Jiankun Hu
YOU?
Author Swipe
View article: Optimization of Electricity–Carbon Coordinated Scheduling Process for Virtual Power Plants Based on an Improved Snow Ablation Optimizer Algorithm
Optimization of Electricity–Carbon Coordinated Scheduling Process for Virtual Power Plants Based on an Improved Snow Ablation Optimizer Algorithm Open
Given the strong coupling between electricity flow and carbon flow, promoting the low-carbon transformation of the energy sector is a crucial measure to actively responding to climate challenges. As a pivotal hub linking the electricity ma…
View article: A wear-resistant coating with combined mechanical and antifouling properties for potential underwater cleaning applications
A wear-resistant coating with combined mechanical and antifouling properties for potential underwater cleaning applications Open
Introduction Silicone-based low-surface-energy antifouling coatings are environmentally friendly, but their widespread application is hindered by the inherent challenge of achieving a balance between mechanical durability and antifouling e…
View article: SDN-MG25: A Comprehensive Dataset for Cybersecurity Analysis in Software Defined Networking-Enabled Microgrid Systems
SDN-MG25: A Comprehensive Dataset for Cybersecurity Analysis in Software Defined Networking-Enabled Microgrid Systems Open
Software Defined Network (SDN) has been widely used in modern network architecture. The integration of SDN into microgrid communication infrastructures offers enhanced flexibility, yet also introduces attack surfaces. As critical component…
View article: An IoT Integrated Polymeric Nanocomposite Membranes for Smart Produced Water
An IoT Integrated Polymeric Nanocomposite Membranes for Smart Produced Water Open
View article: Interval Carbon Price Prediction Based on Deep Error Correction and Bivariate Kernel Density Estimation
Interval Carbon Price Prediction Based on Deep Error Correction and Bivariate Kernel Density Estimation Open
The core value of carbon price forecasting lies in reducing uncertainty in carbon markets and promoting the transition to a low-carbon economy. Although significant progress has been made in current carbon price forecasting models, challen…
View article: Enhancing Port Shipping Synergy Through Bayesian Network: A Case of Major Chinese Ports
Enhancing Port Shipping Synergy Through Bayesian Network: A Case of Major Chinese Ports Open
Port shipping collaboration is vital to greener, more resilient trade, yet decisions remain siloed and uncertain. This study develops a Bayesian network model grounded in empirical data from major Chinese ports, aiming to systematically an…
View article: A survey on resilient microgrid system from cybersecurity perspective
A survey on resilient microgrid system from cybersecurity perspective Open
View article: U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition
U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition Open
Biometrics-based authentication mechanisms can address the built-in weakness of conventional password or token-based authentication in identifying genuine users. However, 2D-based fingerprint biometrics authentication faces the problem of …
View article: Simulation of potential suitable areas and analysis of natural reserves for four species of Taxus in southern China
Simulation of potential suitable areas and analysis of natural reserves for four species of Taxus in southern China Open
Introduction In southern China, four species of the Taxus genus are distributed, and identifying their suitable habitats plays an important role in species conservation. Methods This study used the MaxEnt model to simulate and predict the …
View article: U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition
U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition Open
Biometrics-based authentication mechanisms can address the built-in weakness of conventional password or token-based authentication in identifying genuine users. However, 2D-based fingerprint biometrics authentication faces the problem of …
View article: Battery SOH Prediction Under Different Conditions via MBLSTM and iTransformer With Anomaly Detection and Explainability
Battery SOH Prediction Under Different Conditions via MBLSTM and iTransformer With Anomaly Detection and Explainability Open
View article: UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems Open
One of the major challenges of microgrid systems is the lack of comprehensive Intrusion Detection System (IDS) datasets specifically for realistic microgrid systems' communication. To address the unavailability of comprehensive IDS dataset…
View article: A B-Spline Function Based 3D Point Cloud Unwrapping Scheme for 3D Fingerprint Recognition and Identification
A B-Spline Function Based 3D Point Cloud Unwrapping Scheme for 3D Fingerprint Recognition and Identification Open
A three-dimensional (3D) fingerprint recognition and identification system offers several advantages: in addition to sharing the hygiene property of a 2D contactless fingerprint system in reducing the risk of contamination, it offers an ex…
View article: A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids
A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids Open
