- Indoor and Outdoor Localization Technologies
- Direction-of-Arrival Estimation Techniques
- Service-Oriented Architecture and Web Services
- Advanced Computational Techniques and Applications
- Network Security and Intrusion Detection
- Business Process Modeling and Analysis
- Speech and Audio Processing
- Collaboration in agile enterprises
- Electric Power System Optimization
- Antenna Design and Optimization
- Web Data Mining and Analysis
- Optimal Power Flow Distribution
- Privacy-Preserving Technologies in Data
- Target Tracking and Data Fusion in Sensor Networks
- Power System Reliability and Maintenance
- Recommender Systems and Techniques
- Advanced Measurement and Detection Methods
- Advanced Malware Detection Techniques
- Blind Source Separation Techniques
- Advanced Memory and Neural Computing
- Cloud Computing and Resource Management
- Advanced Adaptive Filtering Techniques
- Image Processing and 3D Reconstruction
- Data Mining Algorithms and Applications
- Advanced Algorithms and Applications
Tsinghua University
2002-2024
Baidu (China)
2024
PLA Information Engineering University
2009-2023
Shenyang Aerospace University
2023
Amazon (United States)
2020
Energy Research Institute
2020
Xi'an Jiaotong University
2019
Tongji University
2015-2017
Ministry of Education of the People's Republic of China
2016
Hainan Agricultural School
2016
This paper proposes a methodology to identify and protect vulnerable components of connected gas electric infrastructures from malicious attacks, guarantee resilient operation by deploying valid corrective actions (while accounting for the interdependency pipeline network power transmission network). The proposed mathematical formulation reduces tri-level optimization problem, where lower level is multiperiod economic dispatch gas-electric system, middle distinguishes most threatening attack...
With the development of application services providers and cloud computing, more small- medium-sized business enterprises use software even infrastructure provided by professional information service companies to replace all or part their systems (ISs). These provide applications, such as data storage, computing processes, document sharing management system public resources support process customers. However, no vendor can satisfy full functional IS requirements an enterprise. As a result,...
This paper addresses two vital issues which are barely discussed in the literature on robust unit commitment (RUC): 1) how much potential operational loss could be if realization of uncertainty is beyond prescribed set; 2) large set should when it used for RUC decision making. In this regard, a risk-constrained (RRUC) formulation proposed to cope with large-scale volatile and uncertain wind generation. Differing from existing formulations, generation RRUC adjustable via choosing diverse...
Radio frequency identification (RFID) technology has been widely adopted in a variety of applications from logistics to access control. Many gain benefits knowing the exact position an RFID-tagged object. Existing localization algorithms wireless network, however, can hardly be directly employed due tag's limited capabilities terms energy and memory. In this paper, we propose BackPos, fine-grained backscatter positioning technique using commercial off-the-shelf (COTS) RFID products with...
With the introduction of numerous technologies and equipment, volume data in smart substations has undergone exponential growth. In order to enhance intelligent management level promote their efficient sustainable development, one-key sequential control system is being renovated. this study, firstly, substation defined compared with traditional substation. The introduced, main issues existing are analyzed. Secondly, experiments conducted on winding temperature, insulation oil ambient...
With the development of extended enterprise and information technologies (IT), a new business pattern with its infrastructure, cloud computing, is emerging. More more small medium enterprises do not implement significant parts their systems (IS) in-house. Instead, they prefer to use software services even infrastructure provided by professional service companies. Their strategy, IT processes shall be re-aligned. Furthermore, no computing vendor can satisfy complete functional system...
Alloying Pt with 3d transition metals has proven to be the most attractive oxygen reduction reaction electrocatalysts for proton exchange membrane fuel cells improved catalytic activity and stability; thus, their large-scale cost-effective production is in high demand. Herein, we present a strategy batch preparation of PtCo/C highly uniform morphology tiny PtCo dispersions 2.48 nm using continuous-flow microwave pipeline reactor. Due its unique structure, which greatly facilitated kinetics,...
