Cheng Wang

ORCID: 0000-0003-4699-3557
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • Direction-of-Arrival Estimation Techniques
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Network Security and Intrusion Detection
  • Business Process Modeling and Analysis
  • Speech and Audio Processing
  • Collaboration in agile enterprises
  • Electric Power System Optimization
  • Antenna Design and Optimization
  • Web Data Mining and Analysis
  • Optimal Power Flow Distribution
  • Privacy-Preserving Technologies in Data
  • Target Tracking and Data Fusion in Sensor Networks
  • Power System Reliability and Maintenance
  • Recommender Systems and Techniques
  • Advanced Measurement and Detection Methods
  • Advanced Malware Detection Techniques
  • Blind Source Separation Techniques
  • Advanced Memory and Neural Computing
  • Cloud Computing and Resource Management
  • Advanced Adaptive Filtering Techniques
  • Image Processing and 3D Reconstruction
  • Data Mining Algorithms and Applications
  • Advanced Algorithms and Applications

Tsinghua University
2002-2024

Baidu (China)
2024

PLA Information Engineering University
2009-2023

Shenyang Aerospace University
2023

Amazon (United States)
2020

Energy Research Institute
2020

Xi'an Jiaotong University
2019

Tongji University
2015-2017

Ministry of Education of the People's Republic of China
2016

Hainan Agricultural School
2016

This paper proposes a methodology to identify and protect vulnerable components of connected gas electric infrastructures from malicious attacks, guarantee resilient operation by deploying valid corrective actions (while accounting for the interdependency pipeline network power transmission network). The proposed mathematical formulation reduces tri-level optimization problem, where lower level is multiperiod economic dispatch gas-electric system, middle distinguishes most threatening attack...

10.1109/tpwrs.2016.2628877 article EN publisher-specific-oa IEEE Transactions on Power Systems 2016-11-16

With the development of application services providers and cloud computing, more small- medium-sized business enterprises use software even infrastructure provided by professional information service companies to replace all or part their systems (ISs). These provide applications, such as data storage, computing processes, document sharing management system public resources support process customers. However, no vendor can satisfy full functional IS requirements an enterprise. As a result,...

10.1080/17517575.2012.677479 article EN Enterprise Information Systems 2012-04-11

This paper addresses two vital issues which are barely discussed in the literature on robust unit commitment (RUC): 1) how much potential operational loss could be if realization of uncertainty is beyond prescribed set; 2) large set should when it used for RUC decision making. In this regard, a risk-constrained (RRUC) formulation proposed to cope with large-scale volatile and uncertain wind generation. Differing from existing formulations, generation RRUC adjustable via choosing diverse...

10.1109/tpwrs.2016.2564422 article EN IEEE Transactions on Power Systems 2016-05-10

Radio frequency identification (RFID) technology has been widely adopted in a variety of applications from logistics to access control. Many gain benefits knowing the exact position an RFID-tagged object. Existing localization algorithms wireless network, however, can hardly be directly employed due tag's limited capabilities terms energy and memory. In this paper, we propose BackPos, fine-grained backscatter positioning technique using commercial off-the-shelf (COTS) RFID products with...

10.1109/tmc.2015.2424437 article EN IEEE Transactions on Mobile Computing 2015-04-20

With the introduction of numerous technologies and equipment, volume data in smart substations has undergone exponential growth. In order to enhance intelligent management level promote their efficient sustainable development, one-key sequential control system is being renovated. this study, firstly, substation defined compared with traditional substation. The introduced, main issues existing are analyzed. Secondly, experiments conducted on winding temperature, insulation oil ambient...

10.3390/pr12040824 article EN Processes 2024-04-19

With the development of extended enterprise and information technologies (IT), a new business pattern with its infrastructure, cloud computing, is emerging. More more small medium enterprises do not implement significant parts their systems (IS) in-house. Instead, they prefer to use software services even infrastructure provided by professional service companies. Their strategy, IT processes shall be re-aligned. Furthermore, no computing vendor can satisfy complete functional system...

10.1080/0951192x.2011.592994 article EN International Journal of Computer Integrated Manufacturing 2011-07-29

Alloying Pt with 3d transition metals has proven to be the most attractive oxygen reduction reaction electrocatalysts for proton exchange membrane fuel cells improved catalytic activity and stability; thus, their large-scale cost-effective production is in high demand. Herein, we present a strategy batch preparation of PtCo/C highly uniform morphology tiny PtCo dispersions 2.48 nm using continuous-flow microwave pipeline reactor. Due its unique structure, which greatly facilitated kinetics,...

