Minrui Fei

Minrui Fei
Shanghai University | SHU · School of Mechatronics Engineering and Automation

PhD

About

520
Publications
35,770
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,567
Citations
Citations since 2016
155 Research Items
4288 Citations
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800

Publications

Publications (520)
Preprint
Full-text available
When traditional pole-dynamics attacks (TPDAs) are implemented with nominal models, model mismatch between exact and nominal models often affects their stealthiness, or even makes the stealthiness lost. To solve this problem, our current paper presents a novel stealthy measurement-aided pole-dynamics attacks (MAPDAs) method with model mismatch. Fir...
Preprint
Full-text available
Automated social behaviour analysis of mice has become an increasingly popular research area in behavioural neuroscience. Recently, pose information (i.e., locations of keypoints or skeleton) has been used to interpret social behaviours of mice. Nevertheless, effective encoding and decoding of social interaction information underlying the keypoints...
Article
Full-text available
Human learning optimization (HLO) is a simple yet powerful metaheuristic developed based on a simplified human learning model. Competition and cooperation, as two basic modes of social cognition, can motivate individuals to learn more efficiently and improve their efficiency in solving problems by stimulating their competitive instincts and increas...
Article
Full-text available
Human Learning Optimization (HLO) is a simple yet efficient binary meta-heuristic, in which three learning operators, i.e. the random learning operator (RLO), individual learning operator (ILO) and social learning operator (SLO), are developed to mimic human learning mechanisms to solve optimization problems. Among these three operators, RLO direct...
Article
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and challenges. The timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems (CPPSs). This paper presents a comprehensive rev...
Preprint
Full-text available
Dynamic watermarking schemes can enhance the cyber attack detection capability of networked control systems (NCSs). This paper presents a linear event-triggered solution to conventional dynamic watermarking (CDW) schemes. Firstly, the limitations of CDW schemes for event-triggered state estimation based NCSs are investigated. Secondly, a new event-...
Article
Full-text available
Human Learning Optimization (HLO) is an efficient metaheuristic algorithm in which three learning operators, i.e., the random learning operator, the individual learning operator, and the social learning operator, are developed to search for optima by mimicking the learning behaviors of humans. In fact, people not only learn from global optimization...
Article
Persistent data packet losses induced by consecutive denial-of-service (DoS) attacks could fail traditional state estimation (SE) algorithms that highly rely on the completeness of dataset. To solve the problem, this article explores a novel SE algorithm with enhanced SE accuracy for power systems against consecutive DoS attacks. First, according t...
Article
Human Learning Optimization (HLO) is a simple yet powerful meta-heuristic developed based on a simplified human learning model. Many cognitive activities of humans contain an element of reasoning, and with reasoning, humans can gain deeper information on problems to boost learning performance. Inspired by this fact, this paper proposes a novel huma...
Article
Nuclear reactor core power level control and the average coolant temperature usually adopt independent control strategies, but tracking only one single core power makes the coolant temperature control risky in a disturbance situation. To solve this problem, a reference trajectory calculation based on the coolant outlet temperature under the steady...
Article
This paper is concerned with the cross-dimensional formation control of a second-order multi-dimensional heterogeneous multi-agent system. Agents are first separated into several groups according to their position/velocity vector dimensions. Then the cross-dimensional formation control problem is formulated such that agents in the same group form a...
Article
Dynamic watermarking schemes can enhance the cyber attack detection capability of networked control systems (NCSs). This paper presents a linear event-triggered solution to conventional dynamic watermarking (CDW) schemes. Firstly, the limitations of CDW schemes for event-triggered state estimation based NCSs are investigated. Secondly, a new event-...
Article
Low light very likely leads to the degradation of an image's quality and even causes visual task failures. Existing image enhancement technologies are prone to overenhancement, color distortion or time consumption, and their adaptability is fairly limited. Therefore, we propose a new single low-light image lightness enhancement method. First, an en...
Article
The incomplete and untrue data caused by cyber attacks (e.g., image information leakage and tampering) will affect control performance and even lead to system instability. To address this problem, a novel co-design secure control method based on image attack detection and data compensation for networked visual control systems (NVCSs) is proposed. F...
Article
The existing identity security schemes (e.g., based on bilinear pairing) have high computation complexity and large bytes of variables, which result in high computation and communication costs and are difficult to apply to resource-constrained (i.e., computation and communication) devices. Moreover, most of these schemes adopt a fixed cycle key upd...
Chapter
This paper presents an unsupervised dynamic collision detection approach based on obstacle point cloud envelope model. Based on the generated robot envelope model using the D-H parameters, an invalid point cloud filtering method is designed to filter the point cloud data out of the reachable space of the robot. The oriented bounding box is then ado...
Chapter
To solve the problems of low conversion rate of the sharing service platform, this paper proposes an open science and technology sharing service platform which integrates resource retrieval, technology consulting, technology finance, qualification certification, entrepreneurial incubation etc. based on traditional technology sharing service model....
