Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 151–200 of 231 results for author: Chu, Z

.
  1. arXiv:1912.07582  [pdf, other

    eess.SY

    A Nonlinear Regression Method for Composite Protection Modeling of Induction Motor Loads

    Authors: Soumya Kundu, Zhigang Chu, Yuan Liu, Yingying Tang, Qiuhua Huang, Daniel James, Yu Zhang, Pavel Etingov, David P. Chassin

    Abstract: Protection equipment is used to prevent damage to induction motor loads by isolating them from power systems in the event of severe faults. Modeling the response of induction motor loads and their protection is vital for power system planning and operation, especially in understanding system's dynamic performance and stability after a fault occurs. Induction motors are usually equipped with severa… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: accepted for presentation at The Eleventh Conference on Innovative Smart Grid Technologies (ISGT 2020)

    Report number: PNNL-SA-146910

  2. Rate-Splitting for Multigroup Multicast Beamforming in Multicarrier Systems

    Authors: Hongzhi Chen, De Mi, Zheng Chu, Pei Xiao, Rahim Tafazolli

    Abstract: In this paper, we consider multigroup multicast transmissions with different types of service messages in an overloaded multicarrier system, where the number of transmitter antennas is insufficient to mitigate all inter-group interference. We show that employing a rate-splitting based multiuser beamforming approach enables a simultaneous delivery of the multiple service messages over the same time… ▽ More

    Submitted 29 November, 2019; originally announced November 2019.

    Comments: SPAWC 2018, 5 Pages, 2 figs

  3. arXiv:1911.09247  [pdf, ps, other

    cs.CL

    How to Ask Better Questions? A Large-Scale Multi-Domain Dataset for Rewriting Ill-Formed Questions

    Authors: Zewei Chu, Mingda Chen, Jing Chen, Miaosen Wang, Kevin Gimpel, Manaal Faruqui, Xiance Si

    Abstract: We present a large-scale dataset for the task of rewriting an ill-formed natural language question to a well-formed one. Our multi-domain question rewriting MQR dataset is constructed from human contributed Stack Exchange question edit histories. The dataset contains 427,719 question pairs which come from 303 domains. We provide human annotations for a subset of the dataset as a quality estimate.… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

    Comments: AAAI 2020

  4. Towards Optimal System Scheduling with Synthetic Inertia Provision from Wind Turbines

    Authors: Zhongda Chu, Uros Markovic, Gabriela Hug, Fei Teng

    Abstract: The undergoing transition from conventional to converter-interfaced renewable generation leads to significant challenges in maintaining frequency stability due to declining system inertia. In this paper, a novel control framework for Synthetic Inertia (SI) provision from Wind Turbines (WTs) is proposed, which eliminates the secondary frequency dip and allows the dynamics of SI from WTs to be analy… ▽ More

    Submitted 10 May, 2020; v1 submitted 7 November, 2019; originally announced November 2019.

    Comments: 10 pages, accepted by IEEE Transaction on Power System

  5. arXiv:1909.00142  [pdf, other

    cs.CL

    Evaluation Benchmarks and Learning Criteria for Discourse-Aware Sentence Representations

    Authors: Mingda Chen, Zewei Chu, Kevin Gimpel

    Abstract: Prior work on pretrained sentence embeddings and benchmarks focus on the capabilities of stand-alone sentences. We propose DiscoEval, a test suite of tasks to evaluate whether sentence representations include broader context information. We also propose a variety of training objectives that makes use of natural annotations from Wikipedia to build sentence encoders capable of modeling discourse. We… ▽ More

    Submitted 7 November, 2019; v1 submitted 31 August, 2019; originally announced September 2019.

