Yang XiaoUniversity of Alabama | UA · Department of Computer Science
Yang Xiao
Doctor of Philosophy
About
607
Publications
247,508
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22,774
Citations
Publications
Publications (607)
This paper proposes a novel Extended Sliding-Mode Predictive Control (ESM-PC) strategy for three-phase three-level voltage source inverters (3P-3L VSIs). Initially, the control domain is established using sliding-mode theory, dynamically reducing the search space. Subsequently, a unique parallel optimization strategy is presented in the two-phase s...
Estimating the accurate states of voltage magnitudes and angles ensures reliable operation and control in a smart grid. The increased dependency and integration of information communication technologies in smart grids introduce new security issues, such as hidden false data injection attacks (FDIAs). These can successfully evade conventional residu...
The ship-integrated energy system (S-IES), containing power and heating networks, plays a vital role in combining renewable technologies and conventional generators to advocate the protection of environmental awareness in the marine industry. To this end, the energy management problem (EMP) of the S-IES is investigated in this article. In this way,...
Accurate lane-changing prediction is important to Advanced Driver Assistance Systems (ADAS). However, the prediction accuracy declines when the lateral motion is ambiguous during the early stage of lane change or when vehicles abruptly cease the process for safety concerns. This study proposes a variable weight combination (VWC) model to predict hu...
Modern technologies adopt Internet of Things (IoT) devices to increase water management efficiency and enhance water quality services. However, the limitations of IoT devices, such as small sizes and poor security, weaken the Water Distribution System (WDS) security, and many attackers compromise the critical components of WDS. Cyber-physical attac...
This paper proposes a virtual voltage vector-based finite-control-set model predictive control (FCS-MPCC) for a sensorless permanent magnet synchronous motor (PMSM) drive. First, an adaptive sliding-mode back electromotive force observer is integrated to improve the observer accuracy, especially in terms of rotor field speed and position. Then, a s...
In the above article
[1]
, we missed to citing one reference
[2]
and some references were incorrect.
With the rapid development of communication and Internet technologies, the Internet of Things (IoT) has become increasingly popular. Although IoT devices can bring more benefits to humans, there are a lot of concerns about the security and privacy of IoT devices. Even though researchers propose some prevention and detection methods for security pur...
This paper proposes an intelligent building energy management (BEM) strategy based on two different time-scale neural networks (NNs) to minimize building electricity expense and maximize building user comfort considering load demand uncertainties and variation in dayahead and real-time electricity prices. First, in terms of the dayahead BEM, an int...
Model predictive control (MPC) has been extensively investigated for its impressive dynamic response and efficacy in controlling non-linear systems. However, MPC faces challenges in terms of robustness, primarily due to its dependency on system parameters. In contrast, model-free predictive control (MFPC) offers an alternative that relies on the in...
As As an effective multi-agent system (MAS) control method, formation control is widely used in uncrewed systems, such as uncrewed surface/underwater/aerial vehicles and spacecrafts. However, the security issues of formation control have received little attention. Compared with traditional industry systems (such as smart grids or intelligence appli...
Artificial intelligence and Automatic Identification Systems (AIS) play pivotal roles in intelligent maritime navigation for the modern maritime industry. Many artificial intelligence maritime applications based on AIS data have dramatically benefited traditional operations and managements in the field of maritime industry, and also provided state-...
Phishing attacks are a major threat to online security, resulting in millions of dollars in losses. These attacks constantly evolve, forcing the cyber security community to improve detection systems. One major problem with current detection systems is that they cannot detect new phishing attacks, such as Browser in the Browser (BiTB) and malvertisi...
In this article, an adaptive reinforcement learning (RL) control problem is explored for a class of nonstrict-feedback discrete-time systems. First, different from the existing results, considering the noncausal problem which may exist in the backstepping design procedure, a universal system transformation method is first proposed for a class of no...
A vehicle micro-trajectory automatic acquisition method based on multi-sensor fusion is proposed to enhance the accuracy of trajectory sensed by traffic monitoring equipment while minimizing equipment expenditures. Firstly, the YOLOv5+DeepSORT vehicle recognition and tracking model is applied to obtain the video’s pixel trajectories of moving vehic...
Global positioning system (GPS) plays an important role in the path planning of unmanned surface ships. As we know, the civil GPS signal is not encrypted, and its structure is open. Meanwhile, the power strength of GPS signals arriving at receivers is weak. All of these make GPS vulnerable to jamming. GPS jamming attacks adversely affect the accura...
Researchers and standardization bodies have been paying increasing attention to the network management automation issue in 5G systems. Autonomous solutions for managing network resources are required in the present era of flexible and dynamic cloud-based settings. Operators strive for efficiency by optimizing network resources. The next step in net...
