Search Results - "LU Tianbo"
-
1
Improved figure of merit (z) at low temperatures for superior thermoelectric cooling in Mg3(Bi,Sb)2
Published in Nature communications (15-08-2023)“…The low-temperature thermoelectric performance of Bi-rich n-type Mg 3 (Bi,Sb) 2 was limited by the electron transport scattering at grain boundaries, while…”
Get full text
Journal Article -
2
Cooling and Mechanical Performance Analysis of a Trapezoidal Thermoelectric Cooler with Variable Cross-Section
Published in Energies (Basel) (01-11-2020)“…In this study, a full-scale three-dimensional trapezoidal thermoelectric cooler model is constructed to study its cooling performance and mechanical…”
Get full text
Journal Article -
3
A Survey on Measuring Anonymity in Anonymous Communication Systems
Published in IEEE access (2019)“…The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy,…”
Get full text
Journal Article -
4
Multi-objective optimization of thermoelectric cooler using genetic algorithms
Published in AIP advances (01-09-2019)“…The thermoelectric cooler (TEC) is a kind of cooling equipment which used to dissipate heat from the devices by Peltier effect. The cooling capacity (Qc) and…”
Get full text
Journal Article -
5
AABN: Anonymity assessment model based on Bayesian network with application to blockchain
Published in China communications (01-06-2019)“…Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users, which is the underlying…”
Get full text
Journal Article -
6
MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment
Published in Symmetry (Basel) (01-02-2019)“…This paper proposes a multiple factor bandwidth strategy (MFBS), an anonymity assessment scheme based on bandwidth strategy. We first analyzed the path…”
Get full text
Journal Article -
7
Path selection algorithm with minimal delay in wireless sensor networks
Published in International journal of distributed sensor networks (01-08-2018)“…With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy…”
Get full text
Journal Article -
8
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication
Published in Security and communication networks (01-01-2019)“…For the past few years, Internet of Things (IoT) has developed rapidly and been extensively used. However, its transmission security and privacy protection are…”
Get full text
Journal Article -
9
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks
Published in International journal of distributed sensor networks (01-01-2014)“…In recent years, the security of cyberphysical system (CPS) has been focused on increasingly. The most common example of CPS is industrial control system…”
Get full text
Journal Article -
10
A hybrid niching memetic algorithm for multi-modal optimization of double row layout problem
Published in International journal of production research (04-10-2024)Get full text
Journal Article -
11
SIM: Achieving High Profit through Integration of Selfish Strategy into Innocent Mining
Published in IEEE eTransactions on network and service management (29-07-2024)“…Selfish mining, one of the most renowned attack in Bitcoin, involves a selfish miner withholding discovered blocks and broadcasting them at an opportune moment…”
Get full text
Journal Article -
12
Exceptional thermoelectric and mechanical performance in (Bi, Sb)2Te3 matrix facilitated by AgInSe2 alloying
Published in Chemical engineering journal (Lausanne, Switzerland : 1996) (01-10-2024)“…Full-flow demonstration from optimization of bismuth telluride-based thermoelectric materials and device design to device performance evaluation and…”
Get full text
Journal Article -
13
Electric field analysis of auxiliary electrode in needle-free electrostatic spinning
Published in Ferroelectrics (18-08-2019)“…The electric forces are the main factor responsible for the characteristic jet path and stretching in electrospinning. The distribution of the electric field…”
Get full text
Journal Article -
14
Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention
Published in 2023 IEEE Symposium on Computers and Communications (ISCC) (09-07-2023)“…With the widespread use of the Tor network, attackers who control malicious relays pose a serious threat to user privacy. Therefore, identifying malicious…”
Get full text
Conference Proceeding -
15
Cyber-physical System Risk Assessment
Published in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01-10-2013)“…Cyber Physical System (CPS) is a combination of physical systems with cyber systems, where there is a tight coupling between the two systems. It is widely used…”
Get full text
Conference Proceeding -
16
Synergistically enhanced thermoelectric and mechanical performance of Bi2Te3 via industrial scalable hot extrusion method for cooling and power generation applications
Published in Materials today physics (01-03-2023)“…To meet the fast-expanding needs of thermoelectric cooling for high heat flux systems, high-performance thermoelectric devices must be constructed with…”
Get full text
Journal Article -
17
Peer Discovery in Peer-to-Peer Anonymity Networks
Published in 2006 IEEE International Conference on Networking, Sensing and Control (2006)“…Many peer-to-peer anonymity protocols have been proposed in recent years. One of the key challenges in designing such protocols is peer discovery, especially…”
Get full text
Conference Proceeding -
18
Next Big Thing in Big Data: The Security of the ICT Supply Chain
Published in 2013 International Conference on Social Computing (01-09-2013)“…In contemporary society, with supply chains becoming more and more complex, the data in supply chains increases by means of volume, variety and velocity. Big…”
Get full text
Conference Proceeding -
19
Security Objectives of Cyber Physical Systems
Published in 2014 7th International Conference on Security Technology (01-12-2014)“…Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures…”
Get full text
Conference Proceeding -
20
An Analysis of Cyber Physical System Security Theories
Published in 2014 7th International Conference on Security Technology (01-12-2014)“…Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development…”
Get full text
Conference Proceeding