1,909 results on '"Su Zhou"'
Search Results
52. Effect of Surface Structure on Electrical Performance of Industrial Diamond Wire Sawing Multicrystalline Si Solar Cells
- Author
-
Shaoliang Wang, Xianfang Gou, Su Zhou, Junlin Huang, Qingsong Huang, Jialiang Qiu, Zheng Xu, and Honglie Shen
- Subjects
Renewable energy sources ,TJ807-830 - Abstract
We report industrial fabrication of different kinds of nanostructured multicrystalline silicon solar cells via normal acid texturing, reactive ion etching (RIE), and metal-assisted chemical etching (MACE) processes on diamond wire sawing wafer. The effect of different surface structure on reflectivity, lifetime, and electrical performance was systematically studied in this paper. The difference between industrial acid, RIE, and MACE textured multicrystalline silicon solar cells to our knowledge has not been investigated previously. The resulting efficiency indicates that low reflectivity surface structure with the size of 0.2–0.8 μm via RIE and MACE process do not always lead to low lifetime compared with acid texturing process. Both RIE and MACE process is promising candidate for high efficiency processes for future industrial diamond wire sawing multicrystalline silicon solar cells.
- Published
- 2018
- Full Text
- View/download PDF
53. Combating Advanced Persistent Threats: Challenges and Solutions
- Author
-
Wang, Yuntao, Liu, Han, Li, Zhendong, Su, Zhou, and Li, Jiliang
- Subjects
Computer Science - Cryptography and Security - Abstract
The rise of advanced persistent threats (APTs) has marked a significant cybersecurity challenge, characterized by sophisticated orchestration, stealthy execution, extended persistence, and targeting valuable assets across diverse sectors. Provenance graph-based kernel-level auditing has emerged as a promising approach to enhance visibility and traceability within intricate network environments. However, it still faces challenges including reconstructing complex lateral attack chains, detecting dynamic evasion behaviors, and defending smart adversarial subgraphs. To bridge the research gap, this paper proposes an efficient and robust APT defense scheme leveraging provenance graphs, including a network-level distributed audit model for cost-effective lateral attack reconstruction, a trust-oriented APT evasion behavior detection strategy, and a hidden Markov model based adversarial subgraph defense approach. Through prototype implementation and extensive experiments, we validate the effectiveness of our system. Lastly, crucial open research directions are outlined in this emerging field., Comment: This work has been accepted by IEEE NETWORK in April 2024. 9 pages, 5 figures, 1 table
- Published
- 2023
- Full Text
- View/download PDF
54. Mobile Metaverse: A Road Map from Metaverse to Metavehicles
- Author
-
Hui, Yilong, Zhao, Gaosheng, Cheng, Nan, Zhou, Haibo, and Su, Zhou
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
With the rapid development of communication technologies and extended reality (XR), the services and applications of the Metaverse are gradually entering our lives. However, the current development of the Metaverse provides users with services that are homogeneous with the user experience that the Internet has brought in the past, making them more like an extension of the Internet. In addition, as a mobile application carrier for the Metaverse, it is also worth considering how vehicles with diverse onboard components can develop in synergy with the Metaverse. In this article, we focus on the core of the Metaverse, namely user experience, and provide a road map from Metaverse to Metaverse vehicles (Metavehicles). Specifically, we first elaborate on six features of the Metaverse from the perspective of user experience and propose a hierarchical framework for the Metaverse based on the evolutionary logic of the features. Under the guidance of this framework, we discuss the empowerment of onboard components of Metavehicles on the development of the Metaverse, and analyze the service experience that Metavehicles can bring to two types of users, namely drivers and passengers. Finally, considering the differentiated development levels of Metaverse and autonomous driving, we further establish a hierarchical framework for Metavehicles from three aspects (i.e., enhance Metaverse, enhance driving experience, and enhance entertainment experience), providing an evolutionary path for the development of Metavehicles., Comment: 7 pages, 5 figures
- Published
- 2023
55. Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks
- Author
-
Wang, Zixuan, Li, Jiliang, Wang, Yuntao, Su, Zhou, Yu, Shui, and Meng, Weizhi
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
Advanced persistent threat (APT) is a kind of stealthy, sophisticated, and long-term cyberattack that has brought severe financial losses and critical infrastructure damages. Existing works mainly focus on APT defense under stable network topologies, while the problem under time-varying dynamic networks (e.g., vehicular networks) remains unexplored, which motivates our work. Besides, the spatiotemporal dynamics in defense resources, complex attackers' lateral movement behaviors, and lack of timely defense make APT defense a challenging issue under time-varying networks. In this paper, we propose a novel game-theoretical APT defense approach to promote real-time and optimal defense strategy-making under both periodic time-varying and general time-varying environments. Specifically, we first model the interactions between attackers and defenders in an APT process as a dynamic APT repair game, and then formulate the APT damage minimization problem as the precise prevention and control (PPAC) problem. To derive the optimal defense strategy under both latency and defense resource constraints, we further devise an online optimal control-based mechanism integrated with two backtracking-forward algorithms to fastly derive the near-optimal solution of the PPAC problem in real time. Extensive experiments are carried out, and the results demonstrate that our proposed scheme can efficiently obtain optimal defense strategy in 54481 ms under seven attack-defense interactions with 9.64$\%$ resource occupancy in stimulated periodic time-varying and general time-varying networks. Besides, even under static networks, our proposed scheme still outperforms existing representative APT defense approaches in terms of service stability and defense resource utilization.
- Published
- 2023
56. STAR-RIS Enhanced Joint Physical Layer Security and Covert Communications for Multi-antenna mmWave Systems
- Author
-
Xiao, Han, Hu, Xiaoyan, Li, Ang, Wang, Wenjie, Su, Zhou, Wong, Kai-Kit, and Yang, Kun
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the utilization of simultaneously transmitting and reflecting RIS (STAR-RIS) in supporting joint physical layer security (PLS) and covert communications (CCs) in a multi-antenna millimeter wave (mmWave) system, where the base station (BS) communicates with both covert and security users while defeating eavesdropping by wardens with the help of a STAR-RIS. Specifically, analytical derivations are performed to obtain the closed-form expression of warden's minimum detection error probability (DEP). Furthermore, the asymptotic result of the minimum DEP and the lower bound of the secure rates are derived, considering the practical assumption that BS only knows the statistical channel state information (CSI) between STAR-RIS and the wardens. Subsequently, an optimization problem is formulated with the aim of maximizing the average sum of the covert rate and the minimum secure rate while ensuring the covert requirement and quality of service (QoS) for legal users by jointly optimizing the active and passive beamformers. Due to the strong coupling among variables, an iterative algorithm based on the alternating strategy and the semi-definite relaxation (SDR) method is proposed to solve the non-convex optimization problem. Simulation results indicate that the performance of the proposed STAR-RIS-assisted scheme greatly surpasses that of the conventional RIS scheme, which validates the superiority of STAR-RIS in simultaneously implementing PLS and CCs.
