- Cryptography and Data Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- User Authentication and Security Systems
- Opportunistic and Delay-Tolerant Networks
- Advanced Sensor and Control Systems
- Hydraulic and Pneumatic Systems
- Technology and Security Systems
- Biometric Identification and Security
- Cloud Data Security Solutions
- Cancer Research and Treatments
- Recycling and Waste Management Techniques
- Smart Grid Security and Resilience
- Electric Vehicles and Infrastructure
- Mitochondrial Function and Pathology
- Multimedia Communication and Technology
- Cancer, Hypoxia, and Metabolism
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Caching and Content Delivery
- Iterative Learning Control Systems
- Blockchain Technology Applications and Security
Sichuan University
2021-2024
University of Michigan
2024
North University of China
2020
Yancheng Institute of Technology
2012
Real-time and accurate prediction of charging pile energy demands in electric vehicle (EV) networks contributes significantly to load shedding conservation. However, existing methods usually suffer from either data privacy leakage problems or heavy communication overheads. In this article, we propose a novel blockchain-based personalized federated deep learning scheme, coined <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math...
ABSTRACT Glioblastoma (GBM) is uniformly lethal due to profound treatment resistance. Altered cellular metabolism a key mediator of GBM Uptake the essential sulfur-containing amino acid methionine drastically elevated in GBMs compared normal cells, however, it not known how this utilized or whether relates Here, we find that radiation acutely increases levels methionine-related metabolites variety treatment-resistant models. Stable isotope tracing studies further revealed activates...
Traditional energy consumption data collection is usually deployed with weak security and privacy protection measures, resulting in high risks of leakage unauthorized access. To alleviate this problem, we propose a secure privacy-preserving transmission scheme (called DPDT) for advanced metering infrastructures based on local differential SM4 symmetric encryption algorithm. Specifically, first protect the each client's via mechanism. Second, employ standard algorithm to encrypt aggregated...
The actuator is an important component of missiles and other aircraft to maintain the flight attitude. A method calculate power electric servo motor was proposed according load characteristics’ both actuator. An optimization for transmission reduction ratio obtained by considering torque equation. Dynamics simulations were conducted under a variety conditions. simulation results show that clearance friction between ball screw fork, which consist mechanism, induce fluctuations, as source...