- Energy Efficient Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Energy Harvesting in Wireless Networks
- Smart Grid Security and Resilience
- Mobile Ad Hoc Networks
- Distributed Sensor Networks and Detection Algorithms
- Distributed Control Multi-Agent Systems
- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Advanced MIMO Systems Optimization
- Wireless Networks and Protocols
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Network Time Synchronization Technologies
- Robotics and Sensor-Based Localization
- Target Tracking and Data Fusion in Sensor Networks
- Underwater Vehicles and Communication Systems
- Human Mobility and Location-Based Analysis
- Smart Grid Energy Management
- Caching and Content Delivery
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Advanced Wireless Communication Techniques
- RFID technology advancements
- Anomaly Detection Techniques and Applications
Temple University
2025
Zhejiang University
2016-2025
State Key Laboratory of Industrial Control Technology
2016-2025
Zhejiang University of Technology
2015-2025
Hangzhou Dianzi University
2024-2025
China Aerodynamics Research and Development Center
2018-2024
UK Power Networks
2012-2024
Shanghai University
1999-2024
Zhejiang Changzheng Vocational and Technical College
2024
Fudan University
2024
The smart grid is widely considered to be the informationization of power grid. As an essential characteristic grid, demand response can reschedule users' energy consumption reduce operating expense from expensive generators, and further defer capacity addition in long run. This survey comprehensively explores four major aspects: 1) programs; 2) issues; 3) approaches; 4) future extensions response. Specifically, we first introduce means/tariffs that utility takes incentivize users their...
Wireless rechargeable sensor networks (WRSNs) have emerged as an alternative to solving the challenges of size and operation time posed by traditional battery-powered systems. In this paper, we study a WRSN built from industrial wireless identification sensing platform (WISP) commercial off-the-shelf RFID readers. The paper-thin WISP tags serve sensors can harvest energy RF signals transmitted This kind WRSNs is highly desirable for indoor activity recognition gaining attention in research...
In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class cyber-physical systems with cooperating objects (i.e., networked homes). We then define the community architecture, and describe how realize secure robust networking among individual homes. present two applications, Neighborhood Watch Pervasive Healthcare, supporting techniques associated challenges, envision few valueadded services.
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade performance. Specifically, consider scenario where a sensor sends data remote estimator through wireless channel, while energy-constrained decides whether jam channel at each sampling time. We construct...
Recently, many literature works have considered the security issues of wireless networked control system (WNCS). However, few studied how attacker should optimize its attack schedule in order to maximize effect on performance due insufficiency energy at side. This paper fills this gap from aspect performance. We consider optimal jamming that maximizes Linear Quadratic Gaussian (LQG) cost function under constraint. After analyzing properties an arbitrary schedule, we derive and corresponding...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor node communicates with a estimator through wireless channel which may be jammed by an external attacker. With energy constraints for both the and attacker, interactive decision making process when to send attack is studied. formulate game-theoretic framework prove that optimal strategies sides constitute Nash equilibrium zero-sum game. To tackle computation complexity issues, we present...
Demand Response Management (DRM) is a key component of the future smart grid that helps to reduce power peak load and variation. Different from most existing studies focus on scenario with single utility company, this paper DRM multiple companies. First, interaction between companies residential users modeled as two-level game. That is, competition among formulated non-cooperative game, while an evolutionary Then, we prove proposed strategies are able make both games converge their own...
In recent years, drones have undergone tremendous development. Due to the low price and ease of use, been widely utilized in many application scenarios, which potentially pose great threats public security personal privacy. To mitigate these threats, it is necessary deploy anti-drone systems sensitive areas detect, localize, defend against intruding drones. this article, we provide a comprehensive overview technologies for drone surveillance existing systems. Then develop an system at...
This paper considers time synchronization in wireless sensor networks. When the communication delay is negligible, maximum (MTS) protocol proposed by which skew and offset of each node can be synchronized simultaneously. For a more practical case where intercommunication delays between connected are positive random variables, we propose weighted (WMTS), able to counteract impact delays. Despite clock that cannot synchronized, WMTS synchronize completely expectation achieve acceptable...
Wireless sensor and actuator networks (WSANs) bring many benefits to industrial automation systems. When a control system is integrated by WSAN, particularly if the network scale large, distributed communication methods are quite necessary. However, unreliable wireless multihop communications among sensors actuators cause challenges in designing such This paper proposes evaluates new estimation collaborative scheme for systems with WSANs. Extensive results show that proposed method...
Recently, narrowband Internet of Things (NB-IoT), one the most promising low power wide area (LPWA) technologies, has attracted much attention from both academia and industry. It great potential to meet huge demand for machine-type communications in era IoT. To facilitate research on application NB-IoT, this paper, we design a system that includes NB devices, an IoT cloud platform, server, user app. The core component is build development board integrates NB-IoT communication module...
