Jian Chen

ORCID: 0000-0003-3738-2092
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Power Systems and Renewable Energy
  • Microgrid Control and Optimization
  • Higher Education and Teaching Methods
  • Adversarial Robustness in Machine Learning
  • Power Quality and Harmonics
  • Advanced DC-DC Converters
  • Multilevel Inverters and Converters
  • High-Voltage Power Transmission Systems
  • Smart Grid and Power Systems
  • Advanced Computational Techniques and Applications
  • Magnetic Properties and Applications
  • Anomaly Detection Techniques and Applications
  • Iterative Learning Control Systems
  • Evaluation Methods in Various Fields
  • Advanced Algorithms and Applications
  • Multi-Criteria Decision Making
  • Cloud Computing and Resource Management
  • Recommender Systems and Techniques
  • Electromagnetic Compatibility and Noise Suppression
  • Privacy-Preserving Technologies in Data
  • Electrostatic Discharge in Electronics
  • Frequency Control in Power Systems
  • Caching and Content Delivery
  • Magnetic Bearings and Levitation Dynamics
  • Educational Technology and Assessment

Jiangnan University
2018-2025

Huazhong University of Science and Technology
2011-2024

Union Hospital
2023-2024

Hong Kong Polytechnic University
2024

City University of Macau
2024

University of Electronic Science and Technology of China
2022-2024

Hubei Cancer Hospital
2022-2024

Jiangsu University
2024

Tongji Hospital
2015-2023

Tsinghua University
2007-2023

10.1016/s1874-8651(08)60026-5 article EN Systems Engineering - Theory & Practice 2007-04-01

A novel repetitive controller directly combined with an open loop SPWM inverter is presented in this paper. To cope the high-resonant peak of that may cause instability, a zero-phase-shift notch filter other than inverse transfer function or conventional second-order incorporated controller. The proposed method has good harmonic rejection and large tolerance to parameter variations. further reduce steady-state error, low-pass-filter Q(z) algorithm applied. DC bias problem also taken into...

10.1109/tpel.2003.810846 article EN IEEE Transactions on Power Electronics 2003-05-01

We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, Vis. The each includes its title, abstract, authors, citations other papers in conference series, among many attributes. This article describes motivation for creating dataset, as well our process coalescing cleaning data, three visualizations we facilitate exploration data. data is meant be useful broad...

10.1109/tvcg.2016.2615308 article EN publisher-specific-oa IEEE Transactions on Visualization and Computer Graphics 2016-10-05

Machine learning techniques have been widely applied to various applications. However, they are potentially vulnerable data poisoning attacks, where sophisticated attackers can disrupt the procedure by injecting a fraction of malicious samples into training dataset. Existing defense against attacks largely attack-specific: designed for one specific type but do not work other types, mainly due distinct principles follow. Yet few general strategies developed. In this paper, we propose De-Pois,...

10.1109/tifs.2021.3080522 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2021-01-01

With the development of information technology, image has become main content network transmission. encryption it is also about theft technology. In order to cope with evolving we must seek a better algorithm. Among many algorithms, due superiority chaos when encrypted ciphertext presents randomness, which makes possibility deciphering greatly reduced. Therefore, research digital algorithm based on technology an important means modern encryption. this paper, studied dual logistic chaotic map...

10.1186/s13640-018-0386-3 article EN cc-by EURASIP Journal on Image and Video Processing 2018-12-01

Over the past years, emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects human life. However, using in also presents potential security and privacy threats. A common practice is so-called poisoning attacks where malicious users inject fake training data with aim corrupting learned model. In this survey, we comprehensively review existing as well countermeasures for first time. We emphasize compare principles formal...

10.1016/j.dcan.2021.07.009 article EN cc-by-nc-nd Digital Communications and Networks 2021-07-30

Group decision making with preference information on alternatives is an interesting and important research topic which has been receiving more attention in recent years. The purpose of this paper to investigate multiple-attribute group decision-making (MAGDM) problems distinct uncertain structures. We develop some linear-programming models for dealing the MAGDM problems, where about attribute weights incomplete, makers have their preferences alternatives. provided can be represented...

10.1109/tsmcb.2008.925752 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2008-08-28

Federated learning (FL) is a privacy-preserving machine paradigm that enables multiple clients to train unified model without disclosing their private data. However, susceptibility membership inference attacks (MIAs) arises due the natural inclination of FL models overfit on training data during process, thereby enabling MIAs exploit subtle differences in model's parameters, activations, or predictions between and testing infer information. It worth noting most if not all existing against...

