Qin Wang

ORCID: 0000-0003-4397-9872
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adaptive Control of Nonlinear Systems
  • Distributed Control Multi-Agent Systems
  • Blockchain Technology Applications and Security
  • Neural Networks Stability and Synchronization
  • Energy Efficient Wireless Sensor Networks
  • Control and Dynamics of Mobile Robots
  • Multimedia Communication and Technology
  • Quantum Information and Cryptography
  • Power Systems and Technologies
  • Stability and Control of Uncertain Systems
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Guidance and Control Systems
  • Numerical methods in inverse problems
  • Analog and Mixed-Signal Circuit Design
  • Quantum Computing Algorithms and Architecture
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Energy Harvesting in Wireless Networks
  • Advanced Decision-Making Techniques
  • Advanced Graph Theory Research
  • Embedded Systems Design Techniques
  • Distributed systems and fault tolerance
  • Advanced Algorithms and Applications
  • Sparse and Compressive Sensing Techniques
  • Caching and Content Delivery

Yangzhou University
2006-2024

Shandong University of Science and Technology
2024

Taiyuan University of Technology
2009-2024

Commonwealth Scientific and Industrial Research Organisation
2023

Loughborough University
2023

Data61
2023

Xi'an University of Technology
2006-2021

Swinburne University of Technology
2019-2021

Nanjing University of Posts and Telecommunications
2020

Shanghai Key Laboratory of Trustworthy Computing
2016

Blockchain plays an important role in cryptocurrency markets and technology services. However, limitations on high latency low scalability retard their adoptions applications classic designs. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks form Directed Acyclic Graph (DAG) consequently re-build upper layer components including consensus,...

10.48550/arxiv.2012.06128 preprint EN cc-by arXiv (Cornell University) 2020-01-01

Quantum memory, serving as a crucial device for storing and releasing quantum states, holds significant importance in long-distance communications. Up to date, memories have been realized many different systems. However, most of them complex structures high costs. Besides, it is not easy simultaneously achieve both storage efficiency fidelity. In this paper, we experimentally demonstrate low-cost optical memory with fidelity, by utilizing butterfly shaped cavity consisting one polarization...

10.48550/arxiv.2502.13494 preprint EN arXiv (Cornell University) 2025-02-19

This paper focuses on the issue of limited information based emergency response control for a specific category underwater cyber-physical systems (UCPSs) confronted with multiple emergencies. The focus is typical vehicle system (UVS), whose communication center may be compromised by Denial-of-Service (DoS) attacks. occurrence dual DoS attacks leads to significant loss, intensifying complexity decision-making and during critical situations. Moreover, abrupt ocean current disturbances or...

10.1109/tase.2024.3352071 article EN IEEE Transactions on Automation Science and Engineering 2024-01-01

From the perspective of an attacker, this paper studies how to destroy consensus distributed multi-agent systems by employing False Data Injection (FDI) attacks. A stealthy FDI attack model is proposed make tracking errors diverge while allowing remain as expected. The does not rely on real-time node information from systems. Furthermore, minimum cost edge sets given, taking into account limited energy available for corresponding algorithm further provided. Numerical simulations verify...

10.1080/00207721.2024.2439475 article EN International Journal of Systems Science 2024-12-10

With the frantic development of smart contracts on Ethereum platform, its market value has also climbed. In 2016, people were shocked by loss nearly $50 million in cryptocurrencies from DAO reentrancy attack. Due to tremendous amount money flowing contracts, security attracted much attention researchers. this paper, we investigated several common contract vulnerabilities and analyzed their possible scenarios how they may be exploited. Furthermore, survey vulnerability detection tools for...

10.48550/arxiv.1905.00799 preprint EN other-oa arXiv (Cornell University) 2019-01-01

A 70-year-old female patient presenting with swelling and subcutaneous nodule formation localized to the knee scars over a two‑month period is presently reported. Dermatological examinations found erythematous small papules on patient's scars, along nodules beneath around scars. Computer tomography of chest region identified multiple obscure tubercles in lungs swollen lymph nodes hilum pulmonis mediastinum. Skin biopsy revealed non‑caseating granulomas, which had infiltrated dermis. The was...

