Ping Yi

ORCID: 0000-0003-4530-5118
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Traffic Prediction and Management Techniques
  • Network Security and Intrusion Detection
  • Advanced Battery Technologies Research
  • Electric Vehicles and Infrastructure
  • Traffic control and management
  • Energy Efficient Wireless Sensor Networks
  • Transportation Planning and Optimization
  • Advanced Malware Detection Techniques
  • Electric and Hybrid Vehicle Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Internet Traffic Analysis and Secure E-voting
  • Indoor and Outdoor Localization Technologies
  • Caching and Content Delivery
  • Energy Harvesting in Wireless Networks
  • Smart Grid Security and Resilience
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Security in Wireless Sensor Networks
  • Traffic and Road Safety
  • Wireless Networks and Protocols
  • Vehicle emissions and performance
  • Spam and Phishing Detection

Shanghai Jiao Tong University
2015-2025

Shanghai Ocean University
2024-2025

Universidad del Noreste
2025

University of Akron
2008-2024

Stomatology Hospital
2024

Sun Yat-sen University
2024

Hospital of Stomatology, Sun Yat-sen University
2024

Chongqing Jiaotong University
2023-2024

Northeastern University
2022-2024

Collaborative Innovation Centre for Advanced Ship and Deep-Sea Exploration
2023

The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature information media poor deployment environment have brought great risks to security wireless sensor networks, seriously restricting network. composed network faces threats mainly from Dos attack, replay integrity false routing flooding attack. In this paper, we proposed a new intrusion detection system based on<mml:math...

10.1155/2014/240217 article EN cc-by Journal of Electrical and Computer Engineering 2014-01-01

Communication networks play a critical role in smart grid, as the intelligence of grid is built based on information exchange across power grid. In transmission segments wired communications are usually adopted to ensure robustness backbone network. contrast, for distribution wireless provide many benefits such low cost high speed links, easy setup connections among different devices/appliances, and so on. Connecting equipment, devices, appliances through indispensable (SDG). However, more...

10.1109/tsg.2011.2167354 article EN IEEE Transactions on Smart Grid 2011-10-27

Web service is one of the key communications software services for Internet. phishing many security threats to web on aims steal private information, such as usernames, passwords, and credit card details, by way impersonating a legitimate entity. It will lead information disclosure property damage. This paper mainly focuses applying deep learning framework detect websites. first designs two types features phishing: original interaction features. A detection model based Deep Belief Networks...

10.1155/2018/4678746 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

An energy internet is a system that enables sharing in distribution such as the Internet. It has been attracting lot attention from both academia and industry. The main purpose of this paper to develop model an electric vehicle (EV) network transmit, distribute, store by EVs renewable sources places need energy. We describe EV detail then formulate optimization problem place charging stations internet. two solutions: one using greedy heuristic another based on diffusion. Simulation results...

10.1109/tvt.2016.2549269 article EN publisher-specific-oa IEEE Transactions on Vehicular Technology 2016-03-31

Black and gray hole attack is one kind of routing disturbing attacks can bring great damage to the network. As a result, an efficient algorithm detect black important. This paper demonstrates adaptive approach detecting in ad hoc network based on cross layer design. In layer, we proposed path-based method overhear next hop's action. scheme does not send out extra control packets saves system resources node. MAC collision rate reporting established estimate dynamic threshold so as lower false...

10.1109/aina.2010.143 article EN 2010-01-01

Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits highly complex network configuration. AMI shares information about consumption, outages, and electricity rates reliably efficiently by bidirectional communication between meters utilities. However, numerous being connected through mesh networks open new opportunities for attackers to interfere with communications compromise utilities assets or steal customers private information. In this paper, we...

10.1109/icc.2014.6883456 article EN 2014-06-01

Mobile ad hoc networks will often be deployed in environments where the nodes of are unattended and have little or no physical protection against tampering. The mobile thus susceptible to compromise. particularly vulnerable denial service (DOS) attacks launched through compromised intruders. In this paper, we present a new DOS attack its defense networks. attack, called flooding can result when used on-demand routing protocols for networks, such as AODV, DSR. intruder broadcasts mass Route...

10.1109/itcc.2005.248 article EN 2005-01-01

Due to volatile and rising energy prices, smart microgrids appear be increasingly popular. Instead of one centrally located power plant, the will rely on solar panels wind turbines every house sharing renewable among houses. How efficiently optimally share is a challenging problem. In order energy, routing protocols in data network are needed, which introduces another design challenge that how feasibly detect defend major attacks against for microgrids. Most existing secure other networks...

