Xiang Huo

ORCID: 0000-0003-3997-2547
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Electric Vehicles and Infrastructure
  • Viral Infections and Outbreaks Research
  • Smart Grid Security and Resilience
  • Smart Grid Energy Management
  • Viral Infections and Vectors
  • Blockchain Technology Applications and Security
  • Energy Harvesting in Wireless Networks
  • Respiratory viral infections research
  • Influenza Virus Research Studies
  • Microgrid Control and Optimization
  • Privacy-Preserving Technologies in Data
  • Disaster Response and Management
  • Cryptography and Data Security
  • Advanced MIMO Systems Optimization
  • Advanced Battery Technologies Research
  • Vaccine Coverage and Hesitancy
  • Mosquito-borne diseases and control
  • Animal Virus Infections Studies
  • Energy Efficient Wireless Sensor Networks
  • Vector-Borne Animal Diseases
  • Robotic Path Planning Algorithms
  • COVID-19 epidemiological studies
  • Security in Wireless Sensor Networks
  • Adaptive Control of Nonlinear Systems
  • Animal Disease Management and Epidemiology

University of Utah
2020-2024

Nihon University
2023

Beihang University
2022

Jiangsu Provincial Center for Disease Control and Prevention
2016-2021

Harbin Institute of Technology
2017-2020

Center for Disease Control
2019

ITER China
2016

University of Illinois Chicago
2015

PLA 306 Hospital
2014

Centers for Disease Control and Prevention
2012

Background. Severe fever with thrombocytopenia syndrome (SFTS) is an emerging viral disease in China, caused by SFTS virus (SFTSV). patients can quickly proceed to multiorgan dysfunction and death; however, underlying pathogenic mechanisms remain unclear.

10.1093/infdis/jis452 article EN The Journal of Infectious Diseases 2012-08-17

While we have a good understanding of how cyber crime is perpetrated and the profits attackers, harm experienced by humans less well understood, reducing this should be ultimate goal any security intervention. This paper presents strategy for quantifying caused typo squatting via novel technique intent inference. Intent inference allows us to define new metric users, develop methodology identifying domain names, quantify various perpetrators. We find that costs typical user 1.3 seconds per...

10.1109/sp.2015.16 article EN IEEE Symposium on Security and Privacy 2015-05-01

According to the robot’s dynamics, a high performance algorithm based on dynamic surface control is introduced track desired trajectory, and simulations are conducted selective compliance assembly robot arm-type manipulator verify algorithm. The traditional designed model, which requires exact model information. Due uncertainty complex environments, tracking of controller can be significantly decreased. Therefore, model-free fuzzy adaptive designed, by adopting system with Lyapunov...

10.1177/1729881419894417 article EN cc-by International Journal of Advanced Robotic Systems 2020-01-01

The recent outbreak of the Ebola virus disease (EVD) in Sierra Leone has been characterized by World Health Organization as one most challenging EVD outbreaks to date. first confirmed case was a young woman who admitted government hospital Kenema following miscarriage on 24 May 2014. On 5 January 2015, intensified training for an response project initiated at medical university Jui. To understand knowledge, attitudes, practices, and perceived risk among public, especially after this...

10.1186/s40249-016-0142-9 article EN cc-by Infectious Diseases of Poverty 2016-05-24

Abstract Much less is known about the etiology of influenza‐like illness in China. A continuous surveillance 16 respiratory viruses was conducted from November 2010 to October 2011 outpatients with Nanjing, The two largest general hospitals and a provincial virus laboratory Nanjing participated this study. Throat swabs were collected during medical visits for tested using PCR. Three hundred seventeen detected samples 246 (50.6%) patients illness. found mostly commonly influenza, rhinovirus,...

10.1002/jmv.23401 article EN Journal of Medical Virology 2012-10-10

The Ebola virus disease spread rapidly in West Africa 2014, leading to the loss of thousands lives. Community engagement was one key strategies interrupt transmission, and practical community level measures needed be explored field tailored specific context communities.First, community-level education on (EVD) prevention launched for community's social mobilizers six districts Sierra Leone beginning November 2014. Then, from January May 2015, three pilot communities, local trained members...

10.1186/s40249-016-0167-0 article EN cc-by Infectious Diseases of Poverty 2016-07-14

The flexible, efficient, and reliable operation of grid-interactive efficient buildings (GEBs) is increasingly impacted by the growing penetration distributed energy resources (DERs). Besides, optimization control DERs, buildings, distribution networks are further complicated their interconnections. In this letter, we exploit load-side flexibility clean to develop a novel two-level hybrid decentralized-centralized (HDC) algorithm DER-connected GEBs. proposed HDC 1) achieves scalability...

10.1109/lcsys.2022.3230321 article EN publisher-specific-oa IEEE Control Systems Letters 2022-12-19

Large-scale multi-agent cooperative control problems have materially enjoyed the scalability, adaptivity, and flexibility of distributed optimization. However, due to mandatory iterative communications between agents system operator, architecture is vulnerable malicious attacks privacy breaches. Current research on preservation both operator in optimization with strongly coupled objective functions constraints still primitive. To fill gaps, this letter proposes a novel privacy-preserving...

10.1109/lcsys.2021.3086441 article EN IEEE Control Systems Letters 2021-06-04

Decentralized optimizations have been extensively applied in large-scale industrial cyber-physical systems to achieve control scalability. However, state-of-the-art methods heavily depend on explicit communications between participants, exposing the entire framework data confidentiality risks. To overcome this challenge, article, a privacy-preserving decentralized multi-agent cooperative optimization paradigm was developed via integrating cryptography into optimization. The proposed approach...