Article
Dynamic watermarking (DW)-based detection methods can effectively detect replay attacks, however these detection methods cannot achieve the desired effectiveness for generalised replay attacks (GRAs). The objectiveness of this paper is to investigate security weakness of DW-based detection for GRAs. Firstly, unlike replaying history data from repla...
Article
The use and application of robotic arms in helping the aged and vulnerable persons are increasing gradually. In order to achieve safer and reliable human-robot interaction and its wider adoption, the requirements for the humanoid motion of robotic arms are becoming more stringent. This paper presents a humanoid motion planning method for a robotic...
Article
We here investigate the secure control of networked control systems developing a new dynamic watermarking (DW) scheme. First, the weaknesses of the conventional DW scheme are revealed, and the tradeoff between the effectiveness of false data injection attack (FDIA) detection and system performance loss is analyzed. Second, we propose a new DW schem...
Article
This paper presents a multi-person vision tracking approach based on human body localization features to address the problem of interactive object localization and tracking in a home monitoring scenario. Firstly, the human body localization model is used to obtain the 3D position of the human body, which is then used to construct the human body mot...
Preprint
Full-text available
We here investigate secure control of networked control systems developing a new dynamic watermarking (DW) scheme. Firstly, the weaknesses of the conventional DW scheme are revealed, and the tradeoff between the effectiveness of false data injection attack (FDIA) detection and system performance loss is analysed. Secondly, we propose a new DW schem...
Article
Full-text available
In intelligent video surveillance under complex scenes, it is vital to identify the current actions of multi-target human bodies accurately and in real time. In this paper, a real-time multi-person action recognition method with monocular vision is proposed based on sequence models. Firstly, the key points of multi-target human body skeleton in the...
Article
Automated analysis of mouse behaviours is crucial for many applications in neuroscience. However, quantifying mouse behaviours from videos or images remains a challenging problem, where pose estimation plays an important role in describing mouse behaviours. Although deep learning based methods have made promising advances in human pose estimation,...
Article
Due to deep integration between power grids and communication networks, cascading failure is spreading more readily in cyber–physical power systems (CPPS), even leading to blackouts. This paper mainly investigates optimized control under dual-network interactive cascading failure to support the operation of CPPS. Firstly, the topological and intera...
Article
This article investigates an issue of distributed fusion estimation under network-induced complexity and stochastic parameter uncertainties. First, a novel signal selection method based on event trigger is developed to handle network-induced packet dropouts, as well as packet disorders resulting from random transmission delays, where the ${H_{2}}/...
Preprint
This paper investigates an issue of distributed fusion estimation under network-induced complexity and stochastic parameter uncertainties. First, a novel signal selection method based on event-trigger is developed to handle network-induced packet dropouts as well as packet disorders resulting from random transmission delays, where the ${H_2}/{H_\in...
Preprint
Automated analysis of mouse behaviours is crucial for many applications in neuroscience. However, quantifying mouse behaviours from videos or images remains a challenging problem, where pose estimation plays an important role in describing mouse behaviours. Although deep learning based methods have made promising advances in mouse or other animal p...
Article
This paper investigates the problem of linear time invariant system multiple faults detection and isolation in a certain frequency interval. A fault detection(FD) scheme which is composed by a conventional Luenberger observer is considered. Using diagonal dominance decoupling method, we design a novel fault isolation compensator in a certain freque...
Article
Full-text available
The state of charge (SOC) estimation of Li-ion batteries has attracted substantial interests in recent years. Kalman Filter has been widely used in real-time battery SOC estimation, however, to build a suitable dynamic battery state-space model is a key challenge, and most existing methods still use the off-line modelling approach. To capture the d...
Article
Full-text available
To improve the security of smart grids (SGs) by finding the system vulnerability, this paper investigates the sparse attack vectors’ construction method for malicious false data injection attack (FDIA). The drawbacks of the existing attack vector construction methods include avoiding discussing the feasible region and validity of the attack vector....
Preprint
Low light very likely leads to the degradation of image quality and even causes visual tasks' failure. Existing image enhancement technologies are prone to over-enhancement or color distortion, and their adaptability is fairly limited. In order to deal with these problems, we utilise the mechanism of biological cell vibration to interpret the forma...
Chapter
Supervisory control and data acquisition (SCADA) system has been widely used in traditional power systems for operation and control. As increasingly more ICT technologies are deployed to improve the smartness of the power grid, cyber security is becoming an important issue in the development of smart grids, for example, false data injection attack...
Chapter
By analyzing the near-infrared spectrum, we can determine the quantitative relationship model between the spectral data of different cocoa beans and the target components. This paper proposes a predictive regression model based on 1D-CNN. Based on the traditional convolutional neural network, gating mechanisms and dilated convolutions are combined....
Chapter
