- Indoor and Outdoor Localization Technologies
- Robotics and Sensor-Based Localization
- UAV Applications and Optimization
- Inertial Sensor and Navigation
- Distributed Control Multi-Agent Systems
- Traffic Prediction and Management Techniques
- Security and Verification in Computing
- Optimal Power Flow Distribution
- Robotic Path Planning Algorithms
- Access Control and Trust
- Sparse and Compressive Sensing Techniques
- Power Quality and Harmonics
- Power System Optimization and Stability
- Cloud Data Security Solutions
- Microwave Imaging and Scattering Analysis
- Advanced Vision and Imaging
RWTH Aachen University
2023-2024
National University of Defense Technology
2015-2024
Southeast University
2020
In this paper, we consider a unmanned aerial vehicle (UAV) aided integrated sensing and communications (ISAC) network with moving ground users in constant-velocity trajectory. A global optimal trajectory design scheme is proposed including continuous analytic solution as well optimization condition, which theoretically different from numerical schemes obtaining discrete piece-wise approximate optimality. However, it challenging to maximize the performance over entire infinite time slots...
Time delay estimation (TDE) is of great importance in reconnaissance and passive localization. Though TDE could leverage compressive sensing (CS) kernel to enjoy the advantage sub-Nyquist samples, accuracy robustness are inclined be reduced by jamming or noise. To address issue, this letter proposes a scheme defensive time (DCTDE) with novel optimization method defense augmentation strategy for kernel. Inspired information bottleneck (IB) theory, we deduce new analytic principle enhance...
As one of the most influential technologies, cloud computing brings users more benefits and improves efficiency in comparison to traditional model. However, it also introduces a number unknown risks challenges, upon which effectiveness those security protection solutions could have very little influence. We introduce DTEM into JVM, gives robust trust guarantees Java applications makes dynamic attestation about integrity state current applications. advanced art trusted is designed tackle...
Elliptic positioning system offers a precise alternative to global navigation satellite (GNSS). However, ranging measurements upon single UAV only delineate the location estimates spherical region. Data infusion from inertial measurement units (IMUs) may refine these estimates, while its fidelity is undermined by IMUs' lack of self alignment specified reference frame. In this paper, we explore minimal number assisted UAVs or anchors for absolute positioning, i.e., and in fixed frame, during...
Unplanned and arbitrary access to power supply mistaken records of meter location pose challenges on topology identification parameter estimation low-voltage distribution grids for utilities. With the advent AMI development information communication technology, many statistical approaches such as correlation analysis regression models have been implemented unearth underlying features grids. In this paper, it is explained then verified that merely incapable complicated grid structure use...
An online trajectory planner permits autonomous unmanned vehicles to maneuver in a changing mission scenario and varying environment. However, real-time plannings, task performance, completeness accuracy is seriously challenged by the latency during planning scheme computation. To address issue, we propose latency-correcting based on successive convex approximation (SCA), which aiming at offset planning. In this work, two types of are considered, i.e., prior known variable computation, where...