10.1109/smartgridcomm.2011.6102307 article EN 2011-10-01

Abstract As a new networking paradigm, opportunistic communications have great vision in animal migration tracking, mobile social networking, network remote areas and intelligent transportation, so on. Opportunistic networks are one of the evolutionary ad hoc networks, whose communication links often suffer from frequent disruption long delays. Therefore, many forwarding protocols present major security issues, design faces serious challenges such as how to effectively protect data...

10.1002/sec.1116 article EN Security and Communication Networks 2014-09-18

Energy is the most precious resource in wireless sensor networks. To ensure sustainable operations, systems need to harvest energy from environments. The time-varying environmental results dynamic change of system's available energy. Therefore, how dynamically schedule tasks match a challenging problem. In contrast traditional computing-oriented scheduling methods that focus on reducing computational consumption and meeting tasks' deadlines, we present DEOS, energy-oriented method, which...

10.1109/infcom.2012.6195625 article EN 2012-03-01

A mobile charging system (MCS) for electric vehicles (EVs) is presented in this paper. The proposed MCS has a 2-MWh energy storage capacity five EVs simultaneously with 75-kW individual rates. would be rechargeable from the available power substations (three phase, 480 V) 375-kW rate. appropriate modular interface designed and implemented between MCS, batteries of EVs, substations. Experimental validation paper to demonstrate performance effectiveness under rapid requirements.

10.1109/tia.2015.2469775 article EN IEEE Transactions on Industry Applications 2015-08-19

10.1016/j.jnca.2015.04.015 article EN publisher-specific-oa Journal of Network and Computer Applications 2015-05-20

Nowadays, Bitcoin has become the most popular cryptocurrency, which gains attention of investors and speculators alike. Asset pricing is a risky challenging activity that enchants lots shareholders. Indeed, difficulty in making predictions lies understanding multiple factors affect price trend. Modeling market behavior thus, sentiment ecosystem provides an insight into price. While there are significant studies investigate token economics based on network, limited research been performed to...

10.1109/ijcnn48605.2020.9206704 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2020-07-01

In junction traffic operations, vehicle delay is one of the most essential performance measures effectiveness. It allows engineers to assess a system component or efficacy system-wide control plan. Real-time applications such as adaptive signal control, congestion management, and dynamic assignment often use this technology. Obtaining real-time data on intersection performance, delay, may be time-consuming labor-intensive. This study presents new approach for estimating network-level from...

10.1109/access.2024.3349499 article EN cc-by-nc-nd IEEE Access 2024-01-01

AbstractWireless mesh networks is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. However, it particularly vulnerable due to features of open medium, changing topology, cooperative routing algorithms. The article surveys the state art security for wireless networks. First, we analyze various possible threats Second, introduce some representative solutions these threats, including problems key management, secure network routing,...

10.4103/0256-4602.58969 article EN IETE Technical Review 2010-01-01

Vehicle-to-grid provides a viable approach that feeds the battery energy stored in electric vehicles (EVs) back to power grid. Meanwhile, since EVs are mobile, can be easily transported from one place another. Based on these two observations, we introduce novel concept called EV network for transmission and distribution using EVs. We present concrete example illustrate usage of an network, then study optimization problem how deploy routers network. prove is NP-hard develop greedy heuristic...

10.1109/icc.2012.6364483 article EN 2012-06-01

Vehicle-to-Grid (V2G) technology utilizes the stored energy in electric vehicle batteries to contribute electricity back grid. The can move with vehicles (EVs). Combining V2G and mobility of vehicles, EVs provide a natural transmission architecture called mobile electrical main idea this paper focuses on multiple route grid from solar sources places as capacity every is limited. features are analyzed minimum cost flow algorithm presented. Simulations using real-world transporting data...

10.1109/isgt.2014.6816468 article EN 2014-02-01

Dramatically increasing travel demands and insufficient traffic facilities have induced severe congestion. High-occupancy toll (HOT) lane operation has been proposed as one of the most applicable acceptable countermeasures against freeway With balanced pricing vehicle occupancy constraints, HOT operations can realize optimal allocation enhance overall infrastructure efficiency. However, few previous studies concentrated on tolling strategies. Two major problems with inferior strategies...

10.3141/2065-08 article EN Transportation Research Record Journal of the Transportation Research Board 2008-01-01

Vehicle-to-Grid (V2G) is that the energy stored in batteries of electric vehicles can be utilized to send back power grid. And then, move with (EVs). Based on above characteristics, this paper introduces concept a mobile electrical grid and discusses routing problem. It focuses optimization problem how find routes from sources charge stations, especially, when some paths are clogged by traffic jam. A bipartite graph model used analyze route two algorithms presented compute minimal metric...

10.1109/mass.2013.43 article EN 2013-10-01
Coming Soon ...