- Published
- 2023
57. An Envy-Free Online UAV Charging Scheme with Vehicle-Mounted Mobile Wireless Chargers
- Author
-
Wang, Yuntao and Su, Zhou
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
In commercial unmanned aerial vehicle (UAV) applications, one of the main restrictions is UAVs' limited battery endurance when executing persistent tasks. With the mature of wireless power transfer (WPT) technologies, by leveraging ground vehicles mounted with WPT facilities on their proofs, we propose a mobile and collaborative recharging scheme for UAVs in an on-demand manner. Specifically, we first present a novel air-ground cooperative UAV recharging framework, where ground vehicles cooperatively share their idle wireless chargers to UAVs and a swarm of UAVs in the task area compete to get recharging services. Considering the mobility dynamics and energy competitions, we formulate an energy scheduling problem for UAVs and vehicles under practical constraints. A fair online auction-based solution with low complexity is also devised to allocate and price idle wireless chargers on vehicular proofs in real time. We rigorously prove that the proposed scheme is strategy-proof, envy-free, and produces stable allocation outcomes. The first property enforces that truthful bidding is the dominant strategy for participants, the second ensures that no user is better off by exchanging his allocation with another user when the auction ends, while the third guarantees the matching stability between UAVs and UGVs. Extensive simulations validate that the proposed scheme outperforms benchmarks in terms of energy allocation efficiency and UAV's utility., Comment: Accepted by China Communications in June 2023
- Published
- 2023
- Full Text
- View/download PDF
58. Neighborhood Combination Search for Single-Machine Scheduling with Sequence-Dependent Setup Time
- Author
-
Liu, Xiao-Lu, Xu, Hong-Yun, Chen, Jia-Ming, Su, Zhou-Xing, Lyu, Zhi-Peng, and Ding, Jun-Wen
- Published
- 2024
- Full Text
- View/download PDF
59. Circular RNA expression profiling of human granulosa cells during maternal aging reveals novel transcripts associated with assisted reproductive technology outcomes.
- Author
-
Jing Cheng, Jia Huang, Suzhen Yuan, Su Zhou, Wei Yan, Wei Shen, Yun Chen, Xi Xia, Aiyue Luo, Da Zhu, and Shixuan Wang
- Subjects
Medicine ,Science - Abstract
Circular RNAs (circRNAs) are a unique class of endogenous RNAs which could be used as potential diagnostic and prognostic biomarkers of many diseases. Our study aimed to investigate circRNA profiles in human granulosa cells (GCs) during maternal aging and to uncover age-related circRNA variations that potentially reflect decreased oocyte competence. CircRNAs in GCs from in vitro fertilization (IVF) patients with young age (YA, ≤ 30 years) and advanced age (AA, ≥ 38 years) were profiled by microarray, and validated in 20 paired samples. The correlation between circRNAs expression and clinical characteristics was analyzed in additional 80 samples. Chip-based analysis revealed 46 up-regulated and 11 down-regulated circRNAs in AA samples (fold change > 2.0). Specifically, circRNA_103829, circRNA_103827 and circRNA_104816 were validated to be up-regulated, while circRNA_101889 was down-regulated in AA samples. After adjustment for gonadotropin treatment, only circRNA_103827 and circRNA_104816 levels were positively associated with maternal age (partial r = 0.332, P = 0.045; partial r = 0.473, P = 0.003; respectively). Moreover, circRNA_103827 and circRNA_104816 expressions in GCs were negatively correlated with the number of top quality embryos (r = -0.235, P = 0.036; r = -0.221, P = 0.049; respectively). Receiver operating characteristic (ROC) curve analysis indicated that the performance of circRNA_103827 for live birth prediction reached 0.698 [0.570-0.825], with 77.2% sensitivity and 60.9% specificity (P = 0.006), and that of circRNA_104816 was 0.645 [0.507-0.783] (P = 0.043). Bioinformatics analysis revealed that both circRNAs were potentially involved in glucose metabolism, mitotic cell cycle, and ovarian steroidogenesis. Therefore, age-related up-regulation of circRNA_103827 and circRNA_104816 might be potential indicators of compromised follicular micro-environment which could be used to predict IVF prognosis, and improve female infertility management.
- Published
- 2017
- Full Text
- View/download PDF
60. A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions
- Author
-
Wang, Yuntao, Pan, Yanghe, Yan, Miao, Su, Zhou, and Luan, Tom H.