10.1109/tifs.2023.3303718 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

With the high development of social networks, collaborations in a socialized web-based learning environment has become increasing important, which means people can learn through interactions and communities across networks. In this study, order to support enhanced collaborative learning, two important factors, user behavior patterns correlations, are taken into account facilitate information knowledge sharing task-oriented process. Following hierarchical graph model for within process,...

10.1109/tlt.2013.2297701 article EN IEEE Transactions on Learning Technologies 2014-01-31

Recently, the practical needs of ``the right to be forgotten'' in federated learning gave birth a paradigm known as unlearning, which enables server forget personal data upon client's removal request. Existing studies on unlearning have primarily focused efficiently eliminating influence requested from model without retraining scratch, however, they rarely doubted reliability global posed by discrepancy between its prediction performance before and after unlearning. To bridge this gap, we...

10.48550/arxiv.2501.11848 preprint EN arXiv (Cornell University) 2025-01-20

Marmesin, a plant dihydrofuranocoumarin, is an important intermediate in the synthesis of linear furanocoumarins and exhibits variety pharmacological activities. However, due to lack efficient prenyltransferases, incompatibility redox partners for P450 enzymes, insufficient supply precursor (DMAPP), microbial marmesin remained at extremely low level. Here, we report biosynthesis Escherichia coli by screening robust 6-prenyltransferase PpPT1 synthase PpDCΔ2–29 from Peucedanum praeruptorum....

10.1021/acssynbio.4c00892 article EN ACS Synthetic Biology 2025-02-27

Currently, various types of myoglobins and hemoglobins are widely used in the fields food additives biocatalytic applications. However, limited availability heme constrains biosynthesis these high-activity hemoproteins microbial chassis cells. In this work, a new synthetic pathway was reconstructed mitochondria by eliminating spatial barrier during synthesis Saccharomyces cerevisiae, resulting significant enhancement intracellular supply. To further enhance supply essential precursor for...

10.3390/fermentation11050246 article EN cc-by Fermentation 2025-05-01

Recommender systems (RS) have become an essential component of web services due to their excellent performance. Despite great success, RS proved be vulnerable data poisoning attacks, which inject well-crafted fake profiles into RS, so that the target items can maliciously recommended. In this paper, we first reveal existing attacks in detected effortlessly, as features generated cannot inconsistent with those normal all time. We further propose RecUP, a attack generate plausible whose stay...

10.1109/tifs.2021.3117078 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2021-01-01

Based on the p-q-r theory, this paper presents a direct control strategy of unified power quality conditioner (UPQC) used in nonlinear and unbalance three- phase four-wire system. A algorithm calculating series compensation current shunt voltage proposed system is introduced. An analysis its schematic diagram described particular .Simulation results using MATLAB/SIMULINK show that harmonic current, reactive load as well neutral are compensated when occur or sag source voltage, get balanced...

10.1109/ipemc.2006.4778095 article EN 2006-01-01

Regulatory T cells (Tregs), a subset of CD4+ cells, are indispensable in maintaining immune self-tolerance and have been utilized various diseases. Treg-derived extracellular vesicles (Treg-EVs) discovered to play an important role the mechanism Treg functions. As cell-derived membranous particles, EVs carry multiple bioactive substances that possess tremendous potential for theranostics. Treg-EVs involved numerous physiological pathological processes, carrying proteins miRNAs inherited from...

10.1021/acs.molpharmaceut.4c00233 article EN Molecular Pharmaceutics 2024-05-02

A new approach for deadbeat control of a PWM invertor is presented, in which the estimation disturbance carried out with repetitive predictor instead observer. Taking advantage repetitiveness loads, it gives good performance at lower sampling frequency. Simulations and experiments confirmed advantages.

10.1109/apec.1999.750495 article EN 1999-01-01

A novel power electronic load (PEL) is introduced in this paper. This equipment can simulate R,L,C as well non-linear load. Furthermore, it recycle the energy back to grid. Topology for single phase AC PEL, three-phase and DC PEL are presented firstly. Based on disadvantages of repetitive controller, an improved controller improve dynamic performance system. Relative problems system analyzed mean filter adopted eliminate harmonics loop. The whole efficiency be high 80%-90%. Simulation...

10.1109/apec.2009.4802891 article EN 2009-02-01
Coming Soon ...