skip to main content


Search for: All records

Creators/Authors contains: "Zheng, Jun"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available December 1, 2024
  2. In urban environments, tall buildings or structures can pose limits on the direct channel link between a base station (BS) and an Internet-of-Thing device (IoTD) for wireless communication. Unmanned aerial vehicles (UAVs) with a mounted reconfigurable intelligent surface (RIS), denoted as UAV-RIS, have been introduced in recent works to enhance the system throughput capacity by acting as a relay node between the BS and the IoTDs in wireless access networks. Uncoordinated UAVs or RIS phase shift elements will make unnecessary adjustments that can significantly impact the signal transmission to IoTDs in the area. The concept of age of information (AoI) is proposed in wireless network research to categorize the freshness of the received update message. To minimize the average sum of AoI (ASoA) in the network, two model-free deep reinforcement learning (DRL) approaches – Off-Policy Deep Q-Network (DQN) and On-Policy Proximal Policy Optimization (PPO) – are developed to solve the problem by jointly optimizing the RIS phase shift, the location of the UAV-RIS, and the IoTD transmission scheduling for large-scale IoT wireless networks. Analysis of loss functions and extensive simulations is performed to compare the stability and convergence performance of the two algorithms. The results reveal the superiority of the On-Policy approach, PPO, over the Off-Policy approach, DQN, in terms of stability, convergence speed, and under diverse environment settings 
    more » « less
  3. Smart appliances’ run schedule and electric vehicles charging can be managed over a smart grid enabled home area network (HAN) to reduce electricity demand at critical times and add more plug-in electric vehicles to the grid, which eventually lower customers’ energy bills and reduce greenhouse gas emissions. Short range radio-based wireless communication technologies commonly adopted in a HAN are vulnerable to cyber attacks due to their wide interception range. In this work, a low-cost solution is proposed for securing the low-volume data exchange of sensitive tasks (e.g., key management and mutual authentication). Our approach utilizes the emerging concept of retro-reflector based visible light communication (Retro-VLC), where smart appliances, IoT sensors and other electric devices perform the sensitive data exchange with the HAN gateway via the secure Retro-VLC channel. To conduct the feasibility study, a multi-pixel Retro-VLC link is prototyped to enable quadrature amplitude modulation. The bit error rate of Retro-VLC is studied analytically, numerically and experimentally. A heterogeneous Retro-VLC + WLAN connection is implemented by socket programming. In addition, the working range, sniffing range, and key exchange latency are measured. The results validate the applicability of the Retro-VLC based solution. 
    more » « less
  4. Abstract

    As one of the least understood aerosol processes, nucleation can be a dominant source of atmospheric aerosols. Sulfuric acid (SA)-amine binary nucleation with dimethylamine (DMA) has been recognized as a governing mechanism in the polluted continental boundary layer. Here we demonstrate the importance of trimethylamine (TMA) for nucleation in the complex atmosphere and propose a molecular-level SA-DMA-TMA ternary nucleation mechanism as an improvement upon the conventional binary mechanism. Using the proposed mechanism, we could connect the gaseous amines to the SA-amine cluster signals measured in the atmosphere of urban Beijing. Results show that TMA can accelerate the SA-DMA-based new particle formation in Beijing by 50–100%. Considering the global abundance of TMA and DMA, our findings imply comparable importance of TMA and DMA to nucleation in the polluted continental boundary layer, with probably higher contributions from TMA in polluted rural environments and future urban environments with controlled DMA emissions.