- Subjects
Computer Science - Computers and Society ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language - Abstract
With the widespread use of large artificial intelligence (AI) models such as ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is leading a paradigm shift in content creation and knowledge representation. AIGC uses generative large AI algorithms to assist or replace humans in creating massive, high-quality, and human-like content at a faster pace and lower cost, based on user-provided prompts. Despite the recent significant progress in AIGC, security, privacy, ethical, and legal challenges still need to be addressed. This paper presents an in-depth survey of working principles, security and privacy threats, state-of-the-art solutions, and future challenges of the AIGC paradigm. Specifically, we first explore the enabling technologies, general architecture of AIGC, and discuss its working modes and key characteristics. Then, we investigate the taxonomy of security and privacy threats to AIGC and highlight the ethical and societal implications of GPT and AIGC technologies. Furthermore, we review the state-of-the-art AIGC watermarking approaches for regulatable AIGC paradigms regarding the AIGC model and its produced content. Finally, we identify future challenges and open research directions related to AIGC., Comment: 20 pages, 6 figures, 4 tables
- Published
- 2023
- Full Text
- View/download PDF
61. SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework
- Author
-
Wang, Yuntao, Su, Zhou, Luan, Tom H., Li, Jiliang, Xu, Qichao, and Li, Ruidong
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
Due to the limited battery and computing resource, offloading unmanned aerial vehicles (UAVs)' computation tasks to ground infrastructure, e.g., vehicles, is a fundamental framework. Under such an open and untrusted environment, vehicles are reluctant to share their computing resource unless provisioning strong incentives, privacy protection, and fairness guarantee. Precisely, without strategy-proofness guarantee, the strategic vehicles can overclaim participation costs so as to conduct market manipulation. Without the fairness provision, vehicles can deliberately abort the assigned tasks without any punishments, and UAVs can refuse to pay by the end, causing an exchange dilemma. Lastly, the strategy-proofness and fairness provision typically require transparent payment/task results exchange under public audit, which may disclose sensitive information of vehicles and make the privacy preservation a foremost issue. To achieve the three design goals, we propose SEAL, an integrated framework to address strategy-proof, fair, and privacy-preserving UAV computation offloading. SEAL deploys a strategy-proof reverse combinatorial auction mechanism to optimize UAVs' task offloading under practical constraints while ensuring economic-robustness and polynomial-time efficiency. Based on smart contracts and hashchain micropayment, SEAL implements a fair on-chain exchange protocol to realize the atomic completion of batch payments and computing results in multi-round auctions. In addition, a privacy-preserving off-chain auction protocol is devised with the assistance of the trusted processor to efficiently protect vehicles' bid privacy. Using rigorous theoretical analysis and extensive simulations, we validate that SEAL can effectively prevent vehicles from manipulating, ensure privacy protection and fairness, improve the offloading efficiency., Comment: Accepted by IEEE Transactions on Information Forensics and Security (IEEE TIFS)
- Published
- 2023
62. Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
- Author
-
Wang, Yuntao, Su, Zhou, Xu, Qichao, Luan, Tom H., and Lu, Rongxing
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns in future AVs, in this paper, we develop SPAD, a secured framework to forbid free-riders and {promote trustworthy data dissemination} in collaborative autonomous driving. Specifically, we first introduce a publish/subscribe framework for inter-vehicle data transmissions{. To defend against free-riding attacks,} we formulate the interactions between publisher AVs and subscriber AVs as a vehicular publish/subscribe game, {and incentivize AVs to deliver high-quality data by analyzing the Stackelberg equilibrium of the game. We also design a reputation evaluation mechanism in the game} to identify malicious AVs {in disseminating fake information}. {Furthermore, for} lack of sufficient knowledge on parameters of {the} network model and user cost model {in dynamic game scenarios}, a two-tier reinforcement learning based algorithm with hotbooting is developed to obtain the optimal {strategies of subscriber AVs and publisher AVs with free-rider prevention}. Extensive simulations are conducted, and the results validate that our SPAD can effectively {prevent free-riders and enhance the dependability of disseminated contents,} compared with conventional schemes.
- Published
- 2023
- Full Text
- View/download PDF
63. Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning
- Author
-
Wang, Yabin, Hong, Xiaopeng, Ma, Zhiheng, Ma, Tiedong, Qin, Baoxing, and Su, Zhou
- Subjects
Computer Science - Robotics ,Computer Science - Artificial Intelligence - Abstract
Task allocation plays a vital role in multi-robot autonomous cleaning systems, where multiple robots work together to clean a large area. However, most current studies mainly focus on deterministic, single-task allocation for cleaning robots, without considering hybrid tasks in uncertain working environments. Moreover, there is a lack of datasets and benchmarks for relevant research. In this paper, to address these problems, we formulate multi-robot hybrid-task allocation under the uncertain cleaning environment as a robust optimization problem. Firstly, we propose a novel robust mixed-integer linear programming model with practical constraints including the task order constraint for different tasks and the ability constraints of hybrid robots. Secondly, we establish a dataset of \emph{100} instances made from floor plans, each of which has 2D manually-labeled images and a 3D model. Thirdly, we provide comprehensive results on the collected dataset using three traditional optimization approaches and a deep reinforcement learning-based solver. The evaluation results show that our solution meets the needs of multi-robot cleaning task allocation and the robust solver can protect the system from worst-case scenarios with little additional cost. The benchmark will be available at {https://github.com/iamwangyabin/Multi-robot-Cleaning-Task-Allocation}.
- Published
- 2023
64. A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
- Author
-
Wang, Yuntao, Su, Zhou, Guo, Shaolong, Dai, Minghui, Luan, Tom H., and Liu, Yiliang
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation, and efficient information aggregation for composite insights across vast physical/virtual entities. However, as IoDT incorporates various cutting-edge technologies to spawn the new ecology, severe known/unknown security flaws and privacy invasions of IoDT hinders its wide deployment. Besides, the intrinsic characteristics of IoDT such as \emph{decentralized structure}, \emph{information-centric routing} and \emph{semantic communications} entail critical challenges for security service provisioning in IoDT. To this end, this paper presents an in-depth review of the IoDT with respect to system architecture, enabling technologies, and security/privacy issues. Specifically, we first explore a novel distributed IoDT architecture with cyber-physical interactions and discuss its key characteristics and communication modes. Afterward, we investigate the taxonomy of security and privacy threats in IoDT, discuss the key research challenges, and review the state-of-the-art defense approaches. Finally, we point out the new trends and open research directions related to IoDT., Comment: 21 pages, 7 figures
- Published
- 2023
- Full Text
- View/download PDF
65. Social Metaverse: Challenges and Solutions
- Author
-
Wang, Yuntao, Su, Zhou, and Yan, Miao
- Subjects
Computer Science - Computers and Society - Abstract
Social metaverse is a shared digital space combining a series of interconnected virtual worlds for users to play, shop, work, and socialize. In parallel with the advances of artificial intelligence (AI) and growing awareness of data privacy concerns, federated learning (FL) is promoted as a paradigm shift towards privacy-preserving AI-empowered social metaverse. However, challenges including privacy-utility tradeoff, learning reliability, and AI model thefts hinder the deployment of FL in real metaverse applications. In this paper, we exploit the pervasive social ties among users/avatars to advance a social-aware hierarchical FL framework, i.e., SocialFL for a better privacy-utility tradeoff in the social metaverse. Then, an aggregator-free robust FL mechanism based on blockchain is devised with a new block structure and an improved consensus protocol featured with on/off-chain collaboration. Furthermore, based on smart contracts and digital watermarks, an automatic federated AI (FedAI) model ownership provenance mechanism is designed to prevent AI model thefts and collusive avatars in social metaverse. Experimental findings validate the feasibility and effectiveness of proposed framework. Finally, we envision promising future research directions in this emerging area., Comment: Accepted by Internet of Things Magazine in 23-May 2023
- Published
- 2023
- Full Text
- View/download PDF
66. Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning
- Author
-
Wang, Yuntao, Su, Zhou, Pan, Yanghe, Benslimane, Abderrahim, Liu, Yiliang, Luan, Tom H., and Li, Ruidong
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while the curator (i.e., aggregation server) aims to minimize the overall effect of added random noises for satisfactory model performance. To address this conflicting goal, we propose a novel dynamic privacy pricing (DyPP) game which allows DOs to sell individual privacy (by lowering the scale of locally added DP noise) for differentiated economic compensations (offered by the curator), thereby enhancing FL model utility. Considering multi-dimensional information asymmetry among players (e.g., DO's data distribution and privacy preference, and curator's maximum affordable payment) as well as their varying private information in distinct FL tasks, it is hard to directly attain the Nash equilibrium of the mixed-strategy DyPP game. Alternatively, we devise a fast reinforcement learning algorithm with two layers to quickly learn the optimal mixed noise-saving strategy of DOs and the optimal mixed pricing strategy of the curator without prior knowledge of players' private information. Experiments on real datasets validate the feasibility and effectiveness of the proposed scheme in terms of faster convergence speed and enhanced FL model utility with lower payment costs., Comment: Accepted by IEEE ICC2023
