Hui Zhao

ORCID: 0000-0001-8813-0499
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Railway Systems and Energy Efficiency
  • Cryptography and Data Security
  • Transportation Planning and Optimization
  • Traffic control and management
  • Traffic Prediction and Management Techniques
  • Remote Sensing and Land Use
  • Advanced Algorithms and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • Distributed and Parallel Computing Systems
  • Food composition and properties
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Environmental and Agricultural Sciences
  • Advanced Authentication Protocols Security
  • Advanced Sensor and Control Systems
  • Advanced Computational Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Railway Engineering and Dynamics
  • Advanced Data Storage Technologies
  • Forest, Soil, and Plant Ecology in China
  • Technology and Security Systems
  • Electrical Contact Performance and Analysis
  • Advanced Text Analysis Techniques
  • Business Process Modeling and Analysis

Sichuan University
2006-2025

Shenyang University of Technology
2021-2024

National Administration of Surveying, Mapping and Geoinformation of China
2016-2024

Xinjiang University
2008-2023

Tianjin University of Science and Technology
2012-2023

Inner Mongolia University
2022

Northeastern University
2018-2021

Jiangsu University
2010-2021

East China Normal University
2019

Kyushu University
2016

This paper presents a robust event-triggered model predictive control (MPC) strategy for multiple high-speed trains (MHSTs) with random switching topologies. Due to the complicated operation environment of railways, communication topology MHSTs system is time-varying and changes among set directed graphs, which can be characterized as Markov chain. By adopting concept MPC, this studies distributed cooperative leader-following consensus MHSTs, in novel introduced determine when information...

10.1109/tvt.2020.2974979 article EN IEEE Transactions on Vehicular Technology 2020-02-19

Industrial networks are the cornerstone of modern industrial control systems. Performing security checks communication processes helps detect unknown risks and vulnerabilities. Fuzz testing is a widely used method for performing that takes advantage automation. However, there big challenge to carry out on network due increasing variety complexity protocols. In this case, existing approaches usually take long time model protocol generating test cases, which labor-intensive time-consuming....

10.1109/icst.2019.00016 article EN 2019-04-01

In order to improve the operation efficiency of high-speed trains and save communication resources railway network, this article proposes an on-demand event-triggered strategy for coordinated control multiple (MHSTs) subject delays input constraints. The MHSTs are modeled as a leader-following multiagent system each train exchanges their states with its neighboring through network. Then, scheme is designed determine when transmitted local controller trains. With fused into dynamic model...

10.1109/tcns.2020.2979862 article EN IEEE Transactions on Control of Network Systems 2020-03-10

The denial-of-service (DoS) attacks injected in the communication network of high-speed trains can block transmission information between by preventing from sending data and interfering with network. In order to solve this problem, paper investigates cooperative control strategy for subject DoS through a resilient scheme. A secure framework is proposed restore multi-train system caused initial proposing an acknowledgment-based attack detection recovery mechanism. Then, distributed...

10.1109/tvt.2021.3120695 article EN IEEE Transactions on Vehicular Technology 2021-10-20

Running a large-scale distributed simulation may need large amount of computing resources at geographically different locations. These be from organizations. The run for long period time and the availability available change during course execution. Therefore, coordinating managing to complete efficiently effectively is critical issue. This paper describes load management system HLA-based simulation. constructed on top grid environment supported by Globus. overall structure presented in how...

10.1109/disrta.2002.1166883 article EN 2003-06-26

10.1007/s13042-024-02101-x article EN International Journal of Machine Learning and Cybernetics 2024-03-01

The main objective of this study is to develop a multifeature soil moisture retrieval method based on the principal component analysis (PCA) dimensionality reduction technique. RADARSAT-2 data were used compute backscattering coefficients and polarimetric variables. optimal input features for selected by means PCA least root mean square error (RMSE) criterion. support vector regression (SVR) model was estimate content. results indicated that extracted showed high correlation with RMSE, R2...

10.1080/07038992.2016.1175928 article EN Canadian Journal of Remote Sensing 2016-03-03

10.1007/s12555-022-0217-2 article EN International Journal of Control Automation and Systems 2023-10-12

Intelligent traffic signal control (TSC) system is important for the alleviation of congestion.Usually, most researches about TSC focused on single intersection based type-1 fuzzy set.Compared with logic controller (FLC), type-2 FLC can deal more uncertainties in road system.Therefore, a optimized by NSGAII (T2-NSGAII) designed complex network, which intersection's time dynamically adjusted its own and adjacent intersections' volumes to reduce global delay congestion.In T2-NSGAII, expert...