To decrease fuel-based energy consumption, it is important to investigate the optimal energy management problem for the seaport integrated energy system in a fully distributed manner. A multi-objective energy management model is constructed, considering energy consumption, greenhouse gas emission, and carbon trading, which satisfy the sustainable d...
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails. Phishing attacks steal users’ information or download and install malicious software. They are hard to detect because attackers can desig...
PLL and FLL synchronization technology in permanent magnet synchronous motor(PMSM) has been paid attention to by many researchers. However, in the actual operation of PMSM drivers, harmonics and DC offsets is inevitable, which brings great challenges to the synchronization technology. To tackle this issue, this paper proposes a novel four consecuti...
With the development of the autonomous and supply-production-sale integrated We-Energy (WeE), the Energy Internet performs a fully distributed structure, and the fluctuation of power injections cannot be neglected. This paper investigates an energy management problem with operation security constraints for WeE-based Energy Internet in a distributed...
The shipboard power system (SPS) composed of multiple zones including both AC-SPS and DC-SPS has become the development trend of all electric ships (AES). In order to cope with the sudden drop in voltage or frequency caused by pulsed power load (PPL) in SPS, this paper proposes a model-predictive-based power management. Firstly, for the important b...
This paper proposes a simplified optimal switching sequence model predictive control (OSS-MPC) without weighting coefficients for off-grid T-type single-phase three-level inverters. To eliminate the tedious weight-tuning process when constructing the switching sequences, the different effects of redundant small voltage vectors on the upper and lowe...
This paper provides a comprehensive survey of different techniques for Deoxyribonucleic acid (DNA) -based cryptography and steganography. DNA-based cryptography is an emerging field that utilizes DNA molecules’ massive parallelism and vast storage capacity to encode and decode information. The field has gained significant attention in recent years...
The characteristic analysis of car-following behavior in different scenarios is important for studying microscopic traffic flow models. This study first used roadside light detecting and ranging (LiDAR) to collect traffic 3-D point cloud data to reveal the driving behavior characteristics of localized urban intersections. The background subtraction...
This article presents an event-triggered distributed secondary control with predictive compensation based on the model-free predictive control under Denial-of-Service (DoS) attacks in ac/dc-networked microgrids. First, models of ac/dc networked microgrids in both electric network and communication network are established. On this premise, event-tri...
Buildings account for nearly 40% of primary energy and 36% of greenhouse emissions, which is one of the main factors driving climate change. Reducing energy consumption in buildings toward zero-energy buildings is a vital pillar to ensure that future climate and energy targets are reached. However, due to the high uncertainty of building loads and...
This paper proposes a finite control set model predictive torque control (FCS-MPTC) with reduced computation burden for permanent magnet synchronous motor (PMSM). Based on discrete space vector modulation (DSVM), the proposed DSVM-MPTC extends the control set. Therefore, compared to the traditional FCS-MPTC, it greatly reduces the torque ripples an...
Domain name system (DNS) works like a phone book in the Internet address resolution process. It translates user-provided domain names into corresponding IP addresses and thus helps to connect to those domains. For its important role in Internet connectivity and the emerging growth of the Internet of Things (IoT) devices, recent massive distributed...
A paramount factor limiting the applications of binary sensors is these senors’ on-off property outputting binary digits of “0” or “1”. To overcome this limitation, modulators or obscurants are added to enhance the sensing ability of binary sensors and render them usable in applications such as multi-target tracking and human activity recognition....
With the advancements in Internet of Things (IoT) and communication technologies (5G beyond/6G), Connected and Autonomous Vehicles (CAV) is eventually being realized and will make a major contribution to the development of smart mobility systems in the pursuit of green and sustainable economies. Cooperative driving features allowed by CAVs will dra...
The papers in this special section focus on artificial intelligence (AI)-powered Internet of Everything services in next generation wireless networks. These networks are undergoing a major revolution, connecting billions of machines and millions of people. These networks are marketed as the key enabler of an unprecedented Internet of Everything (Io...
The network management automation problem in 5G systems has been gaining attention from standardization organizations and researchers. The current age of agile and dynamic cloud-based environments demands autonomous systems for managing network resources. Operators aim to optimize the network resources to achieve minimalism with efficiency. Autonom...
This paper investigates FDI attacks in distributed secondary control strategy for low inertia microgrid with a high proportion of renewable energy and power electronics. Adversaries always aim to tamper information exchange between the neighbor distributed generators (DGs) in microgrids, which results in voltage and frequency deviation leading to p...