- Published
- 2023
67. Data Augmentation for Object Detection via Controllable Diffusion Models.
- Author
-
Haoyang Fang, Boran Han, Shuai Zhang, Su Zhou, Cuixiong Hu, and Wen-Ming Ye
- Published
- 2024
- Full Text
- View/download PDF
68. A Transformer-Based Condition Monitoring Method for UAV
- Author
-
Su, Zhou, Qi, Boxun, Wang, Benkuan, Liu, Datong, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Qu, Yi, editor, Gu, Mancang, editor, Niu, Yifeng, editor, and Fu, Wenxing, editor
- Published
- 2024
- Full Text
- View/download PDF
69. Social-Aware Clustered Federated Learning with Customized Privacy Preservation
- Author
-
Wang, Yuntao, Su, Zhou, Pan, Yanghe, Luan, Tom H, Li, Ruidong, and Yu, Shui
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. We unfold the design of SCFL in three steps.i) Stable social cluster formation. Considering users' heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping}. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants' model updates depending on social trust degrees. iii) Distributed convergence}. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection., Comment: This paper has been accepted by IEEE/ACM Transactions on Networking in March 2024
- Published
- 2022
- Full Text
- View/download PDF
70. Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference
- Author
-
Wang, Yabin, Ma, Zhiheng, Huang, Zhiwu, Wang, Yaowei, Su, Zhou, and Hong, Xiaopeng
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
This paper focuses on the prevalent performance imbalance in the stages of incremental learning. To avoid obvious stage learning bottlenecks, we propose a brand-new stage-isolation based incremental learning framework, which leverages a series of stage-isolated classifiers to perform the learning task of each stage without the interference of others. To be concrete, to aggregate multiple stage classifiers as a uniform one impartially, we first introduce a temperature-controlled energy metric for indicating the confidence score levels of the stage classifiers. We then propose an anchor-based energy self-normalization strategy to ensure the stage classifiers work at the same energy level. Finally, we design a voting-based inference augmentation strategy for robust inference. The proposed method is rehearsal free and can work for almost all continual learning scenarios. We evaluate the proposed method on four large benchmarks. Extensive results demonstrate the superiority of the proposed method in setting up new state-of-the-art overall performance. \emph{Code is available at} \url{https://github.com/iamwangyabin/ESN}., Comment: This is the accepted version of the Paper & Supp to appear in AAAI 2023. Please cite the final published version. Code is available at https://github.com/iamwangyabin/ESN
- Published
- 2022
71. A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
- Author
-
Wang, Yuntao, Su, Zhou, Xu, Qichao, Li, Ruidong, Luan, Tom H., and Wang, Pinghui
- Subjects
Computer Science - Multiagent Systems ,Computer Science - Computer Science and Game Theory - Abstract
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs during data transmissions due to the untrusted environment and open-access UAV networks. Moreover, UAVs typically have limited battery and computation capacity, making them unaffordable for heavy security provisioning operations when performing complicated rescue tasks. In this paper, we develop RescueChain, a secure and efficient information sharing scheme for UAV-assisted disaster rescue. Specifically, we first implement a lightweight blockchain-based framework to safeguard data sharing under disasters and immutably trace misbehaving entities. A reputation-based consensus protocol is devised to adapt the weakly connected environment with improved consensus efficiency and promoted UAVs' honest behaviors. Furthermore, we introduce a novel vehicular fog computing (VFC)-based off-chain mechanism by leveraging ground vehicles as moving fog nodes to offload UAVs' heavy data processing and storage tasks. To offload computational tasks from the UAVs to ground vehicles having idle computing resources, an optimal allocation strategy is developed by choosing payoffs that achieve equilibrium in a Stackelberg game formulation of the allocation problem. For lack of sufficient knowledge on network model parameters and users' private cost parameters in practical environment, we also design a two-tier deep reinforcement learning-based algorithm to seek the optimal payment and resource strategies of UAVs and vehicles with improved learning efficiency. Simulation results show that RescueChain can effectively accelerate consensus process, improve offloading efficiency, reduce energy consumption, and enhance user payoffs., Comment: Accepted by IEEE/ACM Transactions on Networking (ToN)
- Published
- 2022
72. Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach
- Author
-
Wang, Yuntao, Su, Zhou, Benslimane, Abderrahim, Xu, Qichao, Dai, Minghui, and Li, Ruidong
- Subjects
Electrical Engineering and Systems Science - Systems and Control ,Computer Science - Computer Science and Game Theory - Abstract