    Comments: EMNLP 2019. Updated results and fixed typos

  6. arXiv:1909.00137  [pdf, other

    cs.CL

    EntEval: A Holistic Evaluation Benchmark for Entity Representations

    Authors: Mingda Chen, Zewei Chu, Yang Chen, Karl Stratos, Kevin Gimpel

    Abstract: Rich entity representations are useful for a wide class of problems involving entities. Despite their importance, there is no standardized benchmark that evaluates the overall quality of entity representations. In this work, we propose EntEval: a test suite of diverse tasks that require nontrivial understanding of entities including entity typing, entity similarity, entity relation prediction, and… ▽ More

    Submitted 11 November, 2019; v1 submitted 31 August, 2019; originally announced September 2019.

    Comments: EMNLP 2019. Fixed typo

  7. arXiv:1905.02271  [pdf, other

    eess.SY

    Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?

    Authors: Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar

    Abstract: Intelligently designed false data injection (FDI) attacks have been shown to be able to bypass the $χ^2$-test based bad data detector (BDD), resulting in physical consequences (such as line overloads) in the power system. In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it. However, an attacker can gra… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: 6 pages, 5 figures, submitted to SmartGridComm 2019

  8. arXiv:1904.03111  [pdf, other

    cs.CL

    PoMo: Generating Entity-Specific Post-Modifiers in Context

    Authors: Jun Seok Kang, Robert L. Logan IV, Zewei Chu, Yang Chen, Dheeru Dua, Kevin Gimpel, Sameer Singh, Niranjan Balasubramanian

    Abstract: We introduce entity post-modifier generation as an instance of a collaborative writing task. Given a sentence about a target entity, the task is to automatically generate a post-modifier phrase that provides contextually relevant information about the entity. For example, for the sentence, "Barack Obama, _______, supported the #MeToo movement.", the phrase "a father of two girls" is a contextually… ▽ More

    Submitted 8 April, 2019; v1 submitted 5 April, 2019; originally announced April 2019.

    Comments: NAACL-HLT 2019

  9. arXiv:1903.07781  [pdf, other

    eess.SY

    Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. Understanding the consequences of these attacks req… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: 8 pages, 5 figures, 1 table. arXiv admin note: text overlap with arXiv:1705.04218

  10. arXiv:1902.10326  [pdf, other

    cs.CL

    CN-Probase: A Data-driven Approach for Large-scale Chinese Taxonomy Construction

    Authors: Jindong Chen, Ao Wang, Jiangjie Chen, Yanghua Xiao, Zhendong Chu, Jingping Liu, Jiaqing Liang, Wei Wang

    Abstract: Taxonomies play an important role in machine intelligence. However, most well-known taxonomies are in English, and non-English taxonomies, especially Chinese ones, are still very rare. In this paper, we focus on automatic Chinese taxonomy construction and propose an effective generation and verification framework to build a large-scale and high-quality Chinese taxonomy. In the generation module, w… ▽ More

    Submitted 26 February, 2019; originally announced February 2019.

  11. arXiv:1902.08147  [pdf

    physics.app-ph cond-mat.mes-hall cond-mat.mtrl-sci

    Visualization of Local Conductance in MoS2/WSe2 Heterostructure Transistors

    Authors: Di Wu, Wei Li, Amritesh Rai, Xiaoyu Wu, Hema C. P. Movva, Maruthi N. Yogeesh, Zhaodong Chu, Sanjay K. Banerjee, Deji Akinwande, Keji Lai

    Abstract: The vertical stacking of van der Waals (vdW) materials introduces a new degree of freedom to the research of two-dimensional (2D) systems. The interlayer coupling strongly influences the band structure of the heterostructures, resulting in novel properties that can be utilized for electronic and optoelectronic applications. Based on microwave microscopy studies, we report quantitative electrical i… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: 18 pages, 4 figures, Just accepted by Nano Letters

    Journal ref: Nano Letters, 2019

  12. arXiv:1812.04533  [pdf

    q-bio.QM q-bio.NC

    Localization of Epileptic Seizure Focus by Computerized Analysis of fMRI Recordings

    Authors: Rasoul Hekmati, Robert Azencott, Wei Zhang, Zili D. Chu, Michael J. Paldino

