- Railway Systems and Energy Efficiency
- Cryptography and Data Security
- Transportation Planning and Optimization
- Traffic control and management
- Traffic Prediction and Management Techniques
- Remote Sensing and Land Use
- Advanced Algorithms and Applications
- Internet Traffic Analysis and Secure E-voting
- Access Control and Trust
- Distributed and Parallel Computing Systems
- Food composition and properties
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Environmental and Agricultural Sciences
- Advanced Authentication Protocols Security
- Advanced Sensor and Control Systems
- Advanced Computational Techniques and Applications
- Privacy-Preserving Technologies in Data
- Railway Engineering and Dynamics
- Advanced Data Storage Technologies
- Forest, Soil, and Plant Ecology in China
- Technology and Security Systems
- Electrical Contact Performance and Analysis
- Advanced Text Analysis Techniques
- Business Process Modeling and Analysis
Sichuan University
2006-2025
Shenyang University of Technology
2021-2024
National Administration of Surveying, Mapping and Geoinformation of China
2016-2024
Xinjiang University
2008-2023
Tianjin University of Science and Technology
2012-2023
Inner Mongolia University
2022
Northeastern University
2018-2021
Jiangsu University
2010-2021
East China Normal University
2019
Kyushu University
2016
This paper presents a robust event-triggered model predictive control (MPC) strategy for multiple high-speed trains (MHSTs) with random switching topologies. Due to the complicated operation environment of railways, communication topology MHSTs system is time-varying and changes among set directed graphs, which can be characterized as Markov chain. By adopting concept MPC, this studies distributed cooperative leader-following consensus MHSTs, in novel introduced determine when information...
Industrial networks are the cornerstone of modern industrial control systems. Performing security checks communication processes helps detect unknown risks and vulnerabilities. Fuzz testing is a widely used method for performing that takes advantage automation. However, there big challenge to carry out on network due increasing variety complexity protocols. In this case, existing approaches usually take long time model protocol generating test cases, which labor-intensive time-consuming....
In order to improve the operation efficiency of high-speed trains and save communication resources railway network, this article proposes an on-demand event-triggered strategy for coordinated control multiple (MHSTs) subject delays input constraints. The MHSTs are modeled as a leader-following multiagent system each train exchanges their states with its neighboring through network. Then, scheme is designed determine when transmitted local controller trains. With fused into dynamic model...
The denial-of-service (DoS) attacks injected in the communication network of high-speed trains can block transmission information between by preventing from sending data and interfering with network. In order to solve this problem, paper investigates cooperative control strategy for subject DoS through a resilient scheme. A secure framework is proposed restore multi-train system caused initial proposing an acknowledgment-based attack detection recovery mechanism. Then, distributed...
Running a large-scale distributed simulation may need large amount of computing resources at geographically different locations. These be from organizations. The run for long period time and the availability available change during course execution. Therefore, coordinating managing to complete efficiently effectively is critical issue. This paper describes load management system HLA-based simulation. constructed on top grid environment supported by Globus. overall structure presented in how...
The main objective of this study is to develop a multifeature soil moisture retrieval method based on the principal component analysis (PCA) dimensionality reduction technique. RADARSAT-2 data were used compute backscattering coefficients and polarimetric variables. optimal input features for selected by means PCA least root mean square error (RMSE) criterion. support vector regression (SVR) model was estimate content. results indicated that extracted showed high correlation with RMSE, R2...
Intelligent traffic signal control (TSC) system is important for the alleviation of congestion.Usually, most researches about TSC focused on single intersection based type-1 fuzzy set.Compared with logic controller (FLC), type-2 FLC can deal more uncertainties in road system.Therefore, a optimized by NSGAII (T2-NSGAII) designed complex network, which intersection's time dynamically adjusted its own and adjacent intersections' volumes to reduce global delay congestion.In T2-NSGAII, expert...
Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses series techniques discover patterns infer the type accesses. Many anonymous networks such as Tor can...
Lutan-1 SAR satellite is the first group differential interferometric satellites in China. Coherence a key factor for quantitative applications of satellite. In order to effectively evaluate coherence characteristics satellite, analysis carried out different application scenes monostatic and bistatic formations. Firstly, main factors affecting interference are analyzed discussed based on theoretical derivation. According configurations parameters, as well relevant technical indexes obtained...
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis.This formalized within the applied pi-calculus by using equational theory which characterizes cryptographic semantics secret share.We also present encoding from into convergent rewriting system, suitable for automated protocol verifier ProVerif.Based on that, we verify threshold certificate in ProVerif.
The immunoglobulin is one kind of special material for protecting the biological body far way from invasion harmful foreign antigen. When under attack by continuous antigens, set immune cell in system will secret much to neutralize them. Inspired process secretion body, this paper presents a Web Page Malicious Script Detection Method inspired (WPMSD) overcome high false alarm rate traditional immune-based web page malicious script detection methods. In WPMSD, Firstly, definitions...
This paper proposes an event-triggered transmission strategy for cruise control of multiple high-speed trains (MHSTs). The MHSTs are modeled as a multi-agent system with certain fixed topology. An scheme is designed to determine when the states train broadcast neighboring and local controller updates its input. With this fused into dynamic model system, protocol presented. consensus analyzed by studying asymptotically stability time-varying delay caused event-trigger scheme. By utilizing...
The Role-Based Access Control (RBAC) model is widely accepted as the of access control workflow management system (WFMS). However, RBAC exist a lot limit when it describe authorization constraint control. Especially , cannot express transaction character and phase role user perform task. This paper proposed an improved role-Based for WFMS. new concepts WfMS are defined respectively. rules IRBAC build, which can complex constraints WfMS.
This paper introduces the concept of high availability. And it discusses high-availability teaching website design methods in following six aspects: site architecture design, content page template ease use navigation and search functionality design.
The collaborative e-commerce systems are widely used between the enterprise and to strengthen cooperating ability of enterprises in dynamic business environment. Since often shared by different enterprises, powerful access control is needed allow rights records same table. Traditional models that define a permission as right user/role perform specific operation on object cannot handle enormous amount objects user/roles. In this paper we propose an enhancement role-based introducing domains...
With almost unlimited storage capacity and low maintenance cost, cloud becomes a convenient efficient way for data sharing among users. However, this introduces the challenges of access control privacy protection when multiple groups, as each group usually has its own encryption mechanism to protect confidentiality. In paper, we propose multiple-group scheme with preservation in cloud. This constructs flexible framework by using signature, ciphertext-policy attribute-based broadcast...
Abstract In recent years, the research of text sentiment analysis has recognized importance associating events with polarity, that is, triggered by can be detected through direct or indirect modeling events. However, there are two problems current study: (1) There is no publicly available dataset; (2) Existing models fail to better model event information. To address these issues, we created an event-based dataset (ESCO), where each sentence labeled triplet representation and polarity...