The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but also exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots offer a promising lightweight defense for actively protecting mobile Internet of things, particularly UAV networks. While previous research has primarily focused on honeypot system design and attack pattern recognition, the incentive issue for motivating UAV's participation (e.g., sharing trapped attack data in honeypots) to collaboratively resist distributed and sophisticated attacks remains unexplored. This paper proposes a novel game-theoretical collaborative defense approach to address optimal, fair, and feasible incentive design, in the presence of network dynamics and UAVs' multi-dimensional private information (e.g., valid defense data (VDD) volume, communication delay, and UAV cost). Specifically, we first develop a honeypot game between UAVs and the network operator under both partial and complete information asymmetry scenarios. The optimal VDD-reward contract design problem with partial information asymmetry is then solved using a contract-theoretic approach that ensures budget feasibility, truthfulness, fairness, and computational efficiency. In addition, under complete information asymmetry, we devise a distributed reinforcement learning algorithm to dynamically design optimal contracts for distinct types of UAVs in the time-varying UAV network. Extensive simulations demonstrate that the proposed scheme can motivate UAV's cooperation in VDD sharing and improve defensive effectiveness, compared with conventional schemes., Comment: Accepted Aug. 28, 2023 by IEEE Transactions on Information Forensics & Security. arXiv admin note: text overlap with arXiv:2209.13815
- Published
- 2022
73. Dimensional Deviations and Distortion Mechanism of Polymer Spur Gear Fabricated by Fused Deposition Modeling
- Author
-
Liu, Jian, Feng, Kanglong, Su, Zhou, Ren, Baoshen, and Liu, Yansong
- Published
- 2024
- Full Text
- View/download PDF
74. Pilot design of experiment study: effect of stirring duration and guest particle loading on electrostatic adsorption of Ti-6Al-4V composite powder formation
- Author
-
Ali, Mubasher, Tan, Yuanfu, Lin, Feng, Su, Zhou, Liao, Wei-Hsin, and Wong, Hay
- Published
- 2024
- Full Text
- View/download PDF
75. PID Testing Method Suitable for Process Control of Solar Cells Mass Production
- Author
-
Xianfang Gou, Xiaoyan Li, Su Zhou, Shaoliang Wang, Weitao Fan, and Qingsong Huang
- Subjects
Renewable energy sources ,TJ807-830 - Abstract
Voltage bias of several hundred volts which are applied between solar cells and module frames may lead to significant power losses, so-called potential-induced degradation (PID), in normal photovoltaic (PV) installations system. Modules and minimodules are used to conduct PID test of solar cells. The test procedure is time consuming and of high cost, which cannot be used as process monitoring method during solar cells fabrication. In this paper, three kinds of test including minimodule, Rsh, and V-Q test are conducted on solar cells or wafers with SiNx of different refractive index. All comparisons between test results of Rsh, V-Q, and minimodule tests have shown equal results. It is shown that Rsh test can be used as quality inspection of solar cells and V-Q test of coated wafer can be used as process control of solar cells.
- Published
- 2015
- Full Text
- View/download PDF
76. Intraovarian Transplantation of Female Germline Stem Cells Rescue Ovarian Function in Chemotherapy-Injured Ovaries.
- Author
-
Jiaqiang Xiong, Zhiyong Lu, Meng Wu, Jinjin Zhang, Jing Cheng, Aiyue Luo, Wei Shen, Li Fang, Su Zhou, and Shixuan Wang
- Subjects
Medicine ,Science - Abstract
Early menopause and infertility often occur in female cancer patients after chemotherapy (CTx). For these patients, oocyte/embryo cryopreservation or ovarian tissue cryopreservation is the current modality for fertility preservation. However, the above methods are limited in the long-term protection of ovarian function, especially for fertility preservation (very few females with cancer have achieved pregnancy with cryopreserved ovarian tissue or eggs until now). In addition, the above methods are subject to their scope (females with no husband or prepubertal females with no mature oocytes). Thus, many females who suffer from cancers would not adopt the above methods pre- and post-CTx due to their uncertainty, safety and cost-effectiveness. Therefore, millions of women have achieved long-term survival after thorough CTx treatment and have desired to rescue their ovarian function and fertility with economic, durable and reliable methods. Recently, some studies showed that mice with infertility caused by CTx can produce normal offspring through intraovarian injection of exogenous female germline stem cells (FGSCs). Though exogenous FGSC can be derived from mice without immune rejection in the same strain, it is difficult to obtain human female germline stem cells (hFGSCs), and immune rejection could occur between different individuals. In this study, infertility in mice was caused by CTx, and the ability of FGSCs to restore ovarian function or even produce offspring was assessed. We had successfully isolated and purified the FGSCs from adult female mice two weeks after CTx. After infection with GFP-carrying virus, the FGSCs were transplanted into ovaries of mice with infertility caused by CTx. Finally, ovarian function was restored and the recipients produced offspring long-term. These findings showed that mice with CTx possessed FGSCs, restoring ovarian function and avoiding immune rejection from exogenous germline stem cells.