    Abstract: By computerized analysis of cortical activity recorded via fMRI for pediatric epilepsy patients, we implement algorithmic localization of epileptic seizure focus within one of eight cortical lobes. Our innovative machine learning techniques involve intensive analysis of large matrices of mutual information coefficients between pairs of anatomically identified cortical regions. Drastic selection of… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: 25 pages,5 figures

  13. arXiv:1811.11071  [pdf, other

    physics.comp-ph

    Theoretical design of a strain-controlled nanoporous CN membrane for helium separation

    Authors: Yongchao Rao, Zhaoqin Chu, Xiao Gu, Xiangmei Duan

    Abstract: Designing an efficient membrane for He purification is quite crucial in scientific and industrial applications. Ultrathin membranes with intrinsic pores are highly desirable for gas purification because of their controllable aperture and homogeneous hole distribution. Based on the first-principles density function theory and molecular dynamics simulations, we demonstrate that the compressively str… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

  14. arXiv:1810.04253  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall

    Energy-resolved Photoconductivity Mapping in a Monolayer-bilayer WSe2 Lateral Heterostructure

    Authors: Zhaodong Chu, Ali Han, Chao Lei, Sergei Lopatin, Peng Li, David Wannlund, Di Wu, Kevin Herrera, Xixiang Zhang, Allan H. MacDonald, Xiaoqin Li, Lain-Jong Li, Keji Lai

    Abstract: Vertical and lateral heterostructures of van der Waals materials provide tremendous flexibility for band structure engineering. Since electronic bands are sensitively affected by defects, strain, and interlayer coupling, the edge and heterojunction of these two-dimensional (2D) systems may exhibit novel physical properties, which can be fully revealed only by spatially resolved probes. Here, we re… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

    Comments: 18 pages, 5 figures; Nano Lett., Just Accepted Manuscript

  15. arXiv:1806.05057  [pdf, other

    eess.SY

    Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies false data injection (FDI) attacks against phasor measurement units (PMUs). As compared to the conventional bad data detector (BDD), an enhanced BDD utilizing the effect of zero injection buses is proposed. Feasible conditions under which FDI attacks are unobservable to this enhanced BDD are discussed. In addition, a class of multiplicative FDI attacks that maintain the rank of… ▽ More

    Submitted 13 September, 2018; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: 6 pages, 6 figures

  16. arXiv:1806.03809  [pdf, ps, other

    cs.IT

    Enhancing PHY Security of MISO NOMA SWIPT Systems With a Practical Non-Linear EH Model

    Authors: Fuhui Zhou, Zheng Chu, Yongpeng Wu, Naofal Al-Dhahir, Pei Xiao

    Abstract: Non-orthogonal multiple-access (NOMA) and simultaneous wireless information and power transfer (SWIPT) are promising techniques to improve spectral efficiency and energy efficiency. However, the security of NOMA SWIPT systems has not received much attention in the literature. In this paper, an artificial noise-aided beamforming design problem is studied to enhance the security of a multiple-input… ▽ More

    Submitted 11 June, 2018; originally announced June 2018.

    Comments: This paper has been accepted by ICC 2018 workshop

  17. The Magnification Invariant of Circularly-symmetric Lens Models

    Authors: Chengliang Wei, Zhe Chu, Yiping Shu

    Abstract: In the context of strong gravitational lensing, the magnification of image is of crucial importance to constrain various lens models. For several commonly used quadruple lens models, the magnification invariants, defined as the sum of the signed magnifications of images, have been analytically derived when the image multiplicity is a maximum. In this paper, we further study the magnification of se… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 14 pages, 6 figures. Accepted for publication in RAA

  18. arXiv:1804.05151  [pdf

    cond-mat.mtrl-sci

    Correlation between Dzyaloshinskii Moriya interaction and spin mixing conductance at antiferromagnet / ferromagnet interface

    Authors: Xin Ma, Guoqiang Yu, Seyed A. Razavi, Liang Chang, Lei Deng, Zhaodong Chu, Congli He, Kang L. Wang, Xiaoqin Li

