Xiaomeng Li

ORCID: 0000-0001-7432-0718
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Adaptive Control of Nonlinear Systems
  • Technology and Security Systems
  • Distributed and Parallel Computing Systems
  • Chaos-based Image/Signal Encryption
  • Nonlinear Dynamics and Pattern Formation
  • Robotic Path Planning Algorithms
  • Neural Networks Stability and Synchronization
  • Distributed Control Multi-Agent Systems
  • Robotics and Sensor-Based Localization
  • Iterative Learning Control Systems
  • Advanced Steganography and Watermarking Techniques
  • Cryptographic Implementations and Security
  • IoT and Edge/Fog Computing
  • AI-based Problem Solving and Planning
  • Industrial Technology and Control Systems
  • Vehicle Routing Optimization Methods
  • Advanced Multi-Objective Optimization Algorithms
  • Nitric Oxide and Endothelin Effects
  • Interactive and Immersive Displays
  • Nonlinear Partial Differential Equations
  • Evaluation and Optimization Models
  • Control and Stability of Dynamical Systems
  • Library Science and Information

South China Normal University
2025

University of South China
2022-2024

Dalian Maritime University
2023

State Grid Corporation of China (China)
2020-2023

Liaocheng University
2022

Henan University of Technology
2021

Inner Mongolia Electric Power (China)
2020

National Institute of Metrology
2019

Nanjing University of Aeronautics and Astronautics
2018

Southeast University
2017

Abstract The Electrowetting Display (EWD) has numerous advantages making it a potential candidate for flexible displays. However, there been limited research on the bending performance of Flexible Displays (FLEWD) and their feasibility in terms flexibility not confirmed. To investigate impact stability performance, FLEWD using active‐matrix substrate PEN conductive substrates were fabricated. A systematic evaluation system devices is established. results showed that can display videos...

10.1002/jsid.2085 article EN Journal of the Society for Information Display 2025-04-28

Abstract Aiming at the problem that medical image information is easy to be stolen, tampered and maliciously destroyed in transmission process, a selective region encryption algorithm based on cascade chaos proposed. The consists of two stages: interest (ROI) full encryption. First, Cubic map cascaded with an improved Cosine map. Through analysis dynamic characteristics, has better chaotic performance than traditional systems. key sequence generated by image. Then edge detection performed...

10.1088/1402-4896/acbcf8 article EN Physica Scripta 2023-02-17

A terminal sliding mode (TSM) control with self-tuning gain algorithm is proposed for the synchronization of coronary artery system under existence unmodeled dynamics and external disturbance. Considering system, a criterion selecting parameters derived to reach point equilibrium in finite time. The theoretic analysis based on Lyapunov theory proved that systems TSM scheme could be stabilized method shows drive response are synchronized states track This information about bound disturbance...

10.1142/s1793524517500413 article EN International Journal of Biomathematics 2016-10-24

With the continuous development of power grids, scale supercomputing clusters has also gradually increased to carry a large number system simulation calculations, and problem high energy consumption appeared. To solve this problem, we propose container virtualization-based cluster for system. We analyze impact containers on calculations compare effects various scheduling migration algorithms clusters. Experiments show that compared virtual machines with hypervisor, which consumes massive...

10.1109/aeees48850.2020.9121491 article EN 2020 Asia Energy and Electrical Engineering Symposium (AEEES) 2020-05-01

Blind source separation (BSS) is an active research topic in the fields of biomedical signal processing and brain–computer interface. As a representative technique, maximum fraction analysis (MSFA) has been recently developed for problem BSS. However, MSFA formulated based on L2-norm, thus prone to be negatively affected by outliers. In this study, authors propose robust alternative L1-norm, termed as MSFA-L1. Specifically, they re-define objective function MSFA, which energy quantities both...

10.1049/iet-spr.2016.0529 article EN IET Signal Processing 2017-07-10

Abstract The Energy Internet is a leading development direction for the modernized and intelligent transformation of power grid, new type infrastructure that supports high-quality economy society. With access variety mobile terminals, security one most important challenges faced in construction Internet. Research on reliable networking data forwarding strategies edge great significance to its development. On basis analyzing requirements typical application scenarios, we introduce this paper...

10.1088/1742-6596/2087/1/012094 article EN Journal of Physics Conference Series 2021-11-01

Based on the principles and development status of current cyber security protection for electric power dispatching control system, aiming at problems defects exposed in actual work, closely combining monitoring requirements network operation, by optimizing alarm information, comprehensive data analysis, event reasoning emergency disposal, this article conduct research intelligent analysis management put forward reasonable strategy proposal that can improve overall level security.