This article provides a comprehensive survey on the application of machine learning techniques for detecting False Data Injection Attacks (FDIA) in smart grids. It introduces a novel taxonomy categorizing detection methods based on key cri…
View article: Guest Editorial: Security and Privacy of Cyber‐Physical System
Guest Editorial: Security and Privacy of Cyber‐Physical System Open
View article: A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy
A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy Open
View article: GHOSTForge: A Scalable Consensus Mechanism for DAG-Based Blockchains
GHOSTForge: A Scalable Consensus Mechanism for DAG-Based Blockchains Open
View article: Efficient transfer attacks via enhancing perturbation robustness
Efficient transfer attacks via enhancing perturbation robustness Open
With the rapid development of deep learning technology, artificial intelligence (AI) has found wide applications in diverse domains such as image classification, text processing, and autonomous driving. However, the increasing prevalence o…
View article: SimInversion: A Simple Framework for Inversion-Based Text-to-Image Editing
SimInversion: A Simple Framework for Inversion-Based Text-to-Image Editing Open
Diffusion models demonstrate impressive image generation performance with text guidance. Inspired by the learning process of diffusion, existing images can be edited according to text by DDIM inversion. However, the vanilla DDIM inversion …
View article: Text-Guided Mixup Towards Long-Tailed Image Categorization
Text-Guided Mixup Towards Long-Tailed Image Categorization Open
In many real-world applications, the frequency distribution of class labels for training data can exhibit a long-tailed distribution, which challenges traditional approaches of training deep neural networks that require heavy amounts of ba…
View article: A B-Spline Function based 3D Point Cloud Flattening Scheme for 3D Fingerprint Recognition and Identification
A B-Spline Function based 3D Point Cloud Flattening Scheme for 3D Fingerprint Recognition and Identification Open
3D fingerprint-based recognition and identification have several advantages compared to conventional 2D recognition systems. It is hygienic and secure due to its contactless sample collection. In addition to surface pattern, depth, curvatu…
View article: Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor
Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor Open
Existing fuzzy extractors and similar methods provide an effective way for extracting a secret key from a user's biometric data, but are susceptible to impersonation attack: once a valid biometric sample is captured, the scheme is no longe…
View article: Wireless Power Transfer Technologies, Applications, and Future Trends: A Review
Wireless Power Transfer Technologies, Applications, and Future Trends: A Review Open
Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning…
View article: Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation
Toward Verification of DAG-Based Distributed Ledger Technologies through Discrete-Event Simulation Open
As the potential of directed acyclic graph (DAG)-based distributed ledgers in IoT systems unfolds, a need arises to understand their intricate dynamics in real-world scenarios. It is well known that discrete event simulations can provide h…
View article: Feature extraction and learning approaches for cancellable biometrics: A survey
Feature extraction and learning approaches for cancellable biometrics: A survey Open
Biometric recognition is a widely used technology for user authentication. In the application of this technology, biometric security and recognition accuracy are two important issues that should be considered. In terms of biometric securit…
View article: Analyzing temporal coherence for deepfake video detection
Analyzing temporal coherence for deepfake video detection Open
Current facial image manipulation techniques have caused public concerns while achieving impressive quality. However, these techniques are mostly bound to a single frame for synthesized videos and pay little attention to the most discrimin…
View article: Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud Open
Cloud service models intrinsically cater to multiple tenants. In current multi-tenancy model, cloud service providers isolate data within a single tenant boundary with no or minimum cross-tenant interaction. With the booming of cloud appli…
View article: Ferroptosis at the nexus of metabolism and metabolic diseases
Ferroptosis at the nexus of metabolism and metabolic diseases Open
Ferroptosis, an iron-dependent form of regulated cell death, is emerging as a crucial regulator of human physiology and pathology. Increasing evidence showcases a reciprocal relationship between ferroptosis and dysregulated metabolism, pro…
View article: Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation Open
Lossless data hiding in ciphertexts (LDH-CT) is to perform data embedding without changing their plaintexts, which can be used to transmit extra data in the applications of homomorphic encryption at little cost. In this paper, two LDH-CT a…
View article: A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems Open
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity. Information abou…