    Abstract: The rich interaction phenomena at antiferromagnet (AFM)/ ferromagnet (FM) interfaces are key ingredients in AFM spintronics, where many underlying mechanisms remain unclear. Here we report a correlation observed between interfacial Dzyaloshinskii-Moriya interaction (DMI) Ds and effective spin mixing conductance g at IrMn/CoFeB interface. Both Ds and g are quantitatively determined with Brillouin l… ▽ More

    Submitted 19 July, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

    Journal ref: Phys. Rev. B 98, 104428 (2018)

  19. Secure Wireless Powered and Cooperative Jamming D2D Communications

    Authors: Zheng Chu, Huan X. Nguyen, Tuan Anh Le, Mehmet Karamanoglu, Enver Ever, Adnan Yazici

    Abstract: This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular an… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Journal ref: Published in IEEE Transactions on Green Communications and Networking 2017

  20. arXiv:1802.09609  [pdf, other

    eess.SP cs.GT

    Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT

    Authors: Fuhui Zhou, Zheng Chu, Haijian Sun, Rose Qingyang Hu, Lajos Hanzo

    Abstract: Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two promising technologies due to their potential to achieve high spectral efficiency and massive connectivity. This paper studies a multiple-input single-output NOMA CR network relying on simultaneous wireless information and power transfer (SWIPT) conceived for supporting a massive population of power limited battery… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: This paper has been accepted by IEEE Journal on Selected Areas in Communications. arXiv admin note: text overlap with arXiv:1802.03908

  21. arXiv:1802.03908  [pdf, other

    cs.IT eess.SP

    Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT

    Authors: Fuhui Zhou, Zheng Chu, Haijian Sun, Victor C. M. Leung

    Abstract: Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the pr… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: This paper has been accepted by IEEE ICC 2018

  22. arXiv:1802.03906  [pdf, other

    eess.SP cs.IT

    UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design

    Authors: Fuhui Zhou, Yongpeng Wu, Haijian Sun, Zheng Chu

    Abstract: With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of shor… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: This paper has been accepted by IEEE ICC 2018

  23. arXiv:1802.00695  [pdf, ps, other

    cs.IT

    AN-aided Secure Transmission in Multi-user MIMO SWIPT Systems

    Authors: Zhengyu Zhu, Ning Wang, Zheng Chu, Zhongyong Wang, Inkyu Lee

    Abstract: In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested… ▽ More

    Submitted 1 February, 2018; originally announced February 2018.

    Comments: in Proc. IEEE WCNC 2018. (6 pages, 3 figures). arXiv admin note: substantial text overlap with arXiv:1703.04711

  24. arXiv:1802.00252  [pdf, ps, other

    cs.IT

    Energy Harvesting Fairness in AN-aided Secure MU-MIMO SWIPT Systems with Cooperative Jammer

    Authors: Zhengyu Zhu, Zheng Chu, Ning Wang, Zhongyong Wang, Inkyu Lee

    Abstract: In this paper, we study a multi-user multiple-input-multiple-output secrecy simultaneous wireless information and power transfer (SWIPT) channel which consists of one transmitter, one cooperative jammer (CJ), multiple energy receivers (potential eavesdroppers, ERs), and multiple co-located receivers (CRs). We exploit the dual of artificial noise (AN) generation for facilitating efficient wireless… ▽ More

    Submitted 1 February, 2018; originally announced February 2018.

    Comments: in Proc. IEEE ICC 2018. (6 pages, 3 figures)

  25. Robust Designs of Beamforming and Power Splitting for Distributed Antenna Systems with Wireless Energy Harvesting

    Authors: Zhengyu Zhu, Sai Huang, Zheng Chu, Fuhui Zhou, Di Zhang, Inkyu Lee

    Abstract: In this paper, we investigate a multiuser distributed antenna system with simultaneous wireless information and power transmission under the assumption of imperfect channel state information (CSI). In this system, a distributed antenna port with multiple antennas supports a set of mobile stations who can decode information and harvest energy simultaneously via a power splitter. To design robust tr… ▽ More

    Submitted 31 January, 2018; originally announced January 2018.