10.3892/etm.2017.4123 article EN Experimental and Therapeutic Medicine 2017-02-15

This article deals with the problem of driving a family second-order nonlinear agents to land on sphere and formation tracking set given orbits sphere. A novel geometric extension called concentric compression method is proposed give solution spheral landing then combines control spherical meridian parallel achieve motion along The asymptotic stability system proved by Lyapunov-based when communication topology bidirectional. effectiveness analytical result verified numerical simulation.

10.1109/ccdc.2016.7531865 article EN 2016-05-01

10.1016/s0012-365x(02)00791-4 article EN Discrete Mathematics 2003-02-01

A globally stable formation control strategy that drives multi-robot systems to a desired rigid is proposed in this paper. The law based on the adaptive perturbation method, and it can guarantee equilibrium set of overall system unique, which exactly set. Simulation results are provided illustrate effectiveness algorithm.

10.1109/chicc.2015.7260829 article EN 2015-07-01

In this article, an adaptive coordinated tracking control problem for a group of nonholonomic chained systems has been discussed under the assumption that desired trajectory is available only to part neighboring agents. Firstly, controllers directed communication topology graph containing spanning tree are designed two subsystems, gains employed in linear subsystem based on state information agents, then global not required be known laws. Furthermore, backstepping strategy applied rest...

10.1177/1729881417743227 article EN cc-by International Journal of Advanced Robotic Systems 2017-11-01

Image restoration is an ill-posed inverse problem, which has introduced the regularization method to suppress over-amplification. In this paper, by explicitly using a priori knowledge for bi-level images, we propose new image restoration. Unlike well known Tikhonov eventually results in linear system of equations, leads nonlinear optimization problem. This problem solved global Barzilai and Borwein gradient method. Simulation show that proposed feasible effective

10.1109/icalip.2008.4589985 article EN International Conference on Audio, Language and Image Processing 2008-07-01

Abstract The DABCO promoted domino reaction of 1‐(2‐hydroxyphenyl)‐3‐phenylprop‐2‐en‐1‐ones and alkyl propiolate or dialkyl but‐2‐ynedioate in toluene at high temperature resulted methyl 3‐(2‐hydroxybenzoyl)‐1‐naphthoates dimethyl 3‐(2‐hydroxybenzoyl)naphthalene‐1,2‐dicarboxylate moderate to good yields. hydroxyl group played a crucial rule the reaction. mechanism this formal [4+2] cycloaddition was believed with initially formation 3‐(2‐cinnamoylphenoxy)acrylate, intramolecular Diels‐Alder...

10.1002/ajoc.202100401 article EN Asian Journal of Organic Chemistry 2021-08-24

Two-dimensional van der Waals magnetic materials have shown fascinating natural ferromagnetic properties at the atomic level, which has great potential in fields of low power spintronics, quantum computing and optical communication. Herein, ferromagnetism anisotropy bulk Fe3GeTe2 (FGT) were investigated, testing results indicate a pronounced vertical below Curie temperature (Tc=165 K) FGT. In addition, anomalous Hall effect FGT nanoflakes was studied various temperatures thicknesses by...

10.2139/ssrn.4705187 preprint EN 2024-01-01

10.1186/s13638-024-02357-5 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2024-05-13

The problem of model reference sliding control for a class SISO systems with nonlinear input is studied in this paper. T-S fuzzy employed to represent the system. mode designed based on technique. Finally by theoretical analysis, closed-loop system proved be globally stable, tracking error asymptotically converging zero. Simulation results illustrate effectiveness proposed approach

10.1109/wcica.2006.1713102 article EN 2006-01-01

In recent years, power consumption along with silicon area has become the key factor in chip design, especially digital signal processing block. Most of block are designed standard cell. One way low design based on cell is using minimum-sized device. This paper presents a low-power scheme for VLSI implementation finite-impulse response (FIR) filters The cross level solution view flow. A multi-hierarchy pipeline architecture level. Integrating addition into Wallace/spl I.bar/tree used logic...

10.1109/icasic.2005.1611297 article EN 2006-04-07

<p>In this paper, we explore the aftermath of Silicon Valley Bank (SVB) collapse, with a particular focus on its impact crypto markets. We conduct multi-dimensional investigation, which includes factual summary, analysis user sentiment, and examination market performance. Based such efforts, uncover somewhat counterintuitive finding: \textit{the SVB collapse did not lead to destruction cryptocurrencies; instead, they displayed resilience.} </p>

10.36227/techrxiv.24247855.v1 preprint EN cc-by 2023-10-11
Coming Soon ...