10.1109/tii.2021.3132940 article EN IEEE Transactions on Industrial Informatics 2021-12-07

Cooperatively optimizing a vast number of agents over large-scale network faces unprecedented scalability challenges. The existing optimization algorithms is limited by either the agent population size or dimension. As radical improvement, this article, for first time, constructs two-facet scalable distributed framework. This novel framework distributes computing load among (scalability w.r.t. size) and enables each to only consider partial constraints in its primal variable updates...

10.1109/tcst.2022.3143115 article EN IEEE Transactions on Control Systems Technology 2022-02-02

Human infections with vaccinia virus (VACV), mostly from laboratory accidents or contact infected animals, have occurred since smallpox was eradicated in 1980. No recent cases been reported China. We report on an outbreak of VACV occupational exposure to rabbit skins inoculated VACV.

10.3201/eid2506.171306 article EN cc-by Emerging infectious diseases 2019-04-23

Background Severe fever with thrombocytopenia syndrome virus (SFTSV), an emerging human pathogen naturally transmitted by ticks, has spread widely since it was first detected in 2010. Although SFTSV-specific antibodies have been wild birds, these natural reservoir and amplifying hosts for the not well studied. Methodology/Principle findings Here we report experimental infection of spotted doves (Streptopelia chinensis) two strains SFTSV, JS2010-14, a Chinese lineage strain, JS2014-16,...

10.1371/journal.pntd.0006982 article EN cc-by PLoS neglected tropical diseases 2019-07-05

10.1109/tcns.2024.3462536 article EN IEEE Transactions on Control of Network Systems 2024-01-01

The charging processes of a large number electric vehicles (EVs) require coordination and control for the alleviation their impacts on distribution network provision various grid services. However, scalability existing EV paradigms are limited by either population size or dimension, largely impairing EVs' aggregate service capability applicability. To overcome barrier, this paper, motivated optimal scheduling problem valley-filling service, (1) proposes novel dimension reduction methodology...

10.1109/cdc42340.2020.9304463 article EN 2021 60th IEEE Conference on Decision and Control (CDC) 2020-12-14

Abstract The coronavirus disease 2019 (COVID-19) pandemic caused by severe acute respiratory syndrome 2 (SARS-CoV-2) continues to scale up around the world, costing health and economic losses. development of an effective COVID-19 vaccine is utmost importance. Most designs can be classified into three camps: protein based (inactivated vaccines, subunit, VLP T-cell vaccines), gene (DNA or RNA replicating non-replicating viral/bacterial vectored a combination both protein-based gene-based...

10.1097/id9.0000000000000003 article EN cc-by-nc-nd Infectious Diseases & Immunity 2021-04-01

A sliding mode control method based on nonlinear disturbance observer and nominal model is proposed to track the trajectory of manipulator with uncertain interference. dynamic established, a law designed, stability system verified by Lyapunov theory. introduced improve performance system. The results show that reduces unmodelled errors influence external Furthermore, simulation Matlab prove compared traditional PD position method, has higher accuracy better robustness.

10.1109/iecon.2018.8592926 article EN IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society 2018-10-01

Currently, the image registration algorithm is mainly implemented on PC. In this paper, to realize a mobile terminal, customized system was designed and Raspberry Pi microcomputer board, in which Keren adopted achieve registration. Experimental results show that can reach sub-pixel level of with high efficiency, still has satisfactory accuracy even for general case noises are included all images. Besides, realizing function based terminal also makes more potential be used higher integration.

10.23919/chicc.2017.8029144 article EN 2017-07-01

Abstract: We report a case of laboratory-confirmed Zika virus (ZIKV) infection imported into China from Ecuador. This is the first documented with ZIKV Jiangsu, and Ecuador nationwide. The patient developed fever, rash, conjunctivitis joint pain after returning. However, due to less specific clinical symptoms lack quick diagnostic methods in elementary healthcare facilities, this was not identified during her two medical consultations. RNA detected urine sample rather than serum case,...

10.21037/jphe.2017.09.01 article EN Journal of Public Health and Emergency 2017-09-27

Distributed and decentralized multi-agent optimization (DMAO) algorithms enable the control of large-scale grid-edge resources, such as electric vehicles (EVs), to provide power grid services. Despite its great scalability, DMAO is fundamentally prone cyber attacks it highly dependent on frequent peer-to-peer communications. Existing cyber-security research in this regard mainly focuses broad-spectrum aiming at jeopardizing entire system while losing possibility achieving specific attacking...

10.1109/isie51358.2023.10227968 article EN 2023-06-19

The electric vehicle (EV) industry is rapidly evolving owing to advancements in smart grid technologies and charging control strategies. While EVs are promising decarbonizing the transportation system providing services, their widespread adoption has led notable erratic load injections that can disrupt normal operation of power grid. Additionally, unprotected collection utilization personal information during EV process cause prevalent privacy issues. To address scalability data...

10.1109/cdc49753.2023.10383455 article EN 2023-12-13

Reinforcement learning (RL)-based methods have achieved significant success in managing grid-interactive efficient buildings (GEBs). However, RL does not carry intrinsic guarantees of constraint satisfaction, which may lead to severe safety consequences. Besides, GEB control applications, most existing safe approaches rely only on the regularisation parameters neural networks or penalty rewards, often encounter challenges with parameter tuning and catastrophic violations. To provide enforced...

10.48550/arxiv.2409.08132 preprint EN arXiv (Cornell University) 2024-09-12
Coming Soon ...