-
A Nonlinear Regression Method for Composite Protection Modeling of Induction Motor Loads
Authors:
Soumya Kundu,
Zhigang Chu,
Yuan Liu,
Yingying Tang,
Qiuhua Huang,
Daniel James,
Yu Zhang,
Pavel Etingov,
David P. Chassin
Abstract:
Protection equipment is used to prevent damage to induction motor loads by isolating them from power systems in the event of severe faults. Modeling the response of induction motor loads and their protection is vital for power system planning and operation, especially in understanding system's dynamic performance and stability after a fault occurs. Induction motors are usually equipped with severa…
▽ More
Protection equipment is used to prevent damage to induction motor loads by isolating them from power systems in the event of severe faults. Modeling the response of induction motor loads and their protection is vital for power system planning and operation, especially in understanding system's dynamic performance and stability after a fault occurs. Induction motors are usually equipped with several types of protection with different operation mechanisms, making it challenging to develop adequate yet not overly complex protection models and determine their parameters for aggregate induction motor models. This paper proposes an optimization-based nonlinear regression framework to determine protection model parameters for aggregate induction motor loads in commercial buildings. Using a mathematical abstraction, the task of determining a suitable set of parameters for the protection model in composite load models is formulated as a nonlinear regression problem. Numerical examples are provided to illustrate the application of the framework. Sensitivity studies are presented to demonstrate the impact of lack of available motor load information on the accuracy of the protection models.
△ Less
Submitted 16 December, 2019;
originally announced December 2019.
-
Rate-Splitting for Multigroup Multicast Beamforming in Multicarrier Systems
Authors:
Hongzhi Chen,
De Mi,
Zheng Chu,
Pei Xiao,
Rahim Tafazolli
Abstract:
In this paper, we consider multigroup multicast transmissions with different types of service messages in an overloaded multicarrier system, where the number of transmitter antennas is insufficient to mitigate all inter-group interference. We show that employing a rate-splitting based multiuser beamforming approach enables a simultaneous delivery of the multiple service messages over the same time…
▽ More
In this paper, we consider multigroup multicast transmissions with different types of service messages in an overloaded multicarrier system, where the number of transmitter antennas is insufficient to mitigate all inter-group interference. We show that employing a rate-splitting based multiuser beamforming approach enables a simultaneous delivery of the multiple service messages over the same time-frequency resources in a non-orthogonal fashion. Such an approach, taking into account transmission power constraints which are inevitable in practice, outperforms classic beamforming methods as well as current standardized multicast technologies, in terms of both spectrum efficiency and the flexibility of radio resource allocation.
△ Less
Submitted 29 November, 2019;
originally announced November 2019.
-
How to Ask Better Questions? A Large-Scale Multi-Domain Dataset for Rewriting Ill-Formed Questions
Authors:
Zewei Chu,
Mingda Chen,
Jing Chen,
Miaosen Wang,
Kevin Gimpel,
Manaal Faruqui,
Xiance Si
Abstract:
We present a large-scale dataset for the task of rewriting an ill-formed natural language question to a well-formed one. Our multi-domain question rewriting MQR dataset is constructed from human contributed Stack Exchange question edit histories. The dataset contains 427,719 question pairs which come from 303 domains. We provide human annotations for a subset of the dataset as a quality estimate.…
▽ More
We present a large-scale dataset for the task of rewriting an ill-formed natural language question to a well-formed one. Our multi-domain question rewriting MQR dataset is constructed from human contributed Stack Exchange question edit histories. The dataset contains 427,719 question pairs which come from 303 domains. We provide human annotations for a subset of the dataset as a quality estimate. When moving from ill-formed to well-formed questions, the question quality improves by an average of 45 points across three aspects. We train sequence-to-sequence neural models on the constructed dataset and obtain an improvement of 13.2% in BLEU-4 over baseline methods built from other data resources. We release the MQR dataset to encourage research on the problem of question rewriting.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Towards Optimal System Scheduling with Synthetic Inertia Provision from Wind Turbines
Authors:
Zhongda Chu,
Uros Markovic,
Gabriela Hug,
Fei Teng
Abstract:
The undergoing transition from conventional to converter-interfaced renewable generation leads to significant challenges in maintaining frequency stability due to declining system inertia. In this paper, a novel control framework for Synthetic Inertia (SI) provision from Wind Turbines (WTs) is proposed, which eliminates the secondary frequency dip and allows the dynamics of SI from WTs to be analy…
▽ More
The undergoing transition from conventional to converter-interfaced renewable generation leads to significant challenges in maintaining frequency stability due to declining system inertia. In this paper, a novel control framework for Synthetic Inertia (SI) provision from Wind Turbines (WTs) is proposed, which eliminates the secondary frequency dip and allows the dynamics of SI from WTs to be analytically integrated into the system frequency dynamics. Furthermore, analytical system frequency constraints with SI provision from WTs are developed and incorporated into a stochastic system scheduling model, which enables the provision of SI from WTs to be dynamically optimized on a system level. Several case studies are carried out on a Great Britain 2030 power system with different penetration levels of wind generation and inclusion of frequency response requirements in order to assess the performance of the proposed model and analyze the influence of the improved SI control scheme on the potential secondary frequency dip. The results demonstrate that the inclusion of SI provision from WTs into UC can drastically impact the overall system costs.
△ Less
Submitted 10 May, 2020; v1 submitted 7 November, 2019;
originally announced November 2019.
-
Evaluation Benchmarks and Learning Criteria for Discourse-Aware Sentence Representations
Authors:
Mingda Chen,
Zewei Chu,
Kevin Gimpel
Abstract:
Prior work on pretrained sentence embeddings and benchmarks focus on the capabilities of stand-alone sentences. We propose DiscoEval, a test suite of tasks to evaluate whether sentence representations include broader context information. We also propose a variety of training objectives that makes use of natural annotations from Wikipedia to build sentence encoders capable of modeling discourse. We…
▽ More
Prior work on pretrained sentence embeddings and benchmarks focus on the capabilities of stand-alone sentences. We propose DiscoEval, a test suite of tasks to evaluate whether sentence representations include broader context information. We also propose a variety of training objectives that makes use of natural annotations from Wikipedia to build sentence encoders capable of modeling discourse. We benchmark sentence encoders pretrained with our proposed training objectives, as well as other popular pretrained sentence encoders on DiscoEval and other sentence evaluation tasks. Empirically, we show that these training objectives help to encode different aspects of information in document structures. Moreover, BERT and ELMo demonstrate strong performances over DiscoEval with individual hidden layers showing different characteristics.
△ Less
Submitted 7 November, 2019; v1 submitted 31 August, 2019;
originally announced September 2019.
-
EntEval: A Holistic Evaluation Benchmark for Entity Representations
Authors:
Mingda Chen,
Zewei Chu,
Yang Chen,
Karl Stratos,
Kevin Gimpel
Abstract:
Rich entity representations are useful for a wide class of problems involving entities. Despite their importance, there is no standardized benchmark that evaluates the overall quality of entity representations. In this work, we propose EntEval: a test suite of diverse tasks that require nontrivial understanding of entities including entity typing, entity similarity, entity relation prediction, and…
▽ More
Rich entity representations are useful for a wide class of problems involving entities. Despite their importance, there is no standardized benchmark that evaluates the overall quality of entity representations. In this work, we propose EntEval: a test suite of diverse tasks that require nontrivial understanding of entities including entity typing, entity similarity, entity relation prediction, and entity disambiguation. In addition, we develop training techniques for learning better entity representations by using natural hyperlink annotations in Wikipedia. We identify effective objectives for incorporating the contextual information in hyperlinks into state-of-the-art pretrained language models and show that they improve strong baselines on multiple EntEval tasks.
△ Less
Submitted 11 November, 2019; v1 submitted 31 August, 2019;
originally announced September 2019.
