Jun Xiao
YOU?
Author Swipe
View article: The Combined Impacts of Carbon Border Adjustment Mechanisms on the Global Carbon Market and Major Economies: A GTAP Model Perspective
The Combined Impacts of Carbon Border Adjustment Mechanisms on the Global Carbon Market and Major Economies: A GTAP Model Perspective Open
Global carbon reduction targets have driven industries to implement emission reduction measures and accelerate industrial restructuring. To address carbon leakage in the steel sector, the EU introduced the Carbon Border Adjustment Mechanis…
View article: Collaborative Renewable Energy Resource Siting and Sizing Planning Method for Distribution and Sub-Transmission Networks
Collaborative Renewable Energy Resource Siting and Sizing Planning Method for Distribution and Sub-Transmission Networks Open
Existing methods plan the distribution network and sub-transmission network separately. This paper proposes a collaborative renewable energy resource siting and sizing planning method for distribution and sub-transmission networks to incre…
View article: Hunyuan3D Studio: End-to-End AI Pipeline for Game-Ready 3D Asset Generation
Hunyuan3D Studio: End-to-End AI Pipeline for Game-Ready 3D Asset Generation Open
The creation of high-quality 3D assets, a cornerstone of modern game development, has long been characterized by labor-intensive and specialized workflows. This paper presents Hunyuan3D Studio, an end-to-end AI-powered content creation pla…
View article: Shadowkube: enhancing Kubernetes security with behavioral monitoring and honeypot integration
Shadowkube: enhancing Kubernetes security with behavioral monitoring and honeypot integration Open
As cloud-native technologies continue to evolve, containerization and orchestration have become fundamental for deploying microservices. However, this advancement introduces significant security vulnerabilities, particularly due to vulnera…
View article: A stable geometry transformation module from 3D geometry data to building energy model
A stable geometry transformation module from 3D geometry data to building energy model Open
View article: Method for identifying error states of distribution network current transformers based on current imbalance weights
Method for identifying error states of distribution network current transformers based on current imbalance weights Open
Accurate identification of current transformer (CT) error states in distribution networks is critical for grid monitoring and ensuring fair power trade. This paper proposes an imbalance weight-based approach for CT error state identificati…
View article: Thought Purity: A Defense Framework For Chain-of-Thought Attack
Thought Purity: A Defense Framework For Chain-of-Thought Attack Open
While reinforcement learning-trained Large Reasoning Models (LRMs, e.g., Deepseek-R1) demonstrate advanced reasoning capabilities in the evolving Large Language Models (LLMs) domain, their susceptibility to security threats remains a criti…
View article: The latent mechanism behind binocular advantage in reading
The latent mechanism behind binocular advantage in reading Open
Most individuals read binocularly, and previous studies have found a binocular advantage in reading speed. However, the underlying mechanism of the binocular advantage in reading remains unclear. In our study, we quantified contributions f…
View article: Bias as a Virtue: Rethinking Generalization under Distribution Shifts
Bias as a Virtue: Rethinking Generalization under Distribution Shifts Open
Machine learning models often degrade when deployed on data distributions different from their training data. Challenging conventional validation paradigms, we demonstrate that higher in-distribution (ID) bias can lead to better out-of-dis…
View article: The work region and total work capability of integrated energy system: Concepts, models, and mechanisms
The work region and total work capability of integrated energy system: Concepts, models, and mechanisms Open
View article: Measurement error evaluation method for voltage transformers in distribution networks based on self-attention and graph convolutional networks
Measurement error evaluation method for voltage transformers in distribution networks based on self-attention and graph convolutional networks Open
Accurately evaluating the error of voltage transformers in distribution networks is crucial for the safe operation of power systems and the fairness of electricity trade. This paper uses the connection relationship between distribution tra…
View article: Anterograde interference in multitask perceptual learning
Anterograde interference in multitask perceptual learning Open
Learning to perform multiple tasks robustly is a crucial facet of human intelligence, yet its mechanisms remain elusive. Here, we formulated four hypotheses concerning task interactions and investigated them by analyzing training sequence …
View article: Error Analysis of the Convex Hull Method for the Solution of the Distribution System Security Region
Error Analysis of the Convex Hull Method for the Solution of the Distribution System Security Region Open
The convex hull method is a common approach for the solution of the distribution system security region (DSSR). For the first time, this paper identifies that this method is not applicable to solve many DSSRs. Firstly, the model of the DSS…
View article: High-Precision Physics Experiments at Huizhou Large-Scale Scientific Facilities
High-Precision Physics Experiments at Huizhou Large-Scale Scientific Facilities Open
In response to the capabilities presented by the High-Intensity Heavy Ion Accelerator Facility (HIAF) and the Accelerator-Driven Subcritical System (CiADS), as well as the proposed Chinese Advanced Nuclear Physics Research Facility (CNUF),…
View article: The total accommodation capability curve for a distribution network considering N-1 criterion
The total accommodation capability curve for a distribution network considering N-1 criterion Open
The total accommodation capability curve (TAC curve) can completely describe the DG accommodation capability of a distribution network. The urban distribution network generally adopts the security constraints under N-1 criterion, but the f…
View article: A planning method based on total supply capability for active distribution network
A planning method based on total supply capability for active distribution network Open
View article: Active power balance control of wind-photovoltaic-storage power system based on transfer learning double deep Q-network approach
Active power balance control of wind-photovoltaic-storage power system based on transfer learning double deep Q-network approach Open
Introduction This study addresses the challenge of active power (AP) balance control in wind-photovoltaic-storage (WPS) power systems, particularly in regions with a high proportion of renewable energy (RE) units. The goal is to effectivel…
View article: Collaborative Planning Method of Distribution Network and Sub-Transmission Network to Host Renewable Energy
Collaborative Planning Method of Distribution Network and Sub-Transmission Network to Host Renewable Energy Open
View article: Security Region of Stand-Alone Power Supply Systems
Security Region of Stand-Alone Power Supply Systems Open
View article: Speed-Up Method to Calculate Distribution System Security Region
Speed-Up Method to Calculate Distribution System Security Region Open
View article: Judgment theorem of security boundary for distribution systems
Judgment theorem of security boundary for distribution systems Open
Security boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The secu…
View article: Decoupling and dimension reduction method for distribution system security region
Decoupling and dimension reduction method for distribution system security region Open
The application of the security region methodology in a practical distribution system with large scale normally requires large computer memory and high computation time. To overcome this problem, this article proposes a decoupling and dime…
View article: Energy Circuit Security Region of Energy System: Concepts and Models
Energy Circuit Security Region of Energy System: Concepts and Models Open
View article: A feeder link planning method for total supply capability improvement of distribution network
A feeder link planning method for total supply capability improvement of distribution network Open
This study proposes a new feeder link planning method for the distribution network, which can improve total supply capability (TSC). Feeder links are the key component of distribution networks. They are of great significance to the TSC of …
View article: Geometric Property of Distribution System Security Region: Size and Shape
Geometric Property of Distribution System Security Region: Size and Shape Open
View article: Geometric Property of Distribution System Security Region: Size and Shape
Geometric Property of Distribution System Security Region: Size and Shape Open
View article: Total supply and accommodation capability curves for active distribution networks: Concept and model
Total supply and accommodation capability curves for active distribution networks: Concept and model Open
View article: Analysis of Distributed Generation Accommodation in Flexible Distribution Networks
Analysis of Distributed Generation Accommodation in Flexible Distribution Networks Open
This work proposes a method to analyze distributed generation (DG) accommodation in a flexible distribution network (FDN). Firstly, the DG-load matching degree is proposed to quantitatively describe the power balance degree of DG and load …
View article: Total Quadrant Security Region for Active Distribution Network with High Penetration of Distributed Generation
Total Quadrant Security Region for Active Distribution Network with High Penetration of Distributed Generation Open
The region-based method has been applied in transmission systems and traditional passive distribution systems without power sources. This paper proposes the model of total quadrant security region (TQSR) for active distribution networks (A…
View article: Parameter Identification Method Based on Mixed-Integer Quadratic Programming and Edge Computing in Power Internet of Things
Parameter Identification Method Based on Mixed-Integer Quadratic Programming and Edge Computing in Power Internet of Things Open
With the rapid development of power Internet of Things, its scale is becoming larger and larger. Many advanced applications depend on the accuracy of network model and state estimation, and the accuracy of network model and state estimatio…