    Comments: To appear in IEEE Systems Journal. (10 pages, 6 figures)

  26. arXiv:1709.05410  [pdf

    cond-mat.mtrl-sci

    Tailoring Semiconductor Lateral Multi-junctions for Giant Photoconductivity Enhancement

    Authors: Yutsung Tsai, Zhaodong Chu, Yimo Han, Chih-Piao Chuu, Di Wu, Alex Johnson, Fei Cheng, Mei-Yin Chou, David A. Muller, Xiaoqin Li, Keji Lai, Chih-Kang Shih

    Abstract: Semiconductor heterostructures have played a critical role as the enabler for new science and technology. The emergence of transition metal dichalcogenides (TMDs) as atomically thin semiconductors has opened new frontiers in semiconductor heterostructures either by stacking different TMDs to form vertical heterojunctions or by stitching them laterally to form lateral heterojunctions via direct gro… ▽ More

    Submitted 15 September, 2017; originally announced September 2017.

    Comments: 15 pages, 3 figures, just accepted by Advanced Materials

    Journal ref: Adv. Mater. 2017, 1703680

  27. Out-of-plane Piezoelectricity and Ferroelectricity in Layered $α$-In2Se3 Nano-flakes

    Authors: Yu Zhou, Di Wu, Yihan Zhu, Yujin Cho, Qing He, Xiao Yang, Kevin Herrera, Zhaodong Chu, Yu Han, Michael C. Downer, Hailin Peng, Keji Lai

    Abstract: Piezoelectric and ferroelectric properties in the two dimensional (2D) limit are highly desired for nanoelectronic, electromechanical, and optoelectronic applications. Here we report the first experimental evidence of out-of-plane piezoelectricity and ferroelectricity in van der Waals layered $α$-In2Se3 nano-flakes. The non-centrosymmetric R3m symmetry of the $α$-In2Se3 samples is confirmed by sca… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 17 pages, 5 figures, just accepted by Nano Letters

  28. arXiv:1707.07151  [pdf, ps, other

    cs.IT

    Optimal Transmit Beamforming for Secure SWIPT in Heterogeneous Networks

    Authors: Bin Li, Zesong Fei, Zheng Chu

    Abstract: This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be considered as a potential eaves- dropper for messages intended for information receiver… ▽ More

    Submitted 22 July, 2017; originally announced July 2017.

    Comments: single column, 10 pages, 3 figures

  29. arXiv:1707.04520  [pdf, ps, other

    cs.IT

    Energy-Efficient Power Allocation in Millimeter Wave Massive MIMO with Non-Orthogonal Multiple Access

    Authors: Wanming Hao, Ming Zeng, Zheng Chu, Shouyi Yang

    Abstract: In this letter, we investigate the energy efficiency (EE) problem in a millimeter wave (mmWave) massive MIMO (mMIMO) system with non-orthogonal multiple access (NOMA). Multiple two-user clusters are formulated according to their channel correlation and gain difference. Following this, we propose a hybrid analog/digital precoding scheme for the low radio frequency (RF) chains structure at the base… ▽ More

    Submitted 14 July, 2017; originally announced July 2017.

  30. arXiv:1707.01351  [pdf, ps, other

    cs.IT

    Resource Allocations for Secure Cognitive Satellite Terrestrial Networks

    Authors: Bin Li, Zesong Fei, Xiaoming Xu, Zheng Chu

    Abstract: Cognitive satellite-terrestrial networks (STNs) have been recognized as the promising architecture for addressing spectrum scarcity in the next generation communication networks. In this letter, we investigate the secure transmission schemes in the cognitive STNs where the interference from terrestrial base station (BS) is introduced to enhance security of the satellite link. Our objectives are to… ▽ More

    Submitted 5 July, 2017; originally announced July 2017.