-
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Authors:
Zhigang Chu,
Andrea Pinceti,
Reetam Sen Biswas,
Oliver Kosut,
Anamitra Pal,
Lalitha Sankar
Abstract:
Intelligently designed false data injection (FDI) attacks have been shown to be able to bypass the $χ^2$-test based bad data detector (BDD), resulting in physical consequences (such as line overloads) in the power system. In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it. However, an attacker can gra…
▽ More
Intelligently designed false data injection (FDI) attacks have been shown to be able to bypass the $χ^2$-test based bad data detector (BDD), resulting in physical consequences (such as line overloads) in the power system. In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it. However, an attacker can gradually increase the magnitude of the attack to avoid detection, and still cause damage to the system.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
PoMo: Generating Entity-Specific Post-Modifiers in Context
Authors:
Jun Seok Kang,
Robert L. Logan IV,
Zewei Chu,
Yang Chen,
Dheeru Dua,
Kevin Gimpel,
Sameer Singh,
Niranjan Balasubramanian
Abstract:
We introduce entity post-modifier generation as an instance of a collaborative writing task. Given a sentence about a target entity, the task is to automatically generate a post-modifier phrase that provides contextually relevant information about the entity. For example, for the sentence, "Barack Obama, _______, supported the #MeToo movement.", the phrase "a father of two girls" is a contextually…
▽ More
We introduce entity post-modifier generation as an instance of a collaborative writing task. Given a sentence about a target entity, the task is to automatically generate a post-modifier phrase that provides contextually relevant information about the entity. For example, for the sentence, "Barack Obama, _______, supported the #MeToo movement.", the phrase "a father of two girls" is a contextually relevant post-modifier. To this end, we build PoMo, a post-modifier dataset created automatically from news articles reflecting a journalistic need for incorporating entity information that is relevant to a particular news event. PoMo consists of more than 231K sentences with post-modifiers and associated facts extracted from Wikidata for around 57K unique entities. We use crowdsourcing to show that modeling contextual relevance is necessary for accurate post-modifier generation. We adapt a number of existing generation approaches as baselines for this dataset. Our results show there is large room for improvement in terms of both identifying relevant facts to include (knowing which claims are relevant gives a >20% improvement in BLEU score), and generating appropriate post-modifier text for the context (providing relevant claims is not sufficient for accurate generation). We conduct an error analysis that suggests promising directions for future research.
△ Less
Submitted 8 April, 2019; v1 submitted 5 April, 2019;
originally announced April 2019.
-
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks
Authors:
Zhigang Chu,
Jiazi Zhang,
Oliver Kosut,
Lalitha Sankar
Abstract:
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. Understanding the consequences of these attacks req…
▽ More
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. Understanding the consequences of these attacks requires consideration of power system operations commonly used in practice, specifically real-time contingency analysis (RTCA) and security constrained economic dispatch (SCED). An ADBLP is formulated with detailed assumptions on attacker's knowledge, and a modified Benders' decomposition algorithm is introduced to solve such an ADBLP. The vulnerability analysis results presented for the synthetic Texas system with 2000 buses show that intelligent FDI attacks can cause post-contingency overflows.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
CN-Probase: A Data-driven Approach for Large-scale Chinese Taxonomy Construction
Authors:
Jindong Chen,
Ao Wang,
Jiangjie Chen,
Yanghua Xiao,
Zhendong Chu,
Jingping Liu,
Jiaqing Liang,
Wei Wang
Abstract:
Taxonomies play an important role in machine intelligence. However, most well-known taxonomies are in English, and non-English taxonomies, especially Chinese ones, are still very rare. In this paper, we focus on automatic Chinese taxonomy construction and propose an effective generation and verification framework to build a large-scale and high-quality Chinese taxonomy. In the generation module, w…
▽ More
Taxonomies play an important role in machine intelligence. However, most well-known taxonomies are in English, and non-English taxonomies, especially Chinese ones, are still very rare. In this paper, we focus on automatic Chinese taxonomy construction and propose an effective generation and verification framework to build a large-scale and high-quality Chinese taxonomy. In the generation module, we extract isA relations from multiple sources of Chinese encyclopedia, which ensures the coverage. To further improve the precision of taxonomy, we apply three heuristic approaches in verification module. As a result, we construct the largest Chinese taxonomy with high precision about 95% called CN-Probase. Our taxonomy has been deployed on Aliyun, with over 82 million API calls in six months.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
Visualization of Local Conductance in MoS2/WSe2 Heterostructure Transistors
Authors:
Di Wu,
Wei Li,
Amritesh Rai,
Xiaoyu Wu,
Hema C. P. Movva,
Maruthi N. Yogeesh,
Zhaodong Chu,
Sanjay K. Banerjee,
Deji Akinwande,
Keji Lai
Abstract:
The vertical stacking of van der Waals (vdW) materials introduces a new degree of freedom to the research of two-dimensional (2D) systems. The interlayer coupling strongly influences the band structure of the heterostructures, resulting in novel properties that can be utilized for electronic and optoelectronic applications. Based on microwave microscopy studies, we report quantitative electrical i…
▽ More
The vertical stacking of van der Waals (vdW) materials introduces a new degree of freedom to the research of two-dimensional (2D) systems. The interlayer coupling strongly influences the band structure of the heterostructures, resulting in novel properties that can be utilized for electronic and optoelectronic applications. Based on microwave microscopy studies, we report quantitative electrical imaging on gated molybdenum disulfide (MoS2)/tungsten diselenide (WSe2) heterostructure devices, which exhibit an intriguing anti-ambipolar effect in the transfer characteristics. Interestingly, in the region with significant source-drain current, electrons in the n-type MoS2 and holes in the p-type WSe2 segments are nearly balanced, whereas the heterostructure area is depleted of mobile charges. The configuration is analogous to the p-i-n diode, where the injected carriers dominate in the recombination current. The spatial evolution of local conductance can be ascribed to the lateral band bending and formation of depletion regions along the line of MoS2-heterostructure-WSe2. Our work vividly demonstrates the microscopic origin of novel transport behaviors, which is important for the vibrant field of vdW heterojunction research.
△ Less
Submitted 21 February, 2019;
originally announced February 2019.
-
Localization of Epileptic Seizure Focus by Computerized Analysis of fMRI Recordings
Authors:
Rasoul Hekmati,
Robert Azencott,
Wei Zhang,
Zili D. Chu,
Michael J. Paldino
Abstract:
By computerized analysis of cortical activity recorded via fMRI for pediatric epilepsy patients, we implement algorithmic localization of epileptic seizure focus within one of eight cortical lobes. Our innovative machine learning techniques involve intensive analysis of large matrices of mutual information coefficients between pairs of anatomically identified cortical regions. Drastic selection of…
▽ More
By computerized analysis of cortical activity recorded via fMRI for pediatric epilepsy patients, we implement algorithmic localization of epileptic seizure focus within one of eight cortical lobes. Our innovative machine learning techniques involve intensive analysis of large matrices of mutual information coefficients between pairs of anatomically identified cortical regions. Drastic selection of pairs of regions with significant inter-connectivity provide efficient inputs for our Multi-Layer Perceptron (MLP) classifier. By imposing rigorous parameter parsimony to avoid over fitting we construct a small size MLP with very good percentages of successful classification.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Theoretical design of a strain-controlled nanoporous CN membrane for helium separation
Authors:
Yongchao Rao,
Zhaoqin Chu,
Xiao Gu,
Xiangmei Duan
Abstract:
Designing an efficient membrane for He purification is quite crucial in scientific and industrial applications. Ultrathin membranes with intrinsic pores are highly desirable for gas purification because of their controllable aperture and homogeneous hole distribution. Based on the first-principles density function theory and molecular dynamics simulations, we demonstrate that the compressively str…
▽ More
Designing an efficient membrane for He purification is quite crucial in scientific and industrial applications. Ultrathin membranes with intrinsic pores are highly desirable for gas purification because of their controllable aperture and homogeneous hole distribution. Based on the first-principles density function theory and molecular dynamics simulations, we demonstrate that the compressively strained graphitic carbon nitride (CN) can effectively purify He from Ne and Ar. Under a -6% strain, the CN monolayer with a suitable pore size presents an easily surmountable barrier for He (0.11 eV) but formidable for Ne (0.51 eV) and Ar (2.45 eV) passing through the membrane, and it exhibits exceptionally high selectivity of 5.17*10^6 for He/Ne and 1.89*10^39 for He/Ar, as well as excellent He permeance of 1.94*10^7 GPU at room temperature, superior to those of porous graphene and C2N membrane. Our results confirm that strain-tuned CN membrane could be potentially utilized for He separating from other noble gases.
