the rightness effectiveness implementations a protocol. conformance focuses on implementation under requirement standards. According characteristic BGP4+ protocol, design testing system for introduced. In our design, environment multiple virtual testers with controlling channel used XML language chosen as case describing language. This gets both good ability...
Most of the traditional drilling fault diagnosis & decision systems use static data mining technology, so update knowledge base becomes its bottlenecks in development. In order to meet actual needs, this paper puts forward method, which combines dynamic technology with case-based reasoning design systems. First, system overall, then describe realization how realize and detail, finally, introduce some question about base.
Time synchronization is critical in distributed network system. A variety of protocols, middleware and business applications rely on proper time across the computational infrastructure depend clock accuracy. The "Network Protocol" (NTP) current widely accepted standard for synchronizing clocks over Internet. In order to reduce access frequency NTP server, efficiently decreases over-loaded phenomena server. more exactly errors was conclude by adopting Allan variance analysis resource, types...
To improve the security of authentication system and strengthen privacy protection in mobile Internet environment, this paper proposes a provably secure Chebyshev chaotic map (CCM)-based scheme (CCMbAS). The proposed transformed traditional public key into private combined two keys to compute one-time used encrypt information. is verified using review BAN logic ProVerif simulation tool. verification results confirm that well secured against all existing threats. Compared with similar...
WMNs (Wireless Mesh Networks) are a new wireless broadband network structure based completely on IP technologies and have rapidly become access measure to offer high capacity, speed wide coverage.WMN is such that doesn't need rely fixed infrastructure operated over an open, medium.Any user within the covered area of radio wave may network.Therefore, authentication for first line defense can prevent unauthorized users from accessing network.An scheme thus key mechanism ensure secure access.In...
The type of business relationships between the Internet autonomous systems (AS) determines BGP interdomain routing. Previous works on inferring AS relied connectivity information betweenASes.In this paper we thoroughly investigate route policy ASes, then present a method that can conduct new policies.On basis that, also polices verification based relationships.Through find out abnormal prefix advertise to verify policies.We accumulate data from RouteViews, RIPE RIS and public Route Servers...
The core purpose of data commoditization transformation is to lower the threshold utilization and facilitate analysis mining at user end. In this paper, we propose a degree evaluation model for trading websites. First, index system commercialization constructed, combining abstract indexes reflecting commonality industry-specific standards assess commercialization; second, fuzzy multi-attribute group decision-making method utilized conduct in response issue preference; function corresponding...
Time synchronization is one of classical issues in network technique. It also a hotspot to apply Network Protocol (NTP) Integrated Automation System Coal Mine. Aimed the feature and time precision request each level for Mine, this paper develops algorithm by means Allan variance analyze noise link, which we adopt method combination adjusted frequency phase attain between Client Server. Under requirement, result experiment shows more effective lowering access NTP server compared with...
Trust evaluation is a key issue in the interaction between network entities open networks. The attacks of malicious have become major obstacle to development Few traditional trust models considered incorporating incentive mechanisms reduce influence recommendation values from evaluation. This paper proposed dynamic model, considering procedure entities, introducing reward-punishment factor and reliability factor. function reward honest interactions while punishing fraudulent interactions....