Computer viruses have become the main threat of safety and security industry. Unfortunately, no mature products anti-virus can protect computers effectively. This paper presents an approach virus detection which is based on analysis distilling representative behavior characteristic systemic description suspicious behaviors indicated by sequences APIs called under Windows. Based decompilation analysis, according to determinant Bayes algorithm, validation abundant sample space, technique...
In this paper, we propose a formulation of the unit commitment problem based on profit under deregulated electricity market(PBUC). We express as mixed integer nonlinear optimization in which objective is to maximize profits for generation company and decisions are required meet all kinds operating constraints. Under assumption competitive market price forecasting, developed an improved discrete binary particle swarm optimization(PSO) standard value PSO solve PBUC iteratively. A with 10...
Multiple-target localization is extensively applied in wireless connected networks. However, sensor location uncertainty known to degrade significantly the target accuracy. Fortunately, calibration emitters such as unmanned aerial vehicles (UAV) with can be used reduce loss accuracy due errors. This paper devoted use of UAV for time differences arrival (TDOA) and frequency (FDOA) positioning multiple targets. The study starts deriving Cramér-Rao bound (CRB) TDOA/FDOA-based estimate when...
User behavioral analysis is expected to be a key technique for identity theft detection in the Internet, especially mobile social networks (MSNs). While traditional methods prefer use explicit behaviors, series of behaviors implicit user's texts can probably provide much more accurate identity. And these digged from by LDA. Besides latent feature texts, behavior also include other features (e.g., spatial and temporal features). A joint including better evidence detection. In this paper, we...
This letter proposes a novel direction-of-arrival (DOA) estimation algorithm for strictly noncircular signals in moving array scenario. Unlike most conventional methods, which only use spatial information, the proposed method uses Doppler shift and property simultaneously. The information is used to establish cost function using maximum likelihood (ML) criterion, results are obtained via an alternative iteration that converges rapidly with moderate computational complexity. Cramér-Rao bound...
The extraction of multi-attribute objects from the deep web is bridge between unstructured and structured data. Existing approaches either induce wrappers a set human-annotated pages or leverage repeated structures on page without supervision. What former lack in automation, latter accuracy. Thus accurate, automatic object has remained an open challenge. AMBER overcomes both limitations through mutual supervision structure automatically produced annotations. Previous based annotations have...
Collaborative filtering is a popular tool for recommendation systems. However, collaborative technologies often suffer from high time complexity, the cold-start problem, and low coverage. Recent research shows that social networks trust-aware methods can effectively solve these proble ms. Therefore, we propose Trust Domain Expert Filtering system. First, divide user item rating matrix into multiple sub-matrices based on domain attributes of each item. For sub-matrix, then use experts to...
Uncertainty quantification is crucial for building reliable and trustable machine learning systems. We propose to estimate uncertainty in recurrent neural networks (RNNs) via stochastic discrete state transitions over timesteps. The of the model can be quantified by running a prediction several times, each time sampling from transition distribution, leading potentially different results if uncertain. Alongside quantification, our proposed method offers advantages settings. (1) learn...
Urban traffic condition usually serves as basic information for some intelligent urban applications, example, transportation system. The traditional acquisition of such is often costly because the dependencies on infrastructures, cameras and loop detectors. Crowdsensing, a new economic paradigm, can be utilized together with vehicular networks to efficiently gather vehicle-sensed data estimating condition. However, it has problem being lack uploading efficiency usage effectiveness. In this...
Wrapper induction faces a dilemma: To reach web scale, it requires automatically generated examples, but to produce accurate results, these examples must have the quality of human annotations. We resolve this conflict with AMBER, system for fully automated data extraction from result pages. In contrast previous approaches, AMBER employs domain specific gazetteers discern basic attributes on page, and leverages repeated occurrences similar group related into records rather than relying noisy...