△ Less
Submitted 27 November, 2018;
originally announced November 2018.
-
Energy-resolved Photoconductivity Mapping in a Monolayer-bilayer WSe2 Lateral Heterostructure
Authors:
Zhaodong Chu,
Ali Han,
Chao Lei,
Sergei Lopatin,
Peng Li,
David Wannlund,
Di Wu,
Kevin Herrera,
Xixiang Zhang,
Allan H. MacDonald,
Xiaoqin Li,
Lain-Jong Li,
Keji Lai
Abstract:
Vertical and lateral heterostructures of van der Waals materials provide tremendous flexibility for band structure engineering. Since electronic bands are sensitively affected by defects, strain, and interlayer coupling, the edge and heterojunction of these two-dimensional (2D) systems may exhibit novel physical properties, which can be fully revealed only by spatially resolved probes. Here, we re…
▽ More
Vertical and lateral heterostructures of van der Waals materials provide tremendous flexibility for band structure engineering. Since electronic bands are sensitively affected by defects, strain, and interlayer coupling, the edge and heterojunction of these two-dimensional (2D) systems may exhibit novel physical properties, which can be fully revealed only by spatially resolved probes. Here, we report the spatial mapping of photoconductivity in a monolayer-bilayer WSe2 lateral heterostructure under multiple excitation lasers. As the photon energy increases, the light-induced conductivity detected by microwave impedance microscopy first appears along the hetero-interface and bilayer edge, then along the monolayer edge, inside the bilayer area, and finally in the interior of the monolayer region. The sequential emergence of mobile carriers in different sections of the sample is consistent with the theoretical calculation of local energy gaps. Quantitative analysis of the microscopy and transport data also reveals the linear dependence of photoconductivity on the laser intensity and the influence of interlayer coupling on carrier recombination. Combining theoretical modeling, atomic scale imaging, mesoscale impedance microscopy, and device-level characterization, our work suggests an exciting perspective to control the intrinsic band-gap variation in 2D heterostructures down to the few-nanometer regime.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks
Authors:
Zhigang Chu,
Jiazi Zhang,
Oliver Kosut,
Lalitha Sankar
Abstract:
This paper studies false data injection (FDI) attacks against phasor measurement units (PMUs). As compared to the conventional bad data detector (BDD), an enhanced BDD utilizing the effect of zero injection buses is proposed. Feasible conditions under which FDI attacks are unobservable to this enhanced BDD are discussed. In addition, a class of multiplicative FDI attacks that maintain the rank of…
▽ More
This paper studies false data injection (FDI) attacks against phasor measurement units (PMUs). As compared to the conventional bad data detector (BDD), an enhanced BDD utilizing the effect of zero injection buses is proposed. Feasible conditions under which FDI attacks are unobservable to this enhanced BDD are discussed. In addition, a class of multiplicative FDI attacks that maintain the rank of the PMU measurement matrix is introduced. Simulation results on the IEEE RTS-24-bus system indicate that the these multiplicative unobservable attacks can avoid detection by both the enhanced BDD and a detector based on low-rank decomposition proposed in prior work.
△ Less
Submitted 13 September, 2018; v1 submitted 11 June, 2018;
originally announced June 2018.
-
Enhancing PHY Security of MISO NOMA SWIPT Systems With a Practical Non-Linear EH Model
Authors:
Fuhui Zhou,
Zheng Chu,
Yongpeng Wu,
Naofal Al-Dhahir,
Pei Xiao
Abstract:
Non-orthogonal multiple-access (NOMA) and simultaneous wireless information and power transfer (SWIPT) are promising techniques to improve spectral efficiency and energy efficiency. However, the security of NOMA SWIPT systems has not received much attention in the literature. In this paper, an artificial noise-aided beamforming design problem is studied to enhance the security of a multiple-input…
▽ More
Non-orthogonal multiple-access (NOMA) and simultaneous wireless information and power transfer (SWIPT) are promising techniques to improve spectral efficiency and energy efficiency. However, the security of NOMA SWIPT systems has not received much attention in the literature. In this paper, an artificial noise-aided beamforming design problem is studied to enhance the security of a multiple-input single-output NOMA SWIPT system where a practical non-linear energy harvesting model is adopted. The problem is non-convex and challenging to solve. Two algorithms are proposed to tackle this problem based on semidefinite relaxation (SDR) and successive convex approximation. Simulation results show that a performance gain can be obtained by using NOMA compared to the conventional orthogonal multiple access. It is also shown that the performance of the algorithm using a cost function is better than the algorithm using SDR at the cost of a higher computation complexity.
△ Less
Submitted 11 June, 2018;
originally announced June 2018.
-
The Magnification Invariant of Circularly-symmetric Lens Models
Authors:
Chengliang Wei,
Zhe Chu,
Yiping Shu
Abstract:
In the context of strong gravitational lensing, the magnification of image is of crucial importance to constrain various lens models. For several commonly used quadruple lens models, the magnification invariants, defined as the sum of the signed magnifications of images, have been analytically derived when the image multiplicity is a maximum. In this paper, we further study the magnification of se…
▽ More
In the context of strong gravitational lensing, the magnification of image is of crucial importance to constrain various lens models. For several commonly used quadruple lens models, the magnification invariants, defined as the sum of the signed magnifications of images, have been analytically derived when the image multiplicity is a maximum. In this paper, we further study the magnification of several disk lens models, including (a) exponential disk lens, (b) Gaussian disk lens, (c) modified Hubble profile lens, and another two of the popular three-dimensional symmetrical lens model, (d) NFW lens and (e) Einasto lens. We find that magnification invariant does also exist for each lens model. Moreover, our results show that magnification invariants can be significantly changed by the characteristic surface mass density $κ_{\rm c}$.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
Correlation between Dzyaloshinskii Moriya interaction and spin mixing conductance at antiferromagnet / ferromagnet interface
Authors:
Xin Ma,
Guoqiang Yu,
Seyed A. Razavi,
Liang Chang,
Lei Deng,
Zhaodong Chu,
Congli He,
Kang L. Wang,
Xiaoqin Li
Abstract:
The rich interaction phenomena at antiferromagnet (AFM)/ ferromagnet (FM) interfaces are key ingredients in AFM spintronics, where many underlying mechanisms remain unclear. Here we report a correlation observed between interfacial Dzyaloshinskii-Moriya interaction (DMI) Ds and effective spin mixing conductance g at IrMn/CoFeB interface. Both Ds and g are quantitatively determined with Brillouin l…
▽ More
The rich interaction phenomena at antiferromagnet (AFM)/ ferromagnet (FM) interfaces are key ingredients in AFM spintronics, where many underlying mechanisms remain unclear. Here we report a correlation observed between interfacial Dzyaloshinskii-Moriya interaction (DMI) Ds and effective spin mixing conductance g at IrMn/CoFeB interface. Both Ds and g are quantitatively determined with Brillouin light scattering measurements, and increase with IrMn thickness in the range of 2.5~7.5 nm. Such correlation likely originates from the AFM-states-mediated spin-flip transitions in FM, which promote both interfacial DMI and spin pumping effect. Our findings provide deeper insight into the AFM-FM interfacial coupling for future spintronic design.
△ Less
Submitted 19 July, 2018; v1 submitted 13 April, 2018;
originally announced April 2018.