- Published
- 2015
- Full Text
- View/download PDF
77. A Learning-based Honeypot Game for Collaborative Defense in UAV Networks
- Author
-
Wang, Yuntao, Su, Zhou, Benslimane, Abderrahim, Xu, Qichao, Dai, Minghui, and Li, Ruidong
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but it also exposes UAVs to various cyber threats. Low/medium-interaction honeypot is regarded as a promising lightweight defense to actively protect mobile Internet of things, especially UAV networks. Existing works primarily focused on honeypot design and attack pattern recognition, the incentive issue for motivating UAVs' participation (e.g., sharing trapped attack data in honeypots) to collaboratively resist distributed and sophisticated attacks is still under-explored. This paper proposes a novel game-based collaborative defense approach to address optimal, fair, and feasible incentive mechanism design, in the presence of network dynamics and UAVs' multi-dimensional private information (e.g., valid defense data (VDD) volume, communication delay, and UAV cost). Specifically, we first develop a honeypot game between UAVs under both partial and complete information asymmetry scenarios. We then devise a contract-theoretic method to solve the optimal VDD-reward contract design problem with partial information asymmetry, while ensuring truthfulness, fairness, and computational efficiency. Furthermore, under complete information asymmetry, we devise a reinforcement learning based distributed method to dynamically design optimal contracts for distinct types of UAVs in the fast-changing network. Experimental simulations show that the proposed scheme can motivate UAV's collaboration in VDD sharing and enhance defensive effectiveness, compared with existing solutions., Comment: Accepted by IEEE Globecom2022
- Published
- 2022
78. Semi-supervised Crowd Counting via Density Agency
- Author
-
Lin, Hui, Ma, Zhiheng, Hong, Xiaopeng, Wang, Yaowei, and Su, Zhou
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In this paper, we propose a new agency-guided semi-supervised counting approach. First, we build a learnable auxiliary structure, namely the density agency to bring the recognized foreground regional features close to corresponding density sub-classes (agents) and push away background ones. Second, we propose a density-guided contrastive learning loss to consolidate the backbone feature extractor. Third, we build a regression head by using a transformer structure to refine the foreground features further. Finally, an efficient noise depression loss is provided to minimize the negative influence of annotation noises. Extensive experiments on four challenging crowd counting datasets demonstrate that our method achieves superior performance to the state-of-the-art semi-supervised counting methods by a large margin. Code is available., Comment: This is the accepted version of the Paper & Supp to appear in ACM MM 2022. Please cite the final published version. Code is available at https://github.com/LoraLinH/Semi-supervised-Crowd-Counting-via-Density-Agency
- Published
- 2022
79. A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains
- Author
-
Wang, Yuntao, Peng, Haixia, Su, Zhou, Luan, Tom H, Benslimane, Abderrahim, and Wu, Yuan
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computer Science and Game Theory - Abstract
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing power originally wasted in solving hard but meaningless PoW puzzles to conduct practical federated learning (FL) tasks. Nevertheless, potential security threats and efficiency concerns may occur due to the untrusted environment and miners' self-interested features. In this paper, by devising a novel block structure, new transaction types, and credit-based incentives, PF-PoFL allows efficient artificial intelligence (AI) task outsourcing, federated mining, model evaluation, and reward distribution in a fully decentralized manner, while resisting spoofing and Sybil attacks. Besides, PF-PoFL equips with a user-level differential privacy mechanism for miners to prevent implicit privacy leakage in training FL models. Furthermore, by considering dynamic miner characteristics (e.g., training samples, non-IID degree, and network delay) under diverse FL tasks, a federation formation game-based mechanism is presented to distributively form the optimized disjoint miner partition structure with Nash-stable convergence. Extensive simulations validate the efficiency and effectiveness of PF-PoFL., Comment: Accepted by IEEE Journal on Selected Areas in Communications
- Published
- 2022
- Full Text
- View/download PDF
80. A novel stiffness optimization model of space telescopic boom based on locking mechanism
- Author
-
Xu, Kun, Zhuang, Xinghan, Su, Zhou, Lin, Qiuhong, Ren, Shouzhi, Xiao, Hang, and Ding, Xilun
- Published
- 2024
- Full Text
- View/download PDF
81. Simulating Spatiotemporal Dynamics of Sichuan Grassland Net Primary Productivity Using the CASA Model and In Situ Observations
- Author
-
Chuanjiang Tang, Xinyu Fu, Dong Jiang, Jingying Fu, Xinyue Zhang, and Su Zhou
- Subjects
Technology ,Medicine ,Science - Abstract
Net primary productivity (NPP) is an important indicator for grassland resource management and sustainable development. In this paper, the NPP of Sichuan grasslands was estimated by the Carnegie-Ames-Stanford Approach (CASA) model. The results were validated with in situ data. The overall precision reached 70%; alpine meadow had the highest precision at greater than 75%, among the three types of grasslands validated. The spatial and temporal variations of Sichuan grasslands were analyzed. The absorbed photosynthetic active radiation (APAR), light use efficiency (ε), and NPP of Sichuan grasslands peaked in August, which was a vigorous growth period during 2011. High values of APAR existed in the southwest regions in altitudes from 2000 m to 4000 m. Light use efficiency (ε) varied in the different types of grasslands. The Sichuan grassland NPP was mainly distributed in the region of 3000–5000 m altitude. The NPP of alpine meadow accounted for 50% of the total NPP of Sichuan grasslands.
- Published
- 2014
- Full Text
- View/download PDF
82. Continuous Temporal Graph Networks for Event-Based Graph Data
- Author
-
Guo, Jin, Han, Zhen, Su, Zhou, Li, Jiliang, Tresp, Volker, and Wang, Yuyi
- Subjects
Computer Science - Machine Learning - Abstract
There has been an increasing interest in modeling continuous-time dynamics of temporal graph data. Previous methods encode time-evolving relational information into a low-dimensional representation by specifying discrete layers of neural networks, while real-world dynamic graphs often vary continuously over time. Hence, we propose Continuous Temporal Graph Networks (CTGNs) to capture the continuous dynamics of temporal graph data. We use both the link starting timestamps and link duration as evolving information to model the continuous dynamics of nodes. The key idea is to use neural ordinary differential equations (ODE) to characterize the continuous dynamics of node representations over dynamic graphs. We parameterize ordinary differential equations using a novel graph neural network. The existing dynamic graph networks can be considered as a specific discretization of CTGNs. Experiment results on both transductive and inductive tasks demonstrate the effectiveness of our proposed approach over competitive baselines.
- Published
- 2022
83. Secrecy Outage Probability Fairness for Intelligent Reflecting Surface-Assisted Uplink Channel
- Author
-
Cheng, Xiangrui, Liu, Yiliang, Su, Zhou, and Wang, Wei
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates physical layer security (PLS) in the intelligent reflecting surface (IRS)-assisted multiple-user uplink channel. Since the instantaneous eavesdropper's channel state information (CSI) is unavailable, the secrecy rate can not be measured. In this case, existing investigations usually focus on the maximization of the minimum (max-min) of signal to interference plus noise power ratio (SINRs) among multiple users, and do not consider secrecy outage probability caused by eavesdroppers. In this paper, we first formulate the minimization of the maximum (min-max) secrecy outage probability among multiple users. The formulated problem is solved by alternately optimizing receiving matrix and phase shift matrix. Simulations demonstrate that the maximum secrecy outage probability is significantly reduced with the proposed algorithm compared to max-min SINR strategies, meaning our scheme has a higher security performance.