This paper proposes a fast hybrid image encryption method to address the cyber security problem of image transmission in networked inverted pendulum visual servo control systems (NIPVSCSs). Firstly, the original image is encrypted by ranks crossing to resist image content leakage. Secondly, the randomly spaced watermark embedding operation are inte...
Chapter
The trajectory planning of the aircraft is generally based on different mission requirements, under certain constraints to find an available optimal mission route. The traditional 3D trajectory planning algorithm is easy to fall into the local optimum. The search speed is full when the algorithm is searched. Some algorithms can only perform polylin...
Article
Full-text available
In this paper, a predictive sliding mode control method based on multi-sensor fusion is proposed to solve the problem of insufficient accuracy in trajectory tracking caused by actuator delay. The controller, based on the kinematics model, uses an inner and outer two-layer structure to achieve decoupling of position control and heading control. A re...
Chapter
To ensure the safe operation of a power system, it is necessary to conduct its state estimation continuously. In this paper, a novel quantum genetic algorithm (QGA) is combined with unscented Kalman filter (UKF) for dynamic state estimation of power systems. Firstly, an innovation matrix is used to improve the estimation accuracy by constructing an...
Article
Aiming at the challenges of networked visual servo control systems, which rarely consider network communication duration and image processing computational cost simultaneously, we here propose a novel platform for networked inverted pendulum visual servo control using ${H_{\infty } }$ analysis. Unlike most of the existing methods that usually ign...
Article
The spiking neural network is considered to be the third generation of neural networks featured by its low power consumption and high computing capability, which has great application potential in robotics. However, the present spiking neural network has two limitations: (1) the neuron’s spike firing time is calculated based on the iterative approa...
Article
With the wide application of networked control systems, how to deal with data injection attacks and maintain the stability of control systems including wireless multi-hop networks is a problem that the researchers and technological workers must consider and solve. Based on the construction of a control system including wireless multi-hop networks,...
Article
Full-text available
Intermittent renewable energy sources are being increasingly integrated into modern power networks. This leads to severe frequency fluctuations in the networks. Energy storage systems can be used for frequency restoration due to their capability to provide in-time active power compensations. This paper deals with the frequency control problem for p...
Article
Local stability conditions for time-delay T-S fuzzy systems are proposed by use of a homogeneous polynomial approach. Lesser conservatism can be expected based on the derived stability criteria due to the following three factors: a) a new fuzzy Lyapunov-Krasovskii functional is constructed, which contains a homogeneous polynomially parameter-depend...
Article
This paper proposes a novel method to analyze the impacts of plug-in hybrid electric vehicle (PHEV) charging on branch power flows and voltages of an active distribution network under gas station network attack. Specifically, when the gas station network is attacked and cannot provide refueling service, PHEVs running out of gasoline will be only dr...
Article
Dynamic state estimation is usually employed to provide real-time and effective supervision for the smart grid (SG) operation. However, dynamic state estimators have been recently found vulnerable to data injection attack, which are misled without posing any anomalies to bad data detection (BDD). To improve the robustness of the SG, it is firstly n...
Article
Smart grid (SG) represents a large-scale network system with the tight integration of a physical power network and an information network, which makes it more vulnerable to hybrid cyber attacks against different regional subsystems. First, an alternating direction method of multipliers-based distributed state estimation method is developed to overc...
Article
When continuous denial of service (DoS) attacks cause measurement data losses in smart grid, the traditional dynamic state estimation is useless, destroying the running safety of smart grid seriously. To solve the problem, an improved unscented Kalman filter (UKF) is proposed, which can estimate the dynamic state of smart grid under DoS attacks. Fi...
Article
This paper investigates the Sliding Mode Variable Structure Control (SMVSC) for a class of typical Cyber-Physical Systems (CPSs), Inverted Pendulum Visual Servo Systems (IPVSSs). In the current CPSs SMVSC studies, the visual servo is rarely involved and there is a lack of the corresponding verification platform. In this paper, we propose an SMVSC a...
Article
Aiming at the problem that the features of small field of view detection in the high-speed pipeline are difficult to mine and the millisecond cycle is fast, this paper takes the cigarette filter bead streamline detection as an example, and proposes a small field of view high-speed detection algorithm based on sparse features. Firstly, by adjusting...
Article
Full-text available
This paper proposes novel randomized gossip-consensus-based sync (RGCS) algorithms to realize efficient time calibration in dynamic wireless sensor networks (WSNs). First, the unreliable links are described by stochastic connections, reflecting the characteristic of changing connectivity gleaned from dynamic WSNs. Secondly, based on the mutual drif...
Article
Multipopulation is an effective optimization component often embedded into evolutionary algorithms to solve optimization problems. In this paper, a new multipopulation-based multiobjective genetic algorithm (MOGA) is proposed, which uses a unique cross-subpopulation migration process inspired by biological processes to share information between sub...
Article
The smart community (SC), as an important part of the Internet of energy (IoE), can facilitate integration of distributed renewable energy sources (RES) and electric vehicles (EVs) in the smart grid. However, due to the potential security and privacy issues caused by untrusted and opaque energy markets, it becomes a great challenge to optimally sch...