-
Secure Wireless Powered and Cooperative Jamming D2D Communications
Authors:
Zheng Chu,
Huan X. Nguyen,
Tuan Anh Le,
Mehmet Karamanoglu,
Enver Ever,
Adnan Yazici
Abstract:
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular an…
▽ More
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT
Authors:
Fuhui Zhou,
Zheng Chu,
Haijian Sun,
Rose Qingyang Hu,
Lajos Hanzo
Abstract:
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two promising technologies due to their potential to achieve high spectral efficiency and massive connectivity. This paper studies a multiple-input single-output NOMA CR network relying on simultaneous wireless information and power transfer (SWIPT) conceived for supporting a massive population of power limited battery…
▽ More
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two promising technologies due to their potential to achieve high spectral efficiency and massive connectivity. This paper studies a multiple-input single-output NOMA CR network relying on simultaneous wireless information and power transfer (SWIPT) conceived for supporting a massive population of power limited battery-driven devices. In contrast to most of the existing works, which use an ideally linear energy harvesting model, this study applies a more practical non-linear energy harvesting model. In order to improve the security of the primary network, an artificial-noise-aided cooperative jamming scheme is proposed. The artificial-noise-aided beamforming design problems are investigated subject to the practical secrecy rate and energy harvesting constraints. Specifically, the transmission power minimization problems are formulated under both perfect channel state information (CSI) and the bounded CSI error model. The problems formulated are non-convex, hence they are challenging to solve. A pair of algorithms either using semidefinite relaxation (SDR) or a cost function are proposed for solving these problems. Our simulation results show that the proposed cooperative jamming scheme succeeds in establishing secure communications and NOMA is capable of outperforming the conventional orthogonal multiple access in terms of its power efficiency. Finally, we demonstrate that the cost function algorithm outperforms the SDR-based algorithm.
△ Less
Submitted 20 February, 2018;
originally announced February 2018.
-
Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT
Authors:
Fuhui Zhou,
Zheng Chu,
Haijian Sun,
Victor C. M. Leung
Abstract:
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the pr…
▽ More
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the primary and secondary network, an artificial noise-aided cooperative jamming scheme is proposed. Different from the most existing works, a power minimization problem is formulated under a practical non-linear energy harvesting model. A suboptimal scheme is proposed to solve this problem based on semidefinite relaxation and successive convex approximation. Simulation results show that the proposed cooperative jamming scheme is efficient to achieve secure communication and NOMA outperforms the conventional orthogonal multiple access in terms of the power consumption.
△ Less
Submitted 12 February, 2018;
originally announced February 2018.
-
UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design
Authors:
Fuhui Zhou,
Yongpeng Wu,
Haijian Sun,
Zheng Chu
Abstract:
With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of shor…
▽ More
With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of short-distance line-of-sight achieved by leveraging unmanned aerial vehicle (UAV) communications, an UAV-enabled wireless powered MEC system is studied. A power minimization problem is formulated subject to the constraints on the number of the computation bits and energy harvesting causality. The problem is non-convex and challenging to tackle. An alternative optimization algorithm is proposed based on sequential convex optimization. Simulation results show that our proposed design is superior to other benchmark schemes and the proposed algorithm is efficient in terms of the convergence.
△ Less
Submitted 12 February, 2018;
originally announced February 2018.
-
AN-aided Secure Transmission in Multi-user MIMO SWIPT Systems
Authors:
Zhengyu Zhu,
Ning Wang,
Zheng Chu,
Zhongyong Wang,
Inkyu Lee
Abstract:
In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested…
▽ More
In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested energy constraints. The original problem is shown to be non-convex, which is tackled by a two-layer decomposition approach. The inner layer problem is solved through semi-definite relaxation, and the outer problem is shown to be a single-variable optimization that can be solved by one-dimensional (1-D) line search. To reduce computational complexity, a sequential parametric convex approximation (SPCA) method is proposed to find a near-optimal solution. Furthermore, tightness of the relaxation for the 1-D search method is validated by showing that the optimal solution of the relaxed problem is rank-one. Simulation results demonstrate that the proposed SPCA method achieves the same performance as the scheme based on 1-D search method but with much lower complexity.
△ Less
Submitted 1 February, 2018;
originally announced February 2018.
-
Energy Harvesting Fairness in AN-aided Secure MU-MIMO SWIPT Systems with Cooperative Jammer
Authors:
Zhengyu Zhu,
Zheng Chu,
Ning Wang,
Zhongyong Wang,
Inkyu Lee
Abstract:
In this paper, we study a multi-user multiple-input-multiple-output secrecy simultaneous wireless information and power transfer (SWIPT) channel which consists of one transmitter, one cooperative jammer (CJ), multiple energy receivers (potential eavesdroppers, ERs), and multiple co-located receivers (CRs). We exploit the dual of artificial noise (AN) generation for facilitating efficient wireless…
▽ More
In this paper, we study a multi-user multiple-input-multiple-output secrecy simultaneous wireless information and power transfer (SWIPT) channel which consists of one transmitter, one cooperative jammer (CJ), multiple energy receivers (potential eavesdroppers, ERs), and multiple co-located receivers (CRs). We exploit the dual of artificial noise (AN) generation for facilitating efficient wireless energy transfer and secure transmission. Our aim is to maximize the minimum harvested energy among ERs and CRs subject to secrecy rate constraints for each CR and total transmit power constraint. By incorporating norm-bounded channel uncertainty model, we propose a iterative algorithm based on sequential parametric convex approximation to find a near-optimal solution. Finally, simulation results are presented to validate the performance of the proposed algorithm outperforms that of the conventional AN-aided scheme and CJ-aided scheme.
△ Less
Submitted 1 February, 2018;
originally announced February 2018.
-
Robust Designs of Beamforming and Power Splitting for Distributed Antenna Systems with Wireless Energy Harvesting
Authors:
Zhengyu Zhu,
Sai Huang,
Zheng Chu,
Fuhui Zhou,
Di Zhang,
Inkyu Lee
Abstract:
In this paper, we investigate a multiuser distributed antenna system with simultaneous wireless information and power transmission under the assumption of imperfect channel state information (CSI). In this system, a distributed antenna port with multiple antennas supports a set of mobile stations who can decode information and harvest energy simultaneously via a power splitter. To design robust tr…
▽ More
In this paper, we investigate a multiuser distributed antenna system with simultaneous wireless information and power transmission under the assumption of imperfect channel state information (CSI). In this system, a distributed antenna port with multiple antennas supports a set of mobile stations who can decode information and harvest energy simultaneously via a power splitter. To design robust transmit beamforming vectors and the power splitting (PS) factors in the presence of CSI errors, we maximize the average worst-case signal-to-interference-plus- noise ratio (SINR) while achieving individual energy harvesting constraint for each mobile station. First, we develop an efficient algorithm to convert the max-min SINR problem to a set of "dual" min-max power balancing problems. Then, motivated by the penalty function method, an iterative algorithm based on semi-definite programming (SDP) is proposed to achieve a local optimal rank-one solution. Also, to reduce the computational complexity, we present another iterative scheme based on the Lagrangian method and the successive convex approximation (SCA) technique to yield a suboptimal solution. Simulation results are shown to validate the robustness and effectiveness of the proposed algorithms.
△ Less
Submitted 31 January, 2018;
originally announced January 2018.