- Published
- 2022
84. Minimization of Secrecy Outage Probability in Reconfigurable Intelligent Surface-Assisted MIMOME System
- Author
-
Liu, Yiliang, Su, Zhou, Zhang, Chi, and Chen, Hsiao-Hwa
- Subjects
Computer Science - Information Theory - Abstract
This article investigates physical layer security (PLS) in reconfigurable intelligent surface (RIS)-assisted multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) channels. Existing researches ignore the problem that secrecy rate can not be calculated if the eavesdropper's instantaneous channel state information (CSI) is unknown. Furthermore, without the secrecy rate expression, beamforming and phase shifter optimization with the purpose of PLS enhancement is not available. To address these problems, we first give the expression of secrecy outage probability for any beamforming vector and phase shifter matrix as the RIS-assisted PLS metric, which is measured based on the eavesdropper's statistical CSI. Then, with the aid of the expression, we formulate the minimization problem of secrecy outage probability that is solved via alternately optimizing beamforming vectors and phase shift matrices. In the case of single-antenna transmitter or single-antenna legitimate receiver, the proposed alternating optimization (AO) scheme can be simplified to reduce computational complexity. Finally, it is demonstrated that the secrecy outage probability is significantly reduced with the proposed methods compared to current RIS-assisted PLS systems.
- Published
- 2022
85. Characterization of volatile compounds and sensory properties of spine grape (Vitis davidii Foex) brandies aged with different toasted wood chips
- Author
-
Duan, Bingbing, Chang, Wei, Zhang, Leqi, Zheng, Mingyuan, Su-Zhou, Chenxing, Merkeryan, Hasmik, Xu, Meilong, and Liu, Xu
- Published
- 2024
- Full Text
- View/download PDF
86. Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things
- Author
-
Liu, Yiliang, Su, Zhou, and Wang, Yuntao
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper investigates computation offloading in blockchain-empowered Internet of Things (IoT), where the task data uploading link from sensors to a base station (BS) is protected by intelligent reflecting surface (IRS)-assisted physical layer security (PLS). After receiving task data, the BS allocates computational resources provided by mobile edge computing (MEC) servers to help sensors perform tasks. Existing blockchain-based computation offloading schemes usually focus on network performance improvements, such as energy consumption minimization or latency minimization, and neglect the Gas fee for computation offloading, resulting in the dissatisfaction of high Gas providers. Also, the secrecy rate during the data uploading process can not be measured by a steady value because of the time-varying characteristics of IRS-based wireless channels, thereby computational resources allocation with a secrecy rate measured before data uploading is inappropriate. In this paper, we design a Gas-oriented computation offloading scheme that guarantees a low degree of dissatisfaction of sensors, while reducing energy consumption. Also, we deduce the ergodic secrecy rate of IRS-assisted PLS transmission that can represent the global secrecy performance to allocate computational resources. The simulations show that the proposed scheme has lower energy consumption compared to existing schemes, and ensures that the node paying higher Gas gets stronger computational resources., Comment: arXiv admin note: text overlap with arXiv:2203.01621
- Published
- 2022
87. Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions
- Author
-
Wang, Yuntao, Su, Zhou, Zhang, Ning, and Li, Ruidong
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Computer Science and Game Theory - Abstract
Unmanned aerial vehicles (UAVs) can help facilitate cost-effective and flexible service provisioning in future smart cities. Nevertheless, UAV applications generally suffer severe flight time limitations due to constrained onboard battery capacity, causing a necessity of frequent battery recharging or replacement when performing persistent missions. Utilizing wireless mobile chargers, such as vehicles with wireless charging equipment for on-demand self-recharging has been envisioned as a promising solution to address this issue. In this article, we present a comprehensive study of \underline{v}ehicle-assisted \underline{w}ireless rechargeable \underline{U}AV \underline{n}etworks (VWUNs) to promote on-demand, secure, and efficient UAV recharging services. Specifically, we first discuss the opportunities and challenges of deploying VWUNs and review state-of-the-art solutions in this field. We then propose a secure and privacy-preserving VWUN framework for UAVs and ground vehicles based on differential privacy (DP). Within this framework, an online double auction mechanism is developed for optimal charging scheduling, and a two-phase DP algorithm is devised to preserve the sensitive bidding and energy trading information of participants. Experimental results demonstrate that the proposed framework can effectively enhance charging efficiency and security. Finally, we outline promising directions for future research in this emerging field., Comment: Accepted by IEEE Communication Magazine
- Published
- 2022
- Full Text
- View/download PDF
88. A Survey on Metaverse: Fundamentals, Security, and Privacy
- Author
-
Wang, Yuntao, Su, Zhou, Zhang, Ning, Xing, Rui, Liu, Dongxiao, Luan, Tom H., and Shen, Xuemin
- Subjects
Computer Science - Cryptography and Security - Abstract
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, severe privacy invasions and security breaches (inherited from underlying technologies or emerged in the new digital ecology) of metaverse can impede its wide deployment. At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive realism, hyper spatiotemporality, sustainability, and heterogeneity. In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. Finally, we draw open research directions for building future metaverse systems., Comment: 32 pages, 17 figures, 11 tables. Accepted by IEEE Communications Surveys & Tutorials, 2022
- Published
- 2022
- Full Text
- View/download PDF
89. Endogenous Security of Computation Offloading in Blockchain-Empowered Internet of Things
- Author
-
Liu, Yiliang, Su, Zhou, and Yu, Bobo
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper investigates an endogenous security architecture for computation offloading in the Internet of Things (IoT), where the blockchain technology enables the traceability of malicious behaviors, and the task data uploading link from sensors to small base station (SBS) is protected by intelligent reflecting surface (IRS)-assisted physical layer security (PLS). After receiving task data, the SBS allocates computational resources to help sensors perform the task. The existing computation offloading schemes usually focus on network performance improvement, such as energy consumption minimization, and neglect the Gas fee paid by sensors, resulting in the discontent of high Gas payers. Here, we design a Gas-oriented computation offloading scheme that guarantees the degree of satisfaction of sensors, while aiming to reduce energy consumption. Also, we deduce the ergodic secrecy rate of IRS-assisted PLS transmission that can represent the global secrecy performance to allocate computational resources. The simulations show that the proposed scheme ensures that the node paying higher Gas gets stronger computational resources, and just raises $4\%$ energy consumption in comparison with energy consumption minimization schemes.