    Comments: 10 Pages, 3 figures, single column

  31. arXiv:1706.01936  [pdf, ps, other

    cs.IT

    Resource Allocation Strategies for Secure WPCN Multiantenna Multicasting Systems

    Authors: Zheng Chu, Huan X. Nguyen, Giuseppe Caire

    Abstract: This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply bef… ▽ More

    Submitted 6 June, 2017; originally announced June 2017.

    Comments: 29 pages, single column, 12 figures

  32. arXiv:1705.06113  [pdf, ps, other

    cs.IT

    Robust Sum Secrecy Rate Optimization for MIMO Two-way Full Duplex Systems

    Authors: Zheng Chu, Tuan Anh Le, Huan X. Nguyen, Arumugam Nallanathan, Mehmet Karamanoglu

    Abstract: This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the… ▽ More

    Submitted 17 May, 2017; originally announced May 2017.

    Comments: 5 pages, 3 figures, to appear in Proc. VTC Fall, Toronto, Canada, Sept. 2017

  33. arXiv:1705.04218  [pdf, other

    eess.SY

    Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level m… ▽ More

    Submitted 1 November, 2020; v1 submitted 10 May, 2017; originally announced May 2017.

    Comments: 6 pages, 5 figures

  34. arXiv:1705.02038  [pdf, other

    eess.SY

    False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

    Authors: Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

    Abstract: This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correl… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

    Comments: 6 pages, 4 figures, submitted to 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

  35. arXiv:1704.01883   

    cs.NI

    Secrecy Energy Efficiency Analysis of UAV-Enabled Communication Networks

    Authors: Xiaohui Qi, Bin Li, Zheng Chu, Kaizhi Huang, Hongbin Chen, Zesong Fei

    Abstract: This paper proposes a tractable analysis framework to evaluate the reliability, security and secrecy energy efficiency (SEE) performance in a UAV-enabled communication network via a threshold-based access scheme and multi-antenna technique.

    Submitted 16 January, 2018; v1 submitted 6 April, 2017; originally announced April 2017.

    Comments: There exists several technical problems, so we decide to withdraw this paper

  36. arXiv:1703.07500  [pdf, other

    eess.SY

    Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?

    Authors: Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

    Abstract: This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external ne… ▽ More

    Submitted 1 May, 2018; v1 submitted 21 March, 2017; originally announced March 2017.

    Comments: 12 pages, 7 figures, accepted by IEEE Transactions on Power Systems

    Journal ref: J. Zhang, Z. Chu, L. Sankar and O. Kosut, "Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?," in IEEE Transactions on Power Systems, 2018

  37. arXiv:1703.04711  [pdf, ps, other

    cs.IT

    Beamforming and Power Splitting Designs for AN-aided Secure Multi-user MIMO SWIPT Systems

    Authors: Zhengyu Zhu, Zheng Chu, Ning Wang, Sai Huang, Zhongyong Wang, Inkyu Lee

    Abstract: In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of the transmit beamforming matrix, the AN covariance matrix, and the power splitting ratio is conducted to minimize the transmit power under the target secrecy rate, the total transmit power, and the harvested… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Comments: 12 pages, 6 figures, submitted for possible publication

  38. arXiv:1611.01577  [pdf

    cond-mat.mtrl-sci

    Interfacial Control of Dzyaloshinskii Moriya Interaction in Heavy Metal_Ferromagnetic Metal Thin Film Heterostructures

    Authors: Xin Ma, Guoqiang Yu, Xiang Li, Tao Wang, Di Wu, Kevin S. Olsson, Zhaodong Chu, Kyongmo An, John Q. Xiao, Kang L. Wang, Xiaoqin Li

    Abstract: The interfacial Dzyaloshinskii Moriya Interaction (DMI) in ultrathin magnetic thin film heterostructures provides a new approach for controlling spin textures on mesoscopic length scales. Here we investigate the dependence of the interfacial DMI constant D on a Pt wedge insertion layer in Ta_CoFeB_Pt(wedge)_MgO thin films by observing the asymmetric spin wave dispersion using Brillouin light scatt… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