-
Tailoring Semiconductor Lateral Multi-junctions for Giant Photoconductivity Enhancement
Authors:
Yutsung Tsai,
Zhaodong Chu,
Yimo Han,
Chih-Piao Chuu,
Di Wu,
Alex Johnson,
Fei Cheng,
Mei-Yin Chou,
David A. Muller,
Xiaoqin Li,
Keji Lai,
Chih-Kang Shih
Abstract:
Semiconductor heterostructures have played a critical role as the enabler for new science and technology. The emergence of transition metal dichalcogenides (TMDs) as atomically thin semiconductors has opened new frontiers in semiconductor heterostructures either by stacking different TMDs to form vertical heterojunctions or by stitching them laterally to form lateral heterojunctions via direct gro…
▽ More
Semiconductor heterostructures have played a critical role as the enabler for new science and technology. The emergence of transition metal dichalcogenides (TMDs) as atomically thin semiconductors has opened new frontiers in semiconductor heterostructures either by stacking different TMDs to form vertical heterojunctions or by stitching them laterally to form lateral heterojunctions via direct growth. In conventional semiconductor heterostructures, the design of multi-junctions is critical to achieve carrier confinement. Analogously, we report successful synthesis of monolayer WS2/WS2(1-x)Se2x/WS2 multi-junction lateral heterostructure via direct growth by chemical vapor deposition. The grown structures are characterized by Raman, photoluminescence, and annular dark-field scanning transmission electron microscopy to determine its lateral compositional profile. More importantly, using microwave impedance microscopy, we demonstrate that the local photoconductivity in the alloy region can be tailored and enhanced by 2 orders of magnitude over pure WS2. Finite element analysis confirms that this effect is due to the carrier diffusion and confinement into the alloy region. Our work exemplifies the technological potential of atomically thin lateral heterostructures in optoelectronic applications.
△ Less
Submitted 15 September, 2017;
originally announced September 2017.
-
Out-of-plane Piezoelectricity and Ferroelectricity in Layered $α$-In2Se3 Nano-flakes
Authors:
Yu Zhou,
Di Wu,
Yihan Zhu,
Yujin Cho,
Qing He,
Xiao Yang,
Kevin Herrera,
Zhaodong Chu,
Yu Han,
Michael C. Downer,
Hailin Peng,
Keji Lai
Abstract:
Piezoelectric and ferroelectric properties in the two dimensional (2D) limit are highly desired for nanoelectronic, electromechanical, and optoelectronic applications. Here we report the first experimental evidence of out-of-plane piezoelectricity and ferroelectricity in van der Waals layered $α$-In2Se3 nano-flakes. The non-centrosymmetric R3m symmetry of the $α$-In2Se3 samples is confirmed by sca…
▽ More
Piezoelectric and ferroelectric properties in the two dimensional (2D) limit are highly desired for nanoelectronic, electromechanical, and optoelectronic applications. Here we report the first experimental evidence of out-of-plane piezoelectricity and ferroelectricity in van der Waals layered $α$-In2Se3 nano-flakes. The non-centrosymmetric R3m symmetry of the $α$-In2Se3 samples is confirmed by scanning transmission electron microscopy, second-harmonic generation, and Raman spectroscopy measurements. Domains with opposite polarizations are visualized by piezo-response force microscopy. Single-point poling experiments suggest that the polarization is potentially switchable for $α$-In2Se3 nano-flakes with thicknesses down to ~ 10 nm. The piezotronic effect is demonstrated in two-terminal devices, where the Schottky barrier can be modulated by the strain-induced piezopotential. Our work on polar $α$-In2Se3, one of the model 2D piezoelectrics and ferroelectrics with simple crystal structures, shows its great potential in electronic and photonic applications.
△ Less
Submitted 29 August, 2017;
originally announced August 2017.
-
Optimal Transmit Beamforming for Secure SWIPT in Heterogeneous Networks
Authors:
Bin Li,
Zesong Fei,
Zheng Chu
Abstract:
This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be considered as a potential eaves- dropper for messages intended for information receiver…
▽ More
This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be considered as a potential eaves- dropper for messages intended for information receiver (IR). Our objective is to maximize the secrecy rate at IR subject to the signal-to-interference-plus noise ratio (SINR) requirements of macro users (MUs), transmit power constraint and energy harvesting constraint. Due to the non-convexity of the formulated problem, it cannot be solved directly. Thus, we propose a novel reformulation by using first-order Taylor expansion and successive convex approximation (SCA) techniques. Furthermore, an SCA-based algorithm with low complexity is proposed to arrive at provably convergent solution. Finally, numerical results evaluate the performance of the proposed algorithm.
△ Less
Submitted 22 July, 2017;
originally announced July 2017.
-
Energy-Efficient Power Allocation in Millimeter Wave Massive MIMO with Non-Orthogonal Multiple Access
Authors:
Wanming Hao,
Ming Zeng,
Zheng Chu,
Shouyi Yang
Abstract:
In this letter, we investigate the energy efficiency (EE) problem in a millimeter wave (mmWave) massive MIMO (mMIMO) system with non-orthogonal multiple access (NOMA). Multiple two-user clusters are formulated according to their channel correlation and gain difference. Following this, we propose a hybrid analog/digital precoding scheme for the low radio frequency (RF) chains structure at the base…
▽ More
In this letter, we investigate the energy efficiency (EE) problem in a millimeter wave (mmWave) massive MIMO (mMIMO) system with non-orthogonal multiple access (NOMA). Multiple two-user clusters are formulated according to their channel correlation and gain difference. Following this, we propose a hybrid analog/digital precoding scheme for the low radio frequency (RF) chains structure at the base station (BS). On this basis, we formulate a power allocation problem aiming to maximize the EE under users' quality of service (QoS) requirements and per-cluster power constraint. An iterative algorithm is proposed to obtain the optimal power allocation. Simulation results show that the proposed NOMA achieves superior EE performance than that of conventional OMA.
△ Less
Submitted 14 July, 2017;
originally announced July 2017.
-
Resource Allocations for Secure Cognitive Satellite Terrestrial Networks
Authors:
Bin Li,
Zesong Fei,
Xiaoming Xu,
Zheng Chu
Abstract:
Cognitive satellite-terrestrial networks (STNs) have been recognized as the promising architecture for addressing spectrum scarcity in the next generation communication networks. In this letter, we investigate the secure transmission schemes in the cognitive STNs where the interference from terrestrial base station (BS) is introduced to enhance security of the satellite link. Our objectives are to…
▽ More
Cognitive satellite-terrestrial networks (STNs) have been recognized as the promising architecture for addressing spectrum scarcity in the next generation communication networks. In this letter, we investigate the secure transmission schemes in the cognitive STNs where the interference from terrestrial base station (BS) is introduced to enhance security of the satellite link. Our objectives are to minimize the transmit power by jointly optimizing the cooperative beamforming and artificial noise (AN) while guaranteeing the secrecy rate constraint for satellite link, the information rate constraint for terrestrial link and the total transmit power constraint. Both scenarios of the perfect and imperfect channel cases are respectively considered. These constraints make the optimization problems formulated non-convex and challenging, which are efficiently solved via certain transformations to be formulated more tractable versions, respectively. Numerical results are provided to corroborate the proposed schemes.
△ Less
Submitted 5 July, 2017;
originally announced July 2017.
-
Resource Allocation Strategies for Secure WPCN Multiantenna Multicasting Systems
Authors:
Zheng Chu,
Huan X. Nguyen,
Giuseppe Caire
Abstract:
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply bef…
▽ More
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure communication. We consider two different scenarios. In the first, the PBs and the transmitter belong to the same operator, where we formulate the resource allocation problem as the minimization of the total transmit power subject to the target secure rate constraint. The solution of this problem yields both the optimal power and energy transfer time allocation. Due to the non-convexity of this problem, we propose a two-level approach, where the inner level problem can be recast as a convex optimization framework via conic convex reformulation, while the outer level problem can be handled by using one-dimensional (1D) search. The second scenario considers the case where the transmitter and the PBs belong to different service suppliers. Hence, we formulate the resource allocation problem where we consider incentives for the PBs to assist the transmitter. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system. The transmitter has to pay for the energy services from these multiple PBs in order to facilitate secure communications. In this game, the transmitter and the PB are modelled as leader and follower, respectively, in which both of them try to maximize their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived. Finally, numerical results are provided to validate our proposed schemes.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Robust Sum Secrecy Rate Optimization for MIMO Two-way Full Duplex Systems
Authors:
Zheng Chu,
Tuan Anh Le,
Huan X. Nguyen,
Arumugam Nallanathan,
Mehmet Karamanoglu
Abstract:
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the…
▽ More
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the outage probability constraint of the achievable sum secrecy rate and the transmit power constraint. Unlike other existing channel uncertainty models, e.g., norm-bounded and Gaussian-distribution, we exploit a moment-based random distributed CSI channel uncertainty model to recast our formulate RSSRM problem into the convex optimization frameworks based on a Markov's inequality and robust conic reformulation, i.e., semidefinite programming (SDP). In addition, difference-of-concave (DC) approximation is employed to iteratively tackle the transmit covariance matrices of these legitimate nodes. Simulation results are provided to validate our proposed FD approaches.