10.1021/acs.energyfuels.3c03762 article EN Energy & Fuels 2024-01-11

Computer viruses have become the main threat of safety and security industry. Unfortunately, no mature products anti-virus can protect computers effectively. This paper presents an approach virus detection which is based on analysis distilling representative behavior characteristic systemic description suspicious behaviors indicated by sequences APIs called under Windows. Based decompilation analysis, according to determinant Bayes algorithm, validation abundant sample space, technique...

10.1109/iccsn.2009.60 article EN International Conference on Communication Software and Networks 2009-01-01

In this paper, we propose a formulation of the unit commitment problem based on profit under deregulated electricity market(PBUC). We express as mixed integer nonlinear optimization in which objective is to maximize profits for generation company and decisions are required meet all kinds operating constraints. Under assumption competitive market price forecasting, developed an improved discrete binary particle swarm optimization(PSO) standard value PSO solve PBUC iteratively. A with 10...

10.1109/tdc.2005.1546833 article EN 2005-12-10

Multiple-target localization is extensively applied in wireless connected networks. However, sensor location uncertainty known to degrade significantly the target accuracy. Fortunately, calibration emitters such as unmanned aerial vehicles (UAV) with can be used reduce loss accuracy due errors. This paper devoted use of UAV for time differences arrival (TDOA) and frequency (FDOA) positioning multiple targets. The study starts deriving Cramér-Rao bound (CRB) TDOA/FDOA-based estimate when...

10.1109/access.2019.2959235 article EN cc-by IEEE Access 2019-12-13

User behavioral analysis is expected to be a key technique for identity theft detection in the Internet, especially mobile social networks (MSNs). While traditional methods prefer use explicit behaviors, series of behaviors implicit user's texts can probably provide much more accurate identity. And these digged from by LDA. Besides latent feature texts, behavior also include other features (e.g., spatial and temporal features). A joint including better evidence detection. In this paper, we...

10.1109/smartcomp.2017.7947016 article EN 2017-05-01

This letter proposes a novel direction-of-arrival (DOA) estimation algorithm for strictly noncircular signals in moving array scenario. Unlike most conventional methods, which only use spatial information, the proposed method uses Doppler shift and property simultaneously. The information is used to establish cost function using maximum likelihood (ML) criterion, results are obtained via an alternative iteration that converges rapidly with moderate computational complexity. Cramér-Rao bound...

10.1109/lcomm.2019.2911610 article EN IEEE Communications Letters 2019-04-16

The extraction of multi-attribute objects from the deep web is bridge between unstructured and structured data. Existing approaches either induce wrappers a set human-annotated pages or leverage repeated structures on page without supervision. What former lack in automation, latter accuracy. Thus accurate, automatic object has remained an open challenge. AMBER overcomes both limitations through mutual supervision structure automatically produced annotations. Previous based annotations have...

10.48550/arxiv.1210.5984 preprint EN other-oa arXiv (Cornell University) 2012-01-01

Collaborative filtering is a popular tool for recommendation systems. However, collaborative technologies often suffer from high time complexity, the cold-start problem, and low coverage. Recent research shows that social networks trust-aware methods can effectively solve these proble ms. Therefore, we propose Trust Domain Expert Filtering system. First, divide user item rating matrix into multiple sub-matrices based on domain attributes of each item. For sub-matrix, then use experts to...

10.3233/ida-192531 article EN Intelligent Data Analysis 2019-06-27

Uncertainty quantification is crucial for building reliable and trustable machine learning systems. We propose to estimate uncertainty in recurrent neural networks (RNNs) via stochastic discrete state transitions over timesteps. The of the model can be quantified by running a prediction several times, each time sampling from transition distribution, leading potentially different results if uncertain. Alongside quantification, our proposed method offers advantages settings. (1) learn...

10.48550/arxiv.2011.12010 preprint EN other-oa arXiv (Cornell University) 2020-01-01

10.1016/j.geb.2015.03.001 article EN Games and Economic Behavior 2015-03-26

Urban traffic condition usually serves as basic information for some intelligent urban applications, example, transportation system. The traditional acquisition of such is often costly because the dependencies on infrastructures, cameras and loop detectors. Crowdsensing, a new economic paradigm, can be utilized together with vehicular networks to efficiently gather vehicle-sensed data estimating condition. However, it has problem being lack uploading efficiency usage effectiveness. In this...

10.1002/cpe.3778 article EN Concurrency and Computation Practice and Experience 2016-01-28

Wrapper induction faces a dilemma: To reach web scale, it requires automatically generated examples, but to produce accurate results, these examples must have the quality of human annotations. We resolve this conflict with AMBER, system for fully automated data extraction from result pages. In contrast previous approaches, AMBER employs domain specific gazetteers discern basic attributes on page, and leverages repeated occurrences similar group related into records rather than relying noisy...

10.1145/2187980.2188044 article EN 2012-04-16
Coming Soon ...