supported in part by the Science and Technology Project of SGCC Technical report on multi-objective global optimal allocation model and strategy research of power trading in the new era under Grant No.SGZJ0000KXJS1900181.
The collusion among various generating units has been a problematic issue affecting the fairness and transparency of electricity markets.Therefore,it is of great significance to assess the potential of such collusion ...
This paper proposes a privacy-preserving algorithm to solve the average-consensus problem based on Shamir's secret shar-ing scheme,in which a network of agents reach an agreement on their states without exposing their...
jointly supported by National Key Research and Development Program of China (No.2016YFB0900100);National Natural Science Foundation of China (No.U1866206);Young Elite Scientists Sponsorship Program。
The increasing electric vehicle(EV) penetration in a distribution network triggers the need for EV charging coordination. This paper firstly proposes a hierarchical EV charging coordination model and an algorithm base...
This work is supported by the National Natural Science Foundation of China(Nos.61702236,61672270,61602216,61872181);Changzhou Sci&Tech Program(Grant No.CJ20179027).
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t...
supported by the National Natural Science Foundation of China under grant No.(U1636114, 61572521,61772550);Natural Science of Shaanxi Province of China under grant No.2018JM6078;Innovative Research Team in Engineering University of PAP (KYTD201805)
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c...
This work was supported partly by the National Basic Research 973 Program of China under Grant Nos. 2015CB358700 and 2014CB340304, the National Natural Science Foundation of China under Grant No. 61421003, and the Open Fund of the State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2017ZX-14.
In traditional crowdsourcing, workers are expected to provide independent answers to tasks so as to ensure the diversity of answers. However, recent studies show that the crowd is not a collection of independent worke...
supported by the National Natural Science Foundation of China(61402241;61572260;61373017;61572261;61472192);the Scientific&Technological Support Project of Jiangsu Province(BE2015702)
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co...
Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localizat...
the financial support from the Special Fund for Authors of National Excellent Doctoral Dissertation;China Ministry of Education Fund for Young Scholars in Humanities and Social Science
In this paper,we propose a political-economy model of China that explains both the rapid economic growth and frequent rate of accidents that have occurred in China.The central government delegates authority to the loc...
This work is supported by the National Natural Science Foundation of China (No.61170221), the National Key Basic Research Program of China (973 Program) (No.2007CB311106), and Beijing Municipal Natural Science Foundation (No.1102003).
The secure sum protocol is a useful basic protocol of Secure multiparty computation (SMC). And it has numerous applications. However traditional secure sum protocol can not guarantee the fairness. In addition, most ...