△ Less
Submitted 17 May, 2017;
originally announced May 2017.
-
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks
Authors:
Zhigang Chu,
Jiazi Zhang,
Oliver Kosut,
Lalitha Sankar
Abstract:
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level m…
▽ More
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level mixed-integer linear program, but it is hard to solve on large power systems due to numerical difficulties. In this paper, four computationally efficient algorithms are presented to solve the attack optimization problem on large power systems. These algorithms are applied on the IEEE 118-bus system and the Polish system with 2383 buses to conduct vulnerability assessments, and they provide feasible attacks that cause line overflows, as well as upper bounds on the maximal power flow resulting from any attack.
△ Less
Submitted 1 November, 2020; v1 submitted 10 May, 2017;
originally announced May 2017.
-
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
Authors:
Jiazi Zhang,
Zhigang Chu,
Lalitha Sankar,
Oliver Kosut
Abstract:
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correl…
▽ More
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correlation of PMU data is introduced. Such attacks are designed with a convex optimization problem and can always bypass the LD detector. The vulnerability of this attack model is illustrated on both the IEEE 24-bus RTS and the IEEE 118-bus systems.
△ Less
Submitted 4 May, 2017;
originally announced May 2017.
-
Secrecy Energy Efficiency Analysis of UAV-Enabled Communication Networks
Authors:
Xiaohui Qi,
Bin Li,
Zheng Chu,
Kaizhi Huang,
Hongbin Chen,
Zesong Fei
Abstract:
This paper proposes a tractable analysis framework to evaluate the reliability, security and secrecy energy efficiency (SEE) performance in a UAV-enabled communication network via a threshold-based access scheme and multi-antenna technique.
This paper proposes a tractable analysis framework to evaluate the reliability, security and secrecy energy efficiency (SEE) performance in a UAV-enabled communication network via a threshold-based access scheme and multi-antenna technique.
△ Less
Submitted 16 January, 2018; v1 submitted 6 April, 2017;
originally announced April 2017.
-
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
Authors:
Jiazi Zhang,
Zhigang Chu,
Lalitha Sankar,
Oliver Kosut
Abstract:
This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external ne…
▽ More
This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external network and the attack sub-network from historical data. The worst possible consequences of such FDI attacks are evaluated by solving a bi-level optimization problem wherein the first level models the limited attack resources, while the second level formulates the system response to such attacks via DC optimal power flow (OPF). The attack model with limited information is reflected in the DC OPF formulation that only takes into account the system information for the attack sub-network. The vulnerability of this attack model is illustrated on the IEEE 24-bus RTS and IEEE 118-bus systems.
△ Less
Submitted 1 May, 2018; v1 submitted 21 March, 2017;
originally announced March 2017.
-
Beamforming and Power Splitting Designs for AN-aided Secure Multi-user MIMO SWIPT Systems
Authors:
Zhengyu Zhu,
Zheng Chu,
Ning Wang,
Sai Huang,
Zhongyong Wang,
Inkyu Lee
Abstract:
In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested…
▽ More
In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested energy constraints. The original problem is shown to be non-convex, which is tackled by a two-layer decomposition approach. The inner layer problem is solved through semi-definite relaxation, and the outer problem, on the other hand, is shown to be a single- variable optimization that can be solved by one-dimensional (1- D) line search. To reduce computational complexity, a sequential parametric convex approximation (SPCA) method is proposed to find a near-optimal solution. The work is then extended to the imperfect channel state information case with norm-bounded channel errors. Furthermore, tightness of the relaxation for the proposed schemes are validated by showing that the optimal solution of the relaxed problem is rank-one. Simulation results demonstrate that the proposed SPCA method achieves the same performance as the scheme based on 1-D but with much lower complexity.
△ Less
Submitted 14 March, 2017;
originally announced March 2017.
-
Interfacial Control of Dzyaloshinskii Moriya Interaction in Heavy Metal_Ferromagnetic Metal Thin Film Heterostructures
Authors:
Xin Ma,
Guoqiang Yu,
Xiang Li,
Tao Wang,
Di Wu,
Kevin S. Olsson,
Zhaodong Chu,
Kyongmo An,
John Q. Xiao,
Kang L. Wang,
Xiaoqin Li
Abstract:
The interfacial Dzyaloshinskii Moriya Interaction (DMI) in ultrathin magnetic thin film heterostructures provides a new approach for controlling spin textures on mesoscopic length scales. Here we investigate the dependence of the interfacial DMI constant D on a Pt wedge insertion layer in Ta_CoFeB_Pt(wedge)_MgO thin films by observing the asymmetric spin wave dispersion using Brillouin light scatt…
▽ More
The interfacial Dzyaloshinskii Moriya Interaction (DMI) in ultrathin magnetic thin film heterostructures provides a new approach for controlling spin textures on mesoscopic length scales. Here we investigate the dependence of the interfacial DMI constant D on a Pt wedge insertion layer in Ta_CoFeB_Pt(wedge)_MgO thin films by observing the asymmetric spin wave dispersion using Brillouin light scattering. Continuous tuning of D by more than a factor of three is realized by inserting less than one monolayer of Pt. The observations provide new insights for designing magnetic thin film heterostructures with tailored D for controlling skyrmions and magnetic domain wall chirality and dynamics.
△ Less
Submitted 4 November, 2016;
originally announced November 2016.
-
Broad Context Language Modeling as Reading Comprehension
Authors:
Zewei Chu,
Hai Wang,
Kevin Gimpel,
David McAllester
Abstract:
Progress in text understanding has been driven by large datasets that test particular capabilities, like recent datasets for reading comprehension (Hermann et al., 2015). We focus here on the LAMBADA dataset (Paperno et al., 2016), a word prediction task requiring broader context than the immediate sentence. We view LAMBADA as a reading comprehension problem and apply comprehension models based on…
▽ More
Progress in text understanding has been driven by large datasets that test particular capabilities, like recent datasets for reading comprehension (Hermann et al., 2015). We focus here on the LAMBADA dataset (Paperno et al., 2016), a word prediction task requiring broader context than the immediate sentence. We view LAMBADA as a reading comprehension problem and apply comprehension models based on neural networks. Though these models are constrained to choose a word from the context, they improve the state of the art on LAMBADA from 7.3% to 49%. We analyze 100 instances, finding that neural network readers perform well in cases that involve selecting a name from the context based on dialogue or discourse cues but struggle when coreference resolution or external knowledge is needed.
△ Less
Submitted 16 February, 2017; v1 submitted 26 October, 2016;
originally announced October 2016.
-
Impact of Grain Boundaries on Efficiency and Stability of Organic-Inorganic Trihalide Perovskites
Authors:
Zhaodong Chu,
Mengjin Yang,
Philip Schulz,
Di Wu,
Xin Ma,
Edward Seifert,
Liuyang Sun,
Kai Zhu,
Xiaoqin Li,
Keji Lai
Abstract:
Organic-inorganic perovskite solar cells have attracted tremendous attention because of their remarkably high power conversion efficiencies (PCEs). To further improve the device performance, however, it is imperative to obtain fundamental understandings on the photo-response and long-term stability down to the microscopic level. Here, we report the first quantitative nanoscale photoconductivity im…
▽ More
Organic-inorganic perovskite solar cells have attracted tremendous attention because of their remarkably high power conversion efficiencies (PCEs). To further improve the device performance, however, it is imperative to obtain fundamental understandings on the photo-response and long-term stability down to the microscopic level. Here, we report the first quantitative nanoscale photoconductivity imaging on two methylammonium lead triiodide (MAPbI3) thin films with different PCEs by light-stimulated microwave impedance microscopy. The intrinsic photo-response is largely uniform across grains and grain boundaries, which is direct evidence on the inherently benign nature of microstructures in the perovskite thin films. In contrast, the carrier mobility and lifetime are strongly affected by bulk properties such as the sample crystallinity. As visualized by the spatial evolution of local photoconductivity, the degradation due to water diffusion through the capping layer begins with the disintegration of large grains rather than the nucleation and propagation from grain boundaries. Our findings provide new insights to improve the electro-optical properties of MAPbI3 thin films towards large-scale commercialization.