10.1109/mlbdbi51377.2020.00113 article EN 2020-10-01

The existing power system cyber security protection lacks pertinence for new services and has a low degree of automation. It is urgent to propose framework the characteristics generation business, especially improve attack prevention capability distributed sources, flexible adjustable loads, etc., ensuring stable operation grid. Aiming at lack efficient linkage coordination devices in systems, this paper proposes an interacted response technology based on intelligent learning. Our scheme...

10.1109/ic2ecs57645.2022.10087929 article EN 2022-12-16

The era of big data is accompanied by scientific and technological progress social development.Its emergence also brings great convenience to people's life production.However, there are many privacy security issues based on it.Privacy leakage will lead all kinds inconvenience in life, such as telephone or Internet harassment, more serious the loss property.This paper focuses data, how people be affected they should protect their face constantly emerging problems, gives suggestions comparing...

10.2991/assehr.k.210806.093 article EN cc-by-nc Advances in Social Science, Education and Humanities Research/Advances in social science, education and humanities research 2021-01-01

This paper proposes a robust adaptive output feedback control strategy which can automatically regulate gain for chaos synchronization. Chaotic systems with input nonlinearities, delayed nonlinear coupling, and external disturbance achieve synchronization by applying this strategy. Utilizing Lyapunov method LMI technique, the conditions ensuring are obtained. Finally, simulations given to show effectiveness of our

10.1155/2016/1238191 article EN cc-by Journal of Control Science and Engineering 2016-01-01

Abstract Benefiting from the vision of Security Operation Center (SOC), this paper proposes a construction plan for cyber security operation center electric power dispatching and control system. This solution integrates analyzes various data such as ledger database, knowledge historical alarm database in system, realizes functions handling, risk assessment, emergency response existing management platform. Through evaluation experiment, it is verified that our scheme has function overall...

10.1088/1742-6596/2418/1/012074 article EN Journal of Physics Conference Series 2023-02-01

The existing sensor network trust evaluation model cannot be directly applied to the new power system distributed home photovoltaic collection scenario, which is difficult meet requirements of strong computing and high defense system. Therefore, a dynamic based on multi-index detection proposed. Firstly, communication Bayes carried out according historical interaction terminal acquisition nodes. Then, current collected data evaluated by perceptual its support degree regional probability...

10.1117/12.2686949 article EN 2022 International Conference on Optoelectronic Information and Functional Materials (OIFM 2022) 2023-08-06

A comprehensive overview of today's cyber-attacks and defenses technology.This paper introduces the application social engineering in network attack principle intrusion method man -in -the -middle attack.In rapid development attacks, at same time, defense technology is also constantly evolving, on daily use firewall encryption to elaborate.We'll discuss overall.

10.2991/emehss-17.2017.24 article EN cc-by-nc 2017-01-01

During the closed formation control of multiple unmanned aerial vehicle UAV's strategy, flight direction will be disturbed, which is difficult to predict accurately, due wind disturbance, atmospheric pressure and aerodynamic force produced by UAV's. In this research, decentralized heading controllers proposed for correction angle based on consensus theory. Collisions may occur in course correction, convergence system calculated eigenvalue. The robustness controller simulated different...

10.1109/gncc42960.2018.9018718 article EN 2018 IEEE CSAA Guidance, Navigation and Control Conference (CGNCC) 2018-08-01

Let $\Omega\subset \mathbb{R}^4$ be a smooth bounded domain, $W_0^{2,2}(\Omega)$ the usual Sobolev space. For any positive integer $\ell$, $\lambda_{\ell}(\Omega)$ is $\ell$-th eigenvalue of bi-Laplacian operator. Define $E_{\ell}=E_{\lambda_1(\Omega)}\oplus E_{\lambda_2(\Omega)}\oplus\cdots\oplus E_{\lambda_{\ell}(\Omega)}$, where $E_{\lambda_i(\Omega)}$ eigenfunction space associated with $\lambda_i(\Omega)$. $E^{\bot}_{\ell}$ denotes orthogonal complement $E_\ell$ in $W_0^{2,2}(\Omega)$....

10.48550/arxiv.1807.01073 preprint EN other-oa arXiv (Cornell University) 2018-01-01
Coming Soon ...