10.3233/ifs-151964 article EN other-oa Journal of Intelligent & Fuzzy Systems 2015-11-04

Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses series techniques discover patterns infer the type accesses. Many anonymous networks such as Tor can...

10.1186/s13677-021-00244-8 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2021-05-20

Lutan-1 SAR satellite is the first group differential interferometric satellites in China. Coherence a key factor for quantitative applications of satellite. In order to effectively evaluate coherence characteristics satellite, analysis carried out different application scenes monostatic and bistatic formations. Firstly, main factors affecting interference are analyzed discussed based on theoretical derivation. According configurations parameters, as well relevant technical indexes obtained...

10.1109/bigsardata59007.2023.10294880 article EN 2023-09-20

We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis.This formalized within the applied pi-calculus by using equational theory which characterizes cryptographic semantics secret share.We also present encoding from into convergent rewriting system, suitable for automated protocol verifier ProVerif.Based on that, we verify threshold certificate in ProVerif.

10.1080/18756891.2012.670517 article EN cc-by International Journal of Computational Intelligence Systems 2012-01-01

The immunoglobulin is one kind of special material for protecting the biological body far way from invasion harmful foreign antigen. When under attack by continuous antigens, set immune cell in system will secret much to neutralize them. Inspired process secretion body, this paper presents a Web Page Malicious Script Detection Method inspired (WPMSD) overcome high false alarm rate traditional immune-based web page malicious script detection methods. In WPMSD, Firstly, definitions...

10.1109/iptc.2010.100 article EN 2010-10-01

This paper proposes an event-triggered transmission strategy for cruise control of multiple high-speed trains (MHSTs). The MHSTs are modeled as a multi-agent system with certain fixed topology. An scheme is designed to determine when the states train broadcast neighboring and local controller updates its input. With this fused into dynamic model system, protocol presented. consensus analyzed by studying asymptotically stability time-varying delay caused event-trigger scheme. By utilizing...

10.1109/ccdc.2018.8407531 article EN 2018-06-01

The Role-Based Access Control (RBAC) model is widely accepted as the of access control workflow management system (WFMS). However, RBAC exist a lot limit when it describe authorization constraint control. Especially , cannot express transaction character and phase role user perform task. This paper proposed an improved role-Based for WFMS. new concepts WfMS are defined respectively. rules IRBAC build, which can complex constraints WfMS.

10.1109/itng.2008.196 article EN 2008-04-01

This paper introduces the concept of high availability. And it discusses high-availability teaching website design methods in following six aspects: site architecture design, content page template ease use navigation and search functionality design.

10.1109/icmss.2010.5575660 article EN 2010-08-01

The collaborative e-commerce systems are widely used between the enterprise and to strengthen cooperating ability of enterprises in dynamic business environment. Since often shared by different enterprises, powerful access control is needed allow rights records same table. Traditional models that define a permission as right user/role perform specific operation on object cannot handle enormous amount objects user/roles. In this paper we propose an enhancement role-based introducing domains...

10.1109/icpca.2007.4365432 article EN 2007-07-01

With almost unlimited storage capacity and low maintenance cost, cloud becomes a convenient efficient way for data sharing among users. However, this introduces the challenges of access control privacy protection when multiple groups, as each group usually has its own encryption mechanism to protect confidentiality. In paper, we propose multiple-group scheme with preservation in cloud. This constructs flexible framework by using signature, ciphertext-policy attribute-based broadcast...

10.1109/itia50152.2020.9312318 article EN 2020-11-27

Abstract In recent years, the research of text sentiment analysis has recognized importance associating events with polarity, that is, triggered by can be detected through direct or indirect modeling events. However, there are two problems current study: (1) There is no publicly available dataset; (2) Existing models fail to better model event information. To address these issues, we created an event-based dataset (ESCO), where each sentence labeled triplet representation and polarity...

10.21203/rs.3.rs-2653814/v1 preprint EN cc-by Research Square (Research Square) 2023-03-08
Coming Soon ...