△ Less
Submitted 3 October, 2016;
originally announced October 2016.
-
Uncovering edge states and electrical inhomogeneity in MoS2 field-effect transistors
Authors:
Di Wu,
Xiao Li,
Lan Luan,
Xiaoyu Wu,
Wei Li,
Maruthi N. Yogeesh,
Rudresh Ghosh,
Zhaodong Chu,
Deji Akinwande,
Qian Niu,
Keji Lai
Abstract:
The understanding of various types of disorders in atomically thin transition metal dichalcogenides (TMDs), including dangling bonds at the edges, chalcogen deficiencies in the bulk, and charges in the substrate, is of fundamental importance for their applications in electronics and photonics. Because of the imperfections, electrons moving on these two-dimensional (2D) crystals experience a spatia…
▽ More
The understanding of various types of disorders in atomically thin transition metal dichalcogenides (TMDs), including dangling bonds at the edges, chalcogen deficiencies in the bulk, and charges in the substrate, is of fundamental importance for their applications in electronics and photonics. Because of the imperfections, electrons moving on these two-dimensional (2D) crystals experience a spatially non-uniform Coulomb environment, whose effect on the charge transport has not been microscopically studied. Here, we report the mesoscopic conductance mapping in monolayer and few-layer MoS2 field-effect transistors (FETs) by microwave impedance microscopy (MIM). The spatial evolution of the insulator-to-metal transition is clearly resolved. Interestingly, as the transistors are gradually turned on, electrical conduction emerges initially at the edges before appearing in the bulk of MoS2 flakes, which can be explained by our first-principles calculations. The results unambiguously confirm that the contribution of edge states to the channel conductance is significant under the threshold voltage but negligible once the bulk of the TMD device becomes conductive. Strong conductance inhomogeneity, which is associated with the fluctuations of disorder potential in the 2D sheets, is also observed in the MIM images, providing a guideline for future improvement of the device performance.
△ Less
Submitted 22 July, 2016;
originally announced July 2016.
-
Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization
Authors:
Zhigang Chu,
Jiazi Zhang,
Oliver Kosut,
Lalitha Sankar
Abstract:
Physical consequences to power systems of false data injection cyber-attacks are considered. Prior work has shown that the worst-case consequences of such an attack can be determined using a bi-level optimization problem, wherein an attack is chosen to maximize the physical power flow on a target line subsequent to re-dispatch. This problem can be solved as a mixed-integer linear program, but it i…
▽ More
Physical consequences to power systems of false data injection cyber-attacks are considered. Prior work has shown that the worst-case consequences of such an attack can be determined using a bi-level optimization problem, wherein an attack is chosen to maximize the physical power flow on a target line subsequent to re-dispatch. This problem can be solved as a mixed-integer linear program, but it is difficult to scale to large systems due to numerical challenges. Three new computationally efficient algorithms to solve this problem are presented. These algorithms provide lower and upper bounds on the system vulnerability measured as the maximum power flow subsequent to an attack. Using these techniques, vulnerability assessments are conducted for IEEE 118-bus system and Polish system with 2383 buses.
△ Less
Submitted 20 May, 2016;
originally announced May 2016.
-
Magnification relations of quad lenses and applications on Einstein crosses
Authors:
Zhe Chu,
G. L. Li,
W. P. Lin,
H. X. Pan
Abstract:
In this work, we mainly study the magnification relations of quad lens models for cusp, fold and cross configurations. By dividing and ray-tracing in different image regions, we numerically derive the positions and magnifications of the four images for a point source lying inside of the astroid caustic. Then, based on the magnifications, we calculate the signed cusp and fold relations for the sing…
▽ More
In this work, we mainly study the magnification relations of quad lens models for cusp, fold and cross configurations. By dividing and ray-tracing in different image regions, we numerically derive the positions and magnifications of the four images for a point source lying inside of the astroid caustic. Then, based on the magnifications, we calculate the signed cusp and fold relations for the singular isothermal elliptical lenses. The signed fold relation map has positive and negative regions, and the positive region is usually larger than the negative region as has been confirmed before. It can also explain that for many observed fold image pairs, the fluxes of the Fermat minimum images are apt to be larger than those of the saddle images. We define a new quantity cross relation which describes the magnification discrepancy between two minimum images and two saddle images. Distance ratio is also defined as the ratio of the distance of two saddle images to that of two minimum images. We calculate the cross relations and distance ratios for nine observed Einstein crosses. In theory, for most of the quad lens models, the cross relations decrease as the distance ratios increase. In observation, the cross relations of the nine samples do not agree with the quad lens models very well, nevertheless, the cross relations of the nine samples do not give obvious evidence for anomalous flux ratio as the cusp and fold types do. Then, we discuss several reasons for the disagreement, and expect good consistencies for more precise observations and better lens models in the future.
△ Less
Submitted 21 July, 2016; v1 submitted 28 April, 2016;
originally announced April 2016.
-
Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel
Authors:
Zheng Chu,
Martin Johnston,
Stephane Le Goff
Abstract:
This paper investigates simultaneous wireless information and power transfer (SWIPT) for multiuser multiple-input-single-output (MISO) secrecy channel. First, transmit beamfoming without artificial noise (AN) design is considered, where two secrecy rate optimization frameworks (i.e., secrecy rate maximization and harvested energy maximization) are investigated. These two optimization problems are…
▽ More
This paper investigates simultaneous wireless information and power transfer (SWIPT) for multiuser multiple-input-single-output (MISO) secrecy channel. First, transmit beamfoming without artificial noise (AN) design is considered, where two secrecy rate optimization frameworks (i.e., secrecy rate maximization and harvested energy maximization) are investigated. These two optimization problems are not convex, and cannot be solved directly. For secrecy rate maximization problem, we employ bisection method to optimize the associated power minimization problem, and first-order Taylor series expansion is consider to approximate the energy harvesting (EH) constraint and the harvested energy maximization problem. Moreover, we extend our proposed algorithm to the associated robust schemes by incorporating with channel uncertainties, where two-level method is proposed for the harvested energy maximization problem. Then, transmit beamforming with AN design is studied for the same secrecy rate maximization problem, which are reformulated into semidefinite programming (SDP) based on one-dimensional search and successive convex approximation (SCA), respectively. Moreover, tightness analysis of rank relaxation is provided to show the optimal transmit covariance matrix exactly returns rank-one. Simulation results is provided to validate the performance of the proposed algorithm.
△ Less
Submitted 22 March, 2015;
originally announced March 2015.
-
Cusp Summations and Cusp Relations of Simple Quad Lenses
Authors:
Zhe Chu,
G. L. Li,
W. P. Lin
Abstract:
We review five often used quad lens models, each of which has analytical solutions and can produce four images at most. Each lens model has two parameters, including one that describes the intensity of non-dimensional mass density, and the other one that describes the deviation from the circular lens. In our recent work, we have found that the cusp and the fold summations are not equal to 0, when…
▽ More
We review five often used quad lens models, each of which has analytical solutions and can produce four images at most. Each lens model has two parameters, including one that describes the intensity of non-dimensional mass density, and the other one that describes the deviation from the circular lens. In our recent work, we have found that the cusp and the fold summations are not equal to 0, when a point source infinitely approaches a cusp or a fold from inner side of the caustic. Based on the magnification invariant theory, which states that the sum of signed magnifications of the total images of a given source is a constant, we calculate the cusp summations for the five lens models. We find that the cusp summations are always larger than 0 for source on the major cusps, while can be larger or smaller than 0 for source on the minor cusps. We also find that if these lenses tend to the circular lens, the major and minor cusp summations will have infinite values, and with positive and negative signs respectively. The cusp summations do not change significantly if the sources are slightly deviated from the cusps. In addition, through the magnification invariants, we also derive the analytical signed cusp relations on the axes for three lens models. We find that both on the major and the minor axes the larger the lenses deviated from the circular lens, the larger the signed cusp relations. The major cusp relations are usually larger than the absolute minor cusp relations, but for some lens models with very large deviation from circular lens, the minor cusp relations can be larger than the major cusp relations.
