supported by National Natural Science Foundation of China(Grant No.62103203);Natural Science Foundation of Tianjin(Grant No.22JCQNJC01440);General Terminal IC Interdisciplinary Science Center of Nankai University。
A gossip-based economic dispatch(ED)algorithm for microgrids is presented in this paper,designed to cope with communication link failures and enable smooth switching of microgrid operation modes.The algorithm is suppo...
supported by National Key R&D Program of China(Grant No.2020YFA0713901);National Natural Science Foundation of China(Grant Nos.61921006,62192783);Fundamental Research Funds for the Central Universities(Grant No.020214380108)。
Stochastic gradient descent(SGD)and its variants have been the dominating optimization methods in machine learning.Compared with SGD with small-batch training,SGD with large-batch training can better utilize the compu...
supported by Shenzhen Science and Technology Program (Grant No. JCYJ20200109143003935)。
Chiplet-based design, which breaks a system into multiple smaller dice(or “chiplets”) and reassembles them into a new system chip through advanced packaging, has received extensive attention in the post Moore's law ...
supported by Natural Science Fund of Hebei Province for Distinguished Young Scholars(Grant No.F2021202010);Science and Technology Project of Hebei Education Department(Grant No.JZX2023007);S&T Program of Hebei(Grant No.225676163GH).
Mobile telemedicine systems based on the next-generation communication will significantly enhance deep fusion of network automation and federated learning(FL),but data privacy is a paramount issue in sectors like heal...
supported in part by National Nature Science Foundation of China (Grant Nos. 62272091, 61872060);National Key R&D Program of China (Grant No. 2017YFB0802000)
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information.Subliminal channel attacks are one of the kleptographic attacks.In such attacks,backdoors ar...
This work was supported by National Natural Science Foundation of China(Grant No.52071298);Strategic Research and Consulting Project of Chinese Academy of Engineering(Grant No.2022HENYB05).
The Industrial Internet of Things(IIoT)enables enterprises to collect data from end devices and outsource the data to cloud servers for flexible data sharing.Public auditing plays an important role in ensuring the int...
supported by National Natural Science Foundation of China (Grant Nos.62373205,62033007);Taishan Scholars Project of Shandong Province of China (Grant Nos.tstp20230624,ts20190930);Taishan Scholars Climbing Program of Shandong Province of China。
We introduce a strategy matrix,a novel concept for ensuring controllability in game-based control systems(GBCSs).This graph-based condition is presented as an alternative to utilizing complex mathematical calculations...
supported by National Science Foundation of Zhejiang Province(Grant Nos.LY21F020011,LY20F020027,LY19F020003);Key Research and Development Program of Zhejiang Province(Grant No.2021C01162);National Natural Science Foundation of China(Grant No.61672459)。
Mashup developers often need to find open application programming interfaces(APIs)for their composition application development.Although most enterprises and service organizations have encapsulated their businesses or...
supported by National Natural Science Foundation of China (Grant No.12104314)。
6G technology with the four characteristics of an intelligent endogenous,secure endogenous,multi-domain convergence,and integrated computing network,will help society toward an intelligent era[1].The low power consump...
supported in part by China National Funds for Distinguished Young Scientists(Grant No.61825204);National Natural Science Foundation of China(Grant Nos.61932016,62132011,62202258);Beijing Outstanding Young Scientist Program(Grant No.BJJWZYJH01201910003011);China Postdoctoral Science Foundation(Grant No.2021M701894);China National Postdoctoral Program for Innovative Talents;Shuimu Tsinghua Scholar Program。
Distributed denial of service(DDoS)detection is still an open and challenging problem.In particular,sophisticated attacks,e.g.,attacks that disguise attack packets as benign traffic always appear,which can easily evad...