- Published
- 2022
90. Effect of Subgrains on the Performance of Mono-Like Crystalline Silicon Solar Cells
- Author
-
Su Zhou, Chunlan Zhou, Wenjing Wang, Yehua Tang, Jingwei Chen, Baojun Yan, and Yan Zhao
- Subjects
Renewable energy sources ,TJ807-830 - Abstract
The application of Czochralski (Cz) monocrystalline silicon material in solar cells is limited by its high cost and serious light-induced degradation. The use of cast multicrystalline silicon is also hindered by its high dislocation densities and high surface reflectance after texturing. Mono-like crystalline silicon is a promising material because it has the advantages of both mono- and multicrystalline silicon. However, when mono-like wafers are made into cells, the efficiencies of a batch of wafers often fluctuate within a wide range of >1% (absolute). In this work, mono-like wafers are classified by a simple process and fabricated into laser doping selective emitter cells. The effect and mechanism of subgrains on the performance of mono-like crystalline silicon solar cells are studied. The results show that the efficiency of mono-like crystalline silicon solar cells significantly depends on material defects that appear as subgrains on an alkaline textured surface. These subgrains have an almost negligible effect on the optical performance, shunt resistance, and junction recombination but significantly affect the minority carrier diffusion length and quantum efficiency within a long wavelength range. Finally, an average efficiency of 18.2% is achieved on wafers with hardly any subgrain but with a small-grain band.
- Published
- 2013
- Full Text
- View/download PDF
91. High-pressure capacity expansion and water injection mechanism and indicator curve model for fractured-vuggy carbonate reservoirs
- Author
-
Chen, Lixin, Jia, Chengzao, Zhang, Rujie, Yue, Ping, Jiang, Xujian, Wang, Junfang, Su, Zhou, Xiao, Yun, and Lv, Yuan
- Published
- 2024
- Full Text
- View/download PDF
92. Exogenous application of sucrose promotes the repartitioning of anthocyanin and proanthocyanidin in ‘Cabernet Sauvignon’ grapevine berries
- Author
-
Duan, Bingbing, Zheng, Mingyuan, Li, Jiayi, Zhang, Jiajing, Su-Zhou, Chenxing, Li, Yashan, Merkeryan, Hasmik, and Liu, Xu
- Published
- 2024
- Full Text
- View/download PDF
93. Study on laser spot size measurement by scanning-slit method based on back-injection interferometry
- Author
-
Tan, Yuanfu, Ali, Mubasher, Lin, Feng, Su, Zhou, Liao, Wei-Hsin, and Wong, Hay
- Published
- 2024
- Full Text
- View/download PDF
94. Futuristic Intelligent Transportation System
- Author
-
Hui, Yilong, Su, Zhou, Luan, Tom H., and Cheng, Nan
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The emerging autonomous vehicles (AVs) will inevitably revolutionize the transportation systems. This is because of a key feature of AVs; instead of being managed by human drivers as the conventional vehicles, AVs are of the complete capability to manage the driving by themselves. As a result, the futuristic intelligent transportation system (FITS) can be a centrally managed and optimized system with the fully coordinated driving of vehicles, which is impossible by the current transportation systems controlled by humans. In this article, we envision the operation of such FITS when AVs, advanced vehicular networks (VANETs) and artificial intelligence (AI) are adopted. Specifically, we first develop the autonomous vehicular networks (AVNs) based on the advanced development of AVs and heterogeneous vehicular communication technologies to achieve global data collection and real-time data sharing. With this network architecture, we then integrate AVNs and AI based on the intelligent digital twin (IDT) to design the FITS with the target of setting up an accurate and efficient global traffic scheduling system. After that, compared with the conventional schemes, a customized path planning case is studied to evaluate the performance of the proposed FITS. Finally, we highlight the emerging issues related to the FITS for future research.
- Published
- 2021
95. Development and printability of diamond-containing composite filament for material extrusion
- Author
-
Su, Zhou, Kong, Xiangwang, He, Tao, Wu, Dongyu, Wu, Jingjing, and Zhang, Shaohe
- Published
- 2023
- Full Text
- View/download PDF
96. AutoGluon-Multimodal (AutoMM): Supercharging Multimodal AutoML with Foundation Models.
- Author
-
Zhiqiang Tang, Haoyang Fang, Su Zhou, Taojiannan Yang, Zihan Zhong, Tony Hu, Katrin Kirchhoff, and George Karypis
- Published
- 2024
- Full Text
- View/download PDF
97. SMRSTORE: A Storage Engine for Cloud Object Storage on HM-SMR Drives.
- Author
-
Su Zhou, Erci Xu, Hao Wu, Yu Du, Jiacheng Cui, Wanyu Fu, Chang Liu, Yingni Wang, Wenbo Wang, Shouqu Sun, Xianfei Wang, Bo Feng, Biyun Zhu, Xin Tong, Weikang Kong, Linyan Liu, Zhongjie Wu, Jinbo Wu, Qingchao Luo, and Jiesheng Wu
- Published
- 2023
98. Design and Analysis of Space Extra Long Deployable Telescopic Boom Based on Cable Drive
- Author
-
Su, Zhou, Li, Lin, Lin, Qiuhong, Ma, Jingya, Li, Duanling, Cong, Qiang, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Yang, Huayong, editor, Liu, Honghai, editor, Zou, Jun, editor, Yin, Zhouping, editor, Liu, Lianqing, editor, Yang, Geng, editor, Ouyang, Xiaoping, editor, and Wang, Zhiyong, editor
- Published
- 2023
- Full Text
- View/download PDF
99. Multi-UAV Network Logistics Task Allocation Algorithm Based on Mean-Field-Type Game
- Author
-
Hu, Yao, Su, Zhou, Xu, Qichao, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Pires, Ivan Miguel, editor, Zdravevski, Eftim, editor, and Garcia, Nuno Cruz, editor
- Published
- 2023
- Full Text
- View/download PDF
100. ZIF-67 derived high stability CoNi2S4/carbon/MXene composites as an enhanced electrode for asymmetric supercapacitor
- Author
-
Jiao, Lidong, Zhao, Mingshu, Su, Zhou, Shi, Mangmang, Li, Min, and Li, Feng
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.