A robust discrete berth allocation method under a low-carbon target is proposed in this study, considering the uncertainty of vessels’ arrival time and handling time. According to the actual situation of port operations, a bilevel, biobjective model is established to minimize both average carbon emission and the range of carbon emission during the...
The intelligent road is an important component of the intelligent vehicle infrastructure cooperative system, the latest development of intelligent transportation systems. As an advanced sensor, Light Detection and Ranging (LiDAR) has gradually been used to collect high-resolution micro-traffic data on the roadside of intelligent roads. Furthermore,...
The Artificial Potential Field (APF) method is a classical path planning method for unmanned ships, relying on Global Positioning System (GPS) positioning information for path planning. Unfortunately, once the path planning algorithm uses inaccurate or even fake data, it will lead to ship collision, grounding, or deviation from the course, causing...
A novel reinforcement learning-based adaptive optimal controller is proposed to obtain the desired tracking performance for a class of nonlinear nonstrict feedback systems with uncertain dynamics in this paper. The main feature is that the proposed control scheme can handle the control problem that traditional reinforcement learning-based algorithm...
For accommodating rapidly increasing power demands, power systems are transitioning from analog systems to systems with increasing digital control and communications. Although this modernization brings many far-reaching benefits, the hardware and software newly incorporated into the power systems also incur many vulnerabilities. By taking advantage...
This paper proposes an improved implicit model predictive current control (IMPCC) method for permanent magnet synchronous motor drives. Compared to the conventional implicit MPC, the proposed IMPCC has a much lower computational burden, and thus is suitable for real-time applications. Two-step optimization is employed in this method to minimize the...
In recent years, there has been an increase in ransomware attacks worldwide. These attacks aim to lock victims’ machines or encrypt their files for ransom. These kinds of ransomware differ in their implementation and techniques, starting from how they spread, vulnerabilities they leverage, methods to hide their behaviors from antivirus software, en...
The ongoing coronavirus disease 2019 (COVID-19) is a pandemic causing millions of deaths, devastating social and economic disruptions. Testing individuals for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the pathogen of COVID-19, is critical for mitigating and containing COVID-19. Many countries are implementing group testing strat...
Smart load with series-connected DC electric spring (ES) and non-critical load (NCL) structure can compensate for load voltage and improve power quality. In this paper, a distributed virtual inertial control framework based on model predictive control is proposed for low inertia in DC microgrid. Firstly, the current prediction model of ES bidirecti...
The global economy is experiencing significant business growth leading to increasing demands for energy. Global energy consumption increased by 2.1 percent in 2017, and according to the 2019 U.S. Energy Information Administration (EIA) reports, the expected energy growth in Asia will reach 50 percent by 2050. Since it is unlikely that these demands...
This article investigates optimal control problem for a class of discrete-time (DT) nonlinear systems with unknown dynamics. With the help of a broad learning system (BLS), a novel online adaptive dynamic programming (ADP) controller is presented. First, to approximate the unknown system dynamics, an approximator based on BLS is presented. The conn...
For achieving the goal of two-way communication and power flows, smart grids are integrated with much state-of-the-art hardware and software. However, these newly added components also introduce a lot of vulnerabilities into the power systems, which results in that malicious users can launch various cyber-physical attacks to steal electricity. Exis...
Traffic information collection is an important foundation for intelligent transportation systems. In this paper, 3D Light Detection And Ranging (LiDAR) is deployed in the roadside of urban environments to collect vehicle and pedestrian information. A background filtering algorithm, including a mean background modeling to build a background map and...
Multiagent systems (MASs) are distributed systems with two or more intelligent agents. Formation control is a significant control technique of MASs. To date, formation control on MASs is widely used in various fields, such as robots, spacecrafts, satellites, and unmanned aerial/surface/underwater vehicles. However, there is a relatively small body...
Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, the limitations of these technologies introduce cyber-physical attacks to the WDS. The main goals of cyber-physical attacks inc...
Autonomous underwater vehicles (AUVs) are submersible underwater vehicles controlled by onboard computers. AUV formation is a cooperative control which focuses on controlling multiple AUVs to move in a group while executing tasks. In contrast to a single AUV, multi-AUV formation represents higher efficiency and better stability for many application...
Due to the low cost and good privacy protection of binary sensors, there are many applications of binary sensors. To enhance the spatial awareness of binary sensors, researchers utilize modulators to modulate views of sensors into visible and invisible regions so that the monitoring space is segmented into small cells identified by signatures. When...
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligent attackers can carefully design a destructive and stealthy false data injection attack (FDIA) sequence such that commonly used weighted least squares estimator combined with residual-based detection method is vulnerable to the FDIA. To effectively d...
