Search Results - "LU Tianbo"

Refine Results
  1. 1

    Improved figure of merit (z) at low temperatures for superior thermoelectric cooling in Mg3(Bi,Sb)2 by Chen, Nan, Zhu, Hangtian, Li, Guodong, Fan, Zhen, Zhang, Xiaofan, Yang, Jiawei, Lu, Tianbo, Liu, Qiulin, Wu, Xiaowei, Yao, Yuan, Shi, Youguo, Zhao, Huaizhou

    Published in Nature communications (15-08-2023)
    “…The low-temperature thermoelectric performance of Bi-rich n-type Mg 3 (Bi,Sb) 2 was limited by the electron transport scattering at grain boundaries, while…”
    Get full text
    Journal Article
  2. 2

    Cooling and Mechanical Performance Analysis of a Trapezoidal Thermoelectric Cooler with Variable Cross-Section by Lu, Tianbo, Li, Yuqiang, Zhang, Jianxin, Ning, Pingfan, Niu, Pingjuan

    Published in Energies (Basel) (01-11-2020)
    “…In this study, a full-scale three-dimensional trapezoidal thermoelectric cooler model is constructed to study its cooling performance and mechanical…”
    Get full text
    Journal Article
  3. 3

    A Survey on Measuring Anonymity in Anonymous Communication Systems by Lu, Tianbo, Du, Zeyu, Jane Wang, Z.

    Published in IEEE access (2019)
    “…The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy,…”
    Get full text
    Journal Article
  4. 4

    Multi-objective optimization of thermoelectric cooler using genetic algorithms by Lu, Tianbo, Zhang, Xiang, Zhang, Jianxin, Ning, Pingfan, Li, Yuqiang, Niu, Pingjuan

    Published in AIP advances (01-09-2019)
    “…The thermoelectric cooler (TEC) is a kind of cooling equipment which used to dissipate heat from the devices by Peltier effect. The cooling capacity (Qc) and…”
    Get full text
    Journal Article
  5. 5

    AABN: Anonymity assessment model based on Bayesian network with application to blockchain by Lu, Tianbo, Yan, Ru, Lei, Min, Lin, Zhimin

    Published in China communications (01-06-2019)
    “…Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users, which is the underlying…”
    Get full text
    Journal Article
  6. 6

    MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment by Lu, Tianbo, Luo, Meng, Yan, Ru, Lin, Zhimin

    Published in Symmetry (Basel) (01-02-2019)
    “…This paper proposes a multiple factor bandwidth strategy (MFBS), an anonymity assessment scheme based on bandwidth strategy. We first analyzed the path…”
    Get full text
    Journal Article
  7. 7

    Path selection algorithm with minimal delay in wireless sensor networks by Lu, Tianbo, Su, Yifei, Wang, Youwen, Zhang, Xiaoyan, Meng, Hao

    “…With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy…”
    Get full text
    Journal Article
  8. 8

    MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication by Zhang, Xiaoyan, Li, Huiyang, Dong, Guozhen, Li, Chao, Meng, Ting, Lu, Tianbo, Zhang, Jiao

    Published in Security and communication networks (01-01-2019)
    “…For the past few years, Internet of Things (IoT) has developed rapidly and been extensively used. However, its transmission security and privacy protection are…”
    Get full text
    Journal Article
  9. 9

    Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks by Lu, Tianbo, Guo, Xiaobo, Li, Yang, Peng, Yong, Zhang, Xiaoyan, Xie, Feng, Gao, Yang

    “…In recent years, the security of cyberphysical system (CPS) has been focused on increasingly. The most common example of CPS is industrial control system…”
    Get full text
    Journal Article
  10. 10
  11. 11

    SIM: Achieving High Profit through Integration of Selfish Strategy into Innocent Mining by Shang, Jiaze, Lu, Tianbo, Zhao, Pengfei

    “…Selfish mining, one of the most renowned attack in Bitcoin, involves a selfish miner withholding discovered blocks and broadcasting them at an opportune moment…”
    Get full text
    Journal Article
  12. 12

    Exceptional thermoelectric and mechanical performance in (Bi, Sb)2Te3 matrix facilitated by AgInSe2 alloying by Li, Ruiheng, Ou, Wenxin, Zhu, Jianglong, Deng, Qian, Tan, Xiaobo, Zhao, Qi, Lu, Tianbo, Gao, Shaojingya, Ma, Huangshui, Wu, Hao, Sun, Qiang, Ang, Ran

    “…Full-flow demonstration from optimization of bismuth telluride-based thermoelectric materials and device design to device performance evaluation and…”
    Get full text
    Journal Article
  13. 13

    Electric field analysis of auxiliary electrode in needle-free electrostatic spinning by Ning, Pingfan, Shi, Hao, Niu, Pingjuan, Lu, Tianbo, Wang, Wei

    Published in Ferroelectrics (18-08-2019)
    “…The electric forces are the main factor responsible for the characteristic jet path and stretching in electrospinning. The distribution of the electric field…”
    Get full text
    Journal Article
  14. 14

    Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention by Feng, Qiaozhi, Xia, Yamei, Yao, Wenbin, Lu, Tianbo, Zhang, Xiaoyan

    “…With the widespread use of the Tor network, attackers who control malicious relays pose a serious threat to user privacy. Therefore, identifying malicious…”
    Get full text
    Conference Proceeding
  15. 15

    Cyber-physical System Risk Assessment by Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie

    “…Cyber Physical System (CPS) is a combination of physical systems with cyber systems, where there is a tight coupling between the two systems. It is widely used…”
    Get full text
    Conference Proceeding
  16. 16
  17. 17

    Peer Discovery in Peer-to-Peer Anonymity Networks by Tianbo Lu, Binxing Fang, Xueqi Cheng, Yuzhong Sun

    “…Many peer-to-peer anonymity protocols have been proposed in recent years. One of the key challenges in designing such protocols is peer discovery, especially…”
    Get full text
    Conference Proceeding
  18. 18

    Next Big Thing in Big Data: The Security of the ICT Supply Chain by Tianbo Lu, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, Hongyu Yang

    “…In contemporary society, with supply chains becoming more and more complex, the data in supply chains increases by means of volume, variety and velocity. Big…”
    Get full text
    Conference Proceeding
  19. 19

    Security Objectives of Cyber Physical Systems by Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang

    “…Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures…”
    Get full text
    Conference Proceeding
  20. 20

    An Analysis of Cyber Physical System Security Theories by Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng

    “…Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development…”
    Get full text
    Conference Proceeding