△ Less
Submitted 1 March, 2015;
originally announced March 2015.
-
To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying
Authors:
Hong Xing,
Kai-Kit Wong,
Zheng Chu,
Arumugam Nallanathan
Abstract:
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our objective is to maximize the secrecy rate at the destination subject to the transmit power constraints of the AF relay and the HJ helpers. In the case of perfect channel state infor…
▽ More
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our objective is to maximize the secrecy rate at the destination subject to the transmit power constraints of the AF relay and the HJ helpers. In the case of perfect channel state information (CSI), the joint optimization of the artificial noise (AN) covariance matrix for cooperative jamming and the AF beamforming matrix is studied using semi-definite relaxation (SDR) which is tight, while suboptimal solutions are also devised with lower complexity. For the imperfect CSI case, we provide the equivalent reformulation of the worst-case robust optimization to maximize the minimum achievable secrecy rate. Inspired by the optimal solution to the case of perfect CSI, a suboptimal robust scheme is proposed striking a good tradeoff between complexity and performance. Finally, numerical results for various settings are provided to evaluate the proposed schemes.
△ Less
Submitted 21 October, 2015; v1 submitted 25 February, 2015;
originally announced February 2015.
-
Quantum Superposition States of Two Valleys in Graphene
Authors:
Jia-Bin Qiao,
Zhao-Dong Chu,
Liang-Mei Wu,
Lin He
Abstract:
A system in a quantum superposition of distinct states usually exhibits many peculiar behaviors. Here we show that putting quasiparticles of graphene into superpositions of states in the two valleys can complete change the properties of the massless Dirac fermions. Due to the coexistence of both the quantum and relativistic characteristics, the superposition states exhibit many oddball behaviors i…
▽ More
A system in a quantum superposition of distinct states usually exhibits many peculiar behaviors. Here we show that putting quasiparticles of graphene into superpositions of states in the two valleys can complete change the properties of the massless Dirac fermions. Due to the coexistence of both the quantum and relativistic characteristics, the superposition states exhibit many oddball behaviors in their chiral tunneling process. We further demonstrate that a recently observed line defect in graphene could be used to generate such superposition states. A possible experimental device to detect the novel behaviors of the relativistic superposition states in graphene is proposed.
△ Less
Submitted 22 August, 2014;
originally announced August 2014.
-
Crossover from Room-temperature Double-channel Ballistic Transport to Single-channel Ballistic Transport in Zigzag Graphene Nanoribbons
Authors:
Zhao-Dong Chu,
Lin He
Abstract:
Very recently, it was demonstrated explicitly that a zigzag graphene nanoribbon (GNR) exhibits a crossover of conductance from G0 to G0/2 with increasing the length (G0 = 2e2/h is the quantum of conductance) even at room-temperature [Baringhaus, et al. Nature 506, 349 (2014)]. Such a result is puzzling as none of previous theories seem to match the experimental observations. Here, we propose a mod…
▽ More
Very recently, it was demonstrated explicitly that a zigzag graphene nanoribbon (GNR) exhibits a crossover of conductance from G0 to G0/2 with increasing the length (G0 = 2e2/h is the quantum of conductance) even at room-temperature [Baringhaus, et al. Nature 506, 349 (2014)]. Such a result is puzzling as none of previous theories seem to match the experimental observations. Here, we propose a model to explain the crossover from double-channel to single-channel ballistic transport in zigzag GNR. The sp3 distortion of carbon atoms at the GNR edges induces a large spin-orbit coupling on the edges atoms, which enhances spin-flip scattering of edge states of the zigzag GNR. With sufficient spin-flip scattering, the wave-function of edge states becomes a superposition of the spin-up and spin-down components. Then the coupling of the two edges becomes important. This removes the edge degree of freedom in the zigzag GNR and results in the evolution of the conductance from G0 to G0/2 with increasing the length.
△ Less
Submitted 8 January, 2015; v1 submitted 1 August, 2014;
originally announced August 2014.
-
Angle-Dependent van Hove Singularities and Their Breakdown in Twisted Graphene Bilayers
Authors:
Wei Yan,
Lan Meng,
Mengxi Liu,
Jia-Bin Qiao,
Zhao-Dong Chu,
Rui-Fen Dou,
Zhongfan Liu,
Jia-Cai Nie,
Lin He
Abstract:
The creation of van der Waals heterostructures based on a graphene monolayer and other two-dimensional crystals has attracted great interest because atomic registry of the two-dimensional crystals can modify the electronic spectra and properties of graphene. Twisted graphene bilayer can be viewed as a special van der Waals structure composed of two mutual misoriented graphene layers, where the sub…
▽ More
The creation of van der Waals heterostructures based on a graphene monolayer and other two-dimensional crystals has attracted great interest because atomic registry of the two-dimensional crystals can modify the electronic spectra and properties of graphene. Twisted graphene bilayer can be viewed as a special van der Waals structure composed of two mutual misoriented graphene layers, where the sublayer graphene not only plays the role of a substrate, but also acts as an equivalent role as the top graphene layer in the structure. Here we report the electronic spectra of slightly twisted graphene bilayers studied by scanning tunneling microscopy and spectroscopy. Our experiment demonstrates that twist-induced van Hove singularities are ubiquitously present for rotation angles theta less than about 3.5o, corresponding to moiré-pattern periods D longer than 4 nm. However, they totally vanish for theta > 5.5o (D < 2.5 nm). Such a behavior indicates that the continuum models, which capture moiré-pattern periodicity more accurately at small rotation angles, are no longer applicable at large rotation angles.
△ Less
Submitted 16 April, 2014;
originally announced April 2014.
-
Tuning Structures and Electronic Spectra of Graphene Layers by Tilt Grain Boundaries
Authors:
Long-Jing Yin,
Jia-Bin Qiao,
Wen-Xiao Wang,
Zhao-Dong Chu,
Kai Fen Zhang,
Rui-Fen Dou,
Chun Lei Gao,
Jin-Feng Jia,
Jia-Cai Nie,
Lin He
Abstract:
Despite the structures and properties of tilt grain boundaries of graphite surface and graphene have been extensively studied, their effect on the structures and electronic spectra of graphene layers has not been fully addressed. Here we study effects of one-dimensional tilt grain boundaries on structures and electronic spectra of graphene multilayers by scanning tunneling microscopy and spectrosc…
▽ More
Despite the structures and properties of tilt grain boundaries of graphite surface and graphene have been extensively studied, their effect on the structures and electronic spectra of graphene layers has not been fully addressed. Here we study effects of one-dimensional tilt grain boundaries on structures and electronic spectra of graphene multilayers by scanning tunneling microscopy and spectroscopy. A tilt grain boundary of a top graphene sheet in graphene multilayers leads to a twist between consecutive layers and generates superstructures (Moiré patterns) on one side of the boundary. Our results demonstrate that the twisting changes the electronic spectra of Bernal graphene bilayer and graphene trilayers dramatically. We also study quantum-confined twisted graphene bilayer generated between two adjacent tilt grain boundaries and find that the band structure of such a system is still valid even when the number of superstructures is reduced to two in one direction. It implies that the electronic structure of this system is driven by the physics of a single Moiré spot.
△ Less
Submitted 9 April, 2014; v1 submitted 6 December, 2013;
originally announced December 2013.