  39. arXiv:1610.08431  [pdf, ps, other

    cs.CL

    Broad Context Language Modeling as Reading Comprehension

    Authors: Zewei Chu, Hai Wang, Kevin Gimpel, David McAllester

    Abstract: Progress in text understanding has been driven by large datasets that test particular capabilities, like recent datasets for reading comprehension (Hermann et al., 2015). We focus here on the LAMBADA dataset (Paperno et al., 2016), a word prediction task requiring broader context than the immediate sentence. We view LAMBADA as a reading comprehension problem and apply comprehension models based on… ▽ More

    Submitted 16 February, 2017; v1 submitted 26 October, 2016; originally announced October 2016.

  40. arXiv:1610.00755  [pdf

    cond-mat.mtrl-sci

    Impact of Grain Boundaries on Efficiency and Stability of Organic-Inorganic Trihalide Perovskites

    Authors: Zhaodong Chu, Mengjin Yang, Philip Schulz, Di Wu, Xin Ma, Edward Seifert, Liuyang Sun, Kai Zhu, Xiaoqin Li, Keji Lai

    Abstract: Organic-inorganic perovskite solar cells have attracted tremendous attention because of their remarkably high power conversion efficiencies (PCEs). To further improve the device performance, however, it is imperative to obtain fundamental understandings on the photo-response and long-term stability down to the microscopic level. Here, we report the first quantitative nanoscale photoconductivity im… ▽ More

    Submitted 3 October, 2016; originally announced October 2016.

    Comments: 23 pages, 4 figures

  41. arXiv:1607.06855  [pdf

    cond-mat.mes-hall

    Uncovering edge states and electrical inhomogeneity in MoS2 field-effect transistors

    Authors: Di Wu, Xiao Li, Lan Luan, Xiaoyu Wu, Wei Li, Maruthi N. Yogeesh, Rudresh Ghosh, Zhaodong Chu, Deji Akinwande, Qian Niu, Keji Lai

    Abstract: The understanding of various types of disorders in atomically thin transition metal dichalcogenides (TMDs), including dangling bonds at the edges, chalcogen deficiencies in the bulk, and charges in the substrate, is of fundamental importance for their applications in electronics and photonics. Because of the imperfections, electrons moving on these two-dimensional (2D) crystals experience a spatia… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

    Comments: 25 pages,5 figures, just accepted by Proceedings of the National Academy of Sciences 2016

  42. arXiv:1605.06557  [pdf, ps, other

    eess.SY

    Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: Physical consequences to power systems of false data injection cyber-attacks are considered. Prior work has shown that the worst-case consequences of such an attack can be determined using a bi-level optimization problem, wherein an attack is chosen to maximize the physical power flow on a target line subsequent to re-dispatch. This problem can be solved as a mixed-integer linear program, but it i… ▽ More

    Submitted 20 May, 2016; originally announced May 2016.

  43. Magnification relations of quad lenses and applications on Einstein crosses

    Authors: Zhe Chu, G. L. Li, W. P. Lin, H. X. Pan

    Abstract: In this work, we mainly study the magnification relations of quad lens models for cusp, fold and cross configurations. By dividing and ray-tracing in different image regions, we numerically derive the positions and magnifications of the four images for a point source lying inside of the astroid caustic. Then, based on the magnifications, we calculate the signed cusp and fold relations for the sing… ▽ More

    Submitted 21 July, 2016; v1 submitted 28 April, 2016; originally announced April 2016.

    Comments: 12 pages, 11 figures, accepted for publication in MNRAS

  44. arXiv:1503.06437  [pdf, ps, other

    cs.IT

    Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel

    Authors: Zheng Chu, Martin Johnston, Stephane Le Goff

    Abstract: This paper investigates simultaneous wireless information and power transfer (SWIPT) for multiuser multiple-input-single-output (MISO) secrecy channel. First, transmit beamfoming without artificial noise (AN) design is considered, where two