- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Stability and Control of Uncertain Systems
- Distributed Control Multi-Agent Systems
- Neural Networks Stability and Synchronization
- Fault Detection and Control Systems
- Smart Grid Energy Management
- Microgrid Control and Optimization
- Control Systems and Identification
- Advanced Battery Technologies Research
- Energy Efficient Wireless Sensor Networks
- Optimal Power Flow Distribution
- Power System Optimization and Stability
- Electric Power System Optimization
- Electric Vehicles and Infrastructure
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Advanced Control Systems Optimization
- Power System Reliability and Maintenance
- Neural Networks and Applications
- Software-Defined Networks and 5G
- Smart Grid and Power Systems
- Adaptive Control of Nonlinear Systems
- Machine Learning and ELM
- Network Time Synchronization Technologies
Shanghai University
2016-2025
China General Nuclear Power Corporation (China)
2024
North China Electric Power University
2023
Institute of Automation
2020
Ministry of Education of the People's Republic of China
2016-2018
Shenzhen Institutes of Advanced Technology
2018
Chinese Academy of Sciences
2018
University of Surrey
2008-2014
Queen's University Belfast
2009-2013
University of Minnesota
2008
Smart grid (SG) represents a large-scale network system with the tight integration of physical power and an information network, which makes it more vulnerable to hybrid cyber attacks against different regional subsystems. First, alternating direction method multipliers-based distributed state estimation is developed overcome limitation conventional performance analysis SG single type attacks. Regional subsystems are partitioned via K-means method. Second, novel integrated characteristics...
Secure control for cyber–physical power systems (CPPSs) under cyber attacks is a challenging issue. Existing event-triggered schemes are generally difficult to mitigate the impact of and improve communication efficiency simultaneously. To solve such two problems, this article studies secure adaptive CPPSs energy-limited denial-of-service (DoS) attacks. A new DoS-dependent mechanism (SAETM) developed, where DoS taken into account when designing trigger mechanisms. Sufficient conditions...
The spiking neural network (SNN) is considered to be the third generation of networks featured by its low power consumption and high computing capability, which has great application potential in robotics. However, present SNN two limitations: 1) neuron's spike firing time calculated based on iterative approach, dramatically slows down calculation rate 2) existing learning algorithm more suitable for single-layer structure, can hardly train with “deep structure.” To this end, paper proposes...
Persistent data packet losses induced by consecutive denial-of-service (DoS) attacks could fail traditional state estimation (SE) algorithms that highly rely on the completeness of dataset. To solve problem, this article explores a novel SE algorithm with enhanced accuracy for power systems against DoS attacks. First, according to characteristics attacks, we design strategy using latest received measurement compensate losses, and reconstruct system model. Second, integrating Holt's...
Li-ion batteries have been widely used in electric vehicles, power systems and home electronics products. Accurate real-time state-of-charge (SOC) estimation is a key function the battery management to improve operation safety, prolong life span increase performance of batteries. Kalman Filter has shown be very efficient method estimate SOC. However, models are often built off-line literature. In this paper, least squares support vector machine (LS-SVM) model trained with small set samples...
This work is concerned with the transmission control protocol(TCP)-based active queue management for alleviating Internet congestion. To achieve objective, a novel robust observer-based H∞ scheme proposed to stabilize data length of router given target. The observer advocated reconstruct substitution state TCP window size under uncertain environments, wherein almost impossible be explicitly measured in practise. Meanwhile, memoryless controller employed guarantee system asymptotical...
Liquid air energy storage (LAES) is a promising technology for net-zero transition. Regarding microgrids that utilize LAES, the price of electricity in market can create significant uncertainty within system. To address this issue, information gap decision theory (IGDT) method has proven to be an effective tool resolving uncertainties system operation. The IGDT decision-making designed tackle uncertainty, which significantly enhance abilities situations where scarce. Additionally, state...
Anomaly detection is an important challenge in wireless sensor networks for some applications, which require efficient, accurate, and timely data analysis to facilitate critical decision making situation awareness. Support vector description well applied anomaly using a very attractive kernel method. However, it has high computational complexity since the standard version of support needs solve quadratic programming problem. In this article, improved method on basis proposed, reduces used...
Power systems usually employ bad data detection (BDD) to avoid faulty measurements caused by their anomalies, and hence can ensure the security of state estimation power systems. However, recently BDD has been found vulnerable malicious deception attacks submerged in big data. Such purposely craft sparse measurement values (i.e. attack vectors) mislead estimates, while not posing any anomalies BDD. Some related work proposed emphasize this attack. In paper, a new considering practical...
Aiming at the challenges of networked visual servo control systems, which rarely consider network communication duration and image processing computational cost simultaneously, we here propose a novel platform for inverted pendulum using H∞ analysis. Unlike most existing methods that usually ignore costs involved in measuring, actuating, controlling, design event-triggered sampling mechanism applies new closed-loop strategy to dealing with systems multiple time-varying delays errors. Using...
The state of charge (SOC) estimation Li-ion batteries has attracted substantial interests in recent years. Kalman Filter been widely used real-time battery SOC estimation, however, to build a suitable dynamic state-space model is key challenge, and most existing methods still use the off-line modelling approach. This paper tackles challenge by proposing novel sparse learning machine for estimation. achieved first developing new based on traditional least squares support vector (LS-SVM)...
Lithium-ion batteries have been widely used as energy storage systems and in electric vehicles due to their desirable balance of both power densities well continual falling price. Accurate estimation the state-of-charge (SOC) a battery pack is important managing health safety packs. This paper proposes compact radial basis function (RBF) neural model estimate lithium Firstly, suitable input set strongly correlated with package SOC identified from directly measured voltage, current,...
Battery storage has an important role to play in integrating large-scale renewable power generations and transport decarbonization. Real-time monitoring of battery temperature profiles is indispensable for safety management. Due the advantages small size, resistance corrosion, immunity electromagnetic interference, multiplexing, fiber Bragg-grating (FBG) sensing received substantial interest recent years measurement. However, traditional calibration FBG sensors often requires a high-standard...
Secure information exchange of the devices among different domains for cyber-physical power systems (CPPSs) is important yet challenging. Conventional blockchain-based authentication schemes generally adopt single blockchain and signature algorithm, only achieving intradomain or interdomain with lower efficiency, always failing to meet confidentiality requirement during interaction in CPPSs. To address these issues, this paper proposes a cross-domain scheme based on distributed two-layer...
Abstract This paper addresses a distributed nonlinear filtering issue based on maximum correntropy for dealing with randomly occurring hybrid cyber‐attacks in non‐Gaussian environment. The types of include denial service attacks and deception attacks. First, modified unscented Kalman filter is proposed, using Cauchy kernel‐based criterion instead the traditional mean square error criterion, against noise. Then fixed‐point iterative rules information fusion strategy, update equations state...