- Smart Grid Security and Resilience
- Aerodynamics and Fluid Dynamics Research
- Network Security and Intrusion Detection
- Electrostatic Discharge in Electronics
- Industrial Vision Systems and Defect Detection
- Wind and Air Flow Studies
- Fluid Dynamics and Vibration Analysis
- Advanced Image Fusion Techniques
- Network Time Synchronization Technologies
- Zoonotic diseases and public health
- Advanced Neural Network Applications
- Machine Learning and Data Classification
- PAPR reduction in OFDM
- Information and Cyber Security
- Remote-Sensing Image Classification
- Optical Network Technologies
- Healthcare Systems and Reforms
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Fiber Optic Sensors
- Security and Verification in Computing
- Image and Signal Denoising Methods
- Parasites and Host Interactions
- Statistical Methods and Inference
- Power Line Inspection Robots
Beijing Great Wall Hospital
2022-2024
China Electric Power Research Institute
2024
Wuyi University
2023
University of Electronic Science and Technology of China
2022
Lanzhou University of Technology
2019
PLA Air Force Aviation University
2007
This paper focuses on dynamic output feedback control of Cyber-Physical Systems (CPS) under Denial-of-Service (DoS) attacks. Firstly, by analyzing the different effects DoS attacks sensor-to-controller (S-C) channel and controller-to-actuator(C-A) respectively, a switching system modeling method for CPS is presented. Considering bandwidth two channels energy limitation attacker, it fair to assume that an attacker can only jam one communication at each time step maximum number consecutive...
This paper addresses the problem of adaptive security control for cyber–physical systems (CPSs) under external nonlinear disturbances and false data injection (FDI) attacks on actuators. To address FDI attacks, a full-order disturbance estimator is proposed eliminating in forward channel. Furthermore, an attack model based system state vector developed to estimate by considering potential that can induce errors between reference actual system. Subsequently, novel model-based (MASC) strategy...
This paper investigates the security control problem of cyber-physical system under false data injection attacks. A model predictive switching strategy based on attack perception is proposed to compensate for untrusted sequence caused by First, binary detector applied whether has suffered attack. If occurs, multistep correction carried out future according previous time data, and waiting period [Formula: see text] set. The input output controller reconstructed, modeled as a constant...
Multi-spectral Image Fusion is a new research field in image processing. In this paper, for achieving better fusion result, method based on the intensity-hue-saturation(IHS) Transform and Bidimensional Empirical Mode Decomposition(BEMD) proposed. Firstly, multi-spectral transformed into IHS component. Secondly, histogram-matched panchromatic intensity component are decomposed set of BIMFs respectively by means BEMD. Thirdly, can be obtained merging Finally, intensity, hue, saturation...
Tunnel passing at high speed produces aerodynamic load on railway trains, which may bring about fatigue failure the car body, and damages passenger comfort due to interior penetration of alternating wave. In this work, air suction experiment approaches were developed. It performs excellently through internal external loading utilizing valve controlling strategies. is validated with an in-transit vehicle test when train runs 3 different tunnel lengths. The relative deviation between...
To address the issue of human object detection in transmission line inspection, an enhanced single-stage neural network is proposed, which based on improvement YOLOv7-tiny model. Firstly, a lighter GSConv module utilized to optimize original ELAN module, reducing parameters network. In order make less sensitive targets with unconventional pose, CSPNeXt and designed integrated extract deep features from targets. Moreover, WIoU (Wise Intersection over Union) loss function enhance ability model...
Conditional independence tests (CITs) test for conditional dependence between random variables. As existing CITs are limited in their applicability to complex, high-dimensional variables such as images, we introduce deep nonparametric (DNCITs). The DNCITs combine embedding maps, which extract feature representations of variables, with applicable these representations. For the derive general properties on parameter estimators obtain valid and show that include maps learned through...
This paper deals with the problem of security-based dynamic output feedback control cyber-physical systems (CPSs) dual-terminal event triggered mechanisms (DT-ETM) under false data injection (FDI) attacks.Considering limited attack energy, FDI attacks taking place in transmission channels are modeled as extra bounded disturbances for resulting closed-loop system, thus enabling H∞ performance analysis a suitable attenuation level.Then two buffers at controller and actuator sides skillfully...
Orthogonal time frequency space (OTFS) is a new multi-carrier modulation technology emerging in recent years. Like orthogonal division multiplexing (OFDM), OTFS also has the problem of high peak to average power ratio (PAPR). Because PAPR, signals are easy enter nonlinear region amplifier (PA), and result distortion. In this paper, we study PAPR for system propose an improved algorithm by jointly exploiting traditional selective mapping (SLM) scheme imperialist competition (ICA), namely...
Tunnel passing in high speed produces aerodynamic load on railway train, which brings about fatigue failure the car-body, and damages passenger comfort due to interior penetration of alternating wave. Experimental simulation remains a challenge concerning its accuracy reliability. In this work, experiment approaches terms air compression suction were developed, an attempt simulate pressure variation when train runs through tunnels. Pros cons introduced methods analyzed by theoretical...
The invalid patents associated with schistosomiasis control were retrieved in the Chinese Patent Database of China National Intellectual Property Administration, Baiten database and incoPat database, overall trends, legal status, types, patent indexing technical fields all analyzed. As December 30, 2020, there totally 859 relating to control, 512 patents, an rate 59.6%. number applications peaked 2018, including 71 53 patents. Among 511 control-related complete records, 425 invention 81...