     
    more » « less
  5. User authentication plays an important role in securing systems and devices by preventing unauthorized accesses. Although surface Electromyogram (sEMG) has been widely applied for human machine interface (HMI) applications, it has only seen a very limited use for user authentication. In this paper, we investigate the use of multi-channel sEMG signals of hand gestures for user authentication. We propose a new deep anomaly detection-based user authentication method which employs sEMG images generated from multi-channel sEMG signals. The deep anomaly detection model classifies the user performing the hand gesture as client or imposter by using sEMG images as the input. Different sEMG image generation methods are studied in this paper. The performance of the proposed method is evaluated with a high-density hand gesture sEMG (HD-sEMG) dataset and a sparse-density hand gesture sEMG (SD-sEMG) dataset under three authentication test scenarios. Among the sEMG image generation methods, root mean square (RMS) map achieves significantly better performance than others. The proposed method with RMS map also greatly outperforms the reference method, especially when using SD-sEMG signals. The results demonstrate the validity of the proposed method with RMS map for user authentication. 
    more » « less
  6. User authentication is an important security mechanism to prevent unauthorized accesses to systems or devices. In this paper, we propose a new user authentication method based on surface electromyogram (sEMG) images of hand gestures and deep anomaly detection. Multi-channel sEMG signals acquired during the user performing a hand gesture are converted into sEMG images which are used as the input of a deep anomaly detection model to classify the user as client or imposter. The performance of different sEMG image generation methods in three authentication test scenarios are investigated by using a public hand gesture sEMG dataset. Our experimental results demonstrate the viability of the proposed method for user authentication. 
    more » « less
  7. Deploying unmanned aerial vehicle (UAV) mounted base stations with a renewable energy charging infrastructure in a temporary event (e.g., sporadic hotspots for light reconnaissance mission or disaster-struck areas where regular power-grid is unavailable) provides a responsive and cost-effective solution for cellular networks. Nevertheless, the energy constraint incurred by renewable energy (e.g., solar panel) imposes new challenges on the recharging coordination. The amount of available energy at a charging station (CS) at any given time is variable depending on: the time of day, the location, sunlight availability, size and quality factor of the solar panels used, etc. Uncoordinated UAVs make redundant recharging attempts and result in severe quality of service (QoS) degradation. The system stability and lifetime depend on the coordination between the UAVs and available CSs. In this paper, we develop a reinforcement learning time-step based algorithm for the UAV recharging scheduling and coordination using a Q-Learning approach. The agent is considered a central controller of the UAVs in the system, which uses the ϵ -greedy based action selection. The goal of the algorithm is to maximize the average achieved throughput, reduce the number of recharging occurrences, and increase the life-span of the network. Extensive simulations based on experimentally validated UAV and charging energy models reveal that our approach exceeds the benchmark strategies by 381% in system duration, 47% reduction in the number of recharging occurrences, and achieved 66% of the performance in average throughput compared to a power-grid based infrastructure where there are no energy limitations on the CSs. 
    more » « less
  8. null (Ed.)
    Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversaries to launch cyber attacks, causing severe consequences such as massive blackout and infrastructure damages. Existing machine learning-based methods for detecting cyber attacks in smart grids are mostly based on supervised learning, which need the instances of both normal and attack events for training. In addition, supervised learning requires that the training dataset includes representative instances of various types of attack events to train a good model, which is sometimes hard if not impossible. This paper presents a new method for detecting cyber attacks in smart grids using PMU data, which is based on semi-supervised anomaly detection and deep representation learning. Semi-supervised anomaly detection only employs the instances of normal events to train detection models, making it suitable for finding unknown attack events. A number of popular semi-supervised anomaly detection algorithms were investigated in our study using publicly available power system cyber attack datasets to identify the best-performing ones. The performance comparison with popular supervised algorithms demonstrates that semi-supervised algorithms are more capable of finding attack events than supervised algorithms. Our results also show that the performance of semi-supervised anomaly detection algorithms can be further improved by augmenting with deep representation learning. 
    more » « less
  9. Abstract

    Understanding gene regulatory networks is essential to elucidate developmental processes and environmental responses. Here, we studied regulation of a maize (Zea mays) transcription factor gene using designer transcription activator-like effectors (dTALes), which are synthetic Type III TALes of the bacterial genus Xanthomonas and serve as inducers of disease susceptibility gene transcription in host cells. The maize pathogen Xanthomonas vasicola pv. vasculorum was used to introduce 2 independent dTALes into maize cells to induced expression of the gene glossy3 (gl3), which encodes a MYB transcription factor involved in biosynthesis of cuticular wax. RNA-seq analysis of leaf samples identified, in addition to gl3, 146 genes altered in expression by the 2 dTALes. Nine of the 10 genes known to be involved in cuticular wax biosynthesis were upregulated by at least 1 of the 2 dTALes. A gene previously unknown to be associated with gl3, Zm00001d017418, which encodes aldehyde dehydrogenase, was also expressed in a dTALe-dependent manner. A chemically induced mutant and a CRISPR-Cas9 mutant of Zm00001d017418 both exhibited glossy leaf phenotypes, indicating that Zm00001d017418 is involved in biosynthesis of cuticular waxes. Bacterial protein delivery of dTALes proved to be a straightforward and practical approach for the analysis and discovery of pathway-specific genes in maize.

     
    more » « less