Unmanned merchant ships are ships that carry goods and engage in commercial activities without manual operations on board. In contrast to traditional merchant ships, unmanned merchant ships have great advantages in economy, society, and safety. However, we observe that commercial applications of unmanned ships are still at an exploratory stage. We...
Fairness is now a significant issue in demand response because of its importance in customer attraction. Studies have shown that current demand response programs are lacking fairness considerations so that this may prevent demand response program penetration. In this article, fairness will be discussed and explored in terms of fair delay of energy...
With the knowledge of the measurement configuration and the topology structure of a power system, attackers can launch false data injection attacks (FDIAs) without detection by existing bad data detection methods in state estimation. The attacks can also introduce errors to estimated state variables, which are critical to grid reliability and opera...
With the fast development of Smart Grid globally, the security issues arise sharply and Non-Technical Loss (NTL) fraud is one of the major security issues. There are some existing NTL fraud detectors, however, when big data security challenges emerge in Smart Grid, none of them can detect NTL fraud for big data in Smart Grid. In this paper, we prop...
As the number of active Internet of Things (IoT) devices increases, managing and securing the enormous amount of data generated by these devices become harder. With their always‐connected smart meters and internet‐enabled electrical appliances, smart grids (SGs) are major data generation sources in IoT. Traditional SGs store and process their colle...
To maintain stable and reliable operations in smart grid, accurate state estimation is of paramount importance. However, synthesized false data injection attacks could wisely circumvent conventional bad data detection mechanisms by introducing arbitrary errors to state estimates to seriously affect the entire power system operation. To defend these...
Due to the advantages of being low cost and low power consumption, pyroelectric infrared sensors are widely employed in many applications, such as target location and tracking. In such applications, reference structure which is used to modulate views of binary sensors can help improve spatial resolutions by segmenting monitoring spaces into many ce...
Domain Name System (DNS) is one of the most important infrastructures of the internet communication. It is also a crucial point which is subjected to attacks. The largest Distributed Denial of Service (DDoS) attack on Oct. 21, 2016 has targeted a major DNS infrastructure named dynDNS. It was actually an Internet-of-thing (IoT) DNS flood attack that...
In this paper, a discrete-time online optimal control via time-based adaptive dynamic programming is developed for dynamic positioning (DP) of vessels in the presence of unknown system dynamic, energy conservation and wastage decrease of equipment. Firstly, a model network is established by a neural network (NN) to identify the DP system. And then,...
This paper investigates the problem of path following of underactuated marine surface vessels (MSVs) with uncertain nonlinear dynamics. First, the tracking target of the vessel is reduced from tracking the earth-fixed position to tracking the line-of-sight (LOS) angle by LOS method. Then, by employing the radial basis function neural network (RBFNN...
In modern intelligent transportation systems, short-term prediction of freeway entrance flow plays an important role in providing travelers timely traffic conditions. Short-term prediction approaches are expected to be computation-efficient, operation-convenient, and able to forecast with high accuracy. Nevertheless, few existing prediction approac...
Accountability in conjunction with preventative countermeasures is necessary to satisfy the needs of real-world computer security. A common method to achieve accountability is via logging and auditing. To achieve better accountability, a logging system should be capable of capturing activities as well as the relationships among the activities in a...
Domain Name System (DNS) has become a target of the Distributed Denial of Service (DDoS) attacks. When a DNS is under a DDoS flood attack, all the domain information under that DNS becomes unreachable, eventually causing unavailability of those particular domain names. In this paper, we propose a method which includes periodic stale content update...
Integrated with cutting-edge equipment and technologies, smart grid takes prominent advantages over traditional power systems. However, hardware and software techniques also bring smart grid numerous security concerns, especially various cyber attacks. Malicious users can launch cyber attacks to tamper with smart meters anytime and anywhere, mainly...
Picviz is a parallel co-ordinate plot which is used to display huge amounts of data for security purposes. The data can be displayed in multiple dimensions using the parallel co-ordinate system. The primary goal of this software is to ease the analysis of data and finding correlation among the various variables. Since the software deals with huge a...
As one of the most important elements in Intelligent Transportation System (ITS), Road Traffic Monitoring System (RTMS) needs to be functioned with a road recognition mechanism. Current works on road recognition mainly target at the field of automatic driving, and cannot be directly used in the RTMS. In this paper, we propose a decision tree based...
Combined with artificial potential field (APF) method, an adaptive leader-following formation control with collision avoidance strategy is developed for a class of second-order nonlinear multi-agent systems. Since nonlinear dynamic systems contain the inherent complexities and uncertainties, most formation control with collision avoidance objective...