This paper investigates the problem of distributed energy management for both generation and demand side in smart grid. Different from existing works, we formulate a social welfare maximization more practical scenario by taking transmission losses into account. The formulated is non-convex due to non-convexity power balance equality constraint caused losses. To solve problem, first transform an inequality obtain new convex optimization problem. We then derive sufficient condition guarantee...
Crowdsensing offers an efficient approach to meet the demand in large scale sensing applications. In crowdsensing, it is of great interest find optimal task allocation, which challenging since tasks with different requirements quality are typically associated specific locations and mobile users constrained by time budgets. We show that allocation problem NP hard. then focus on approximation algorithms, devise local ratio based algorithm (LRBA). Our analysis shows aggregate rewards obtained...
In rechargeable sensor networks (RSNs), energy harvested by sensors should be carefully allocated for data sensing and transmission to optimize gathering due time-varying renewable arrival limited battery capacity. Moreover, the dynamic feature of network topology taken into account, since it can affect transmission. this paper, we strive in terms utility jointly considering To end, design a optimization algorithm routing (DoSR), which consists two parts. first part, balanced allocation...
Of the different branches of indoor localization research, WiFi fingerprinting has drawn significant attention over past decade. These systems function by comparing received signal strength indicator (RSSI) and a pre-established location-specific fingerprint map. However, due to time-variant wireless strength, RSSI map needs be calibrated periodically, incurring high labor time costs. In addition, biased measurements across devices along with transmission power control techniques routers...
This paper investigates the residential energy consumption scheduling problem, which is formulated as a coupled-constraint game by taking interaction among users and temporally-coupled constraint into consideration. The proposed solution consists of two parts. Firstly, dual decomposition applied to transform original decoupled one. Then, Nash equilibrium proven be achievable via best response, computed gradient projection. also extended an online version, able alleviate impact price...
As a pioneering experimental platform of wireless rechargeable sensor networks, the Wireless Identification and Sensing Platform (WISP) is an open-source that integrates sensing computation capabilities to traditional RFID tags. Different from tags, RFID-based node needs charge its onboard energy storage above threshold in order power sensing, communication components. Consequently, such charging delay imposes unique design challenge for deploying networks. In this paper, we tackle problem...
Long term evolution (LTE) carrier aggregation with 5 GHz unlicensed national informational infrastructure band has been pointed out by the industry as a good solution to handle rapidly increasing amounts of data traffic. To provide fair coexistence LTE-licensed assisted access (LTE-LAA) and Wi-Fi on GHz, several mechanisms have already proposed. This paper provides comprehensive survey LTE-LAA corresponding deployment scenarios. We first analyze coexistence-related features those two...
Recent years have witnessed several new promising technologies to power wireless sensor networks, which motivate some key topics be revisited. By integrating sensing and computation capabilities the traditional radio-frequency identification (RFID) tags, Wireless Identification Sensing Platform (WISP) is an open-source platform acting as a pioneering experimental of rechargeable networks. Different from RFID-based node needs charge its onboard energy storage above threshold sensing,...
As an innovative mobility strategy, public bike-sharing has grown dramatically worldwide. Though providing convenient, low-cost and environmental-friendly transportation, the unique features of systems give rise to problems both users operators. The primary issue among these is uneven distribution bicycles caused by ever-changing usage (available) supply. This bicycle imbalance necessitates efficient bike re-balancing strategies, which depends highly on modeling prediction. In this paper,...
Prediction of drug-target interactions (DTI) plays a vital role in drug development various areas, such as virtual screening, repurposing and identification potential side effects. Despite extensive efforts have been invested perfecting DTI prediction, existing methods still suffer from the high sparsity datasets cold start problem. Here, we develop KGE_NFM, unified framework for prediction by combining knowledge graph (KG) recommendation system. This firstly learns low-dimensional...
Collaborative sensing leverages the cooperation of a collection sensors to complete large-scale task in Internet Things (IoT). Although some previous studies have reviewed literature collaborative sensor networks, there still lacks systematic and holistic overview with consideration practical application needs IoT. In this article, we highlight that is coupled mechanism collaboration, comprehensively survey mechanism, collaboration applications context Specifically, first give an...
The rapid development of information and communications technology has enabled the use digital-controlled software-driven distributed energy resources (DERs) to improve flexibility efficiency power supply, support grid operations. However, this evolution also exposes geographically-dispersed DERs cyber threats, including hardware software vulnerabilities, communication issues, personnel errors, etc. Therefore, enhancing cyber-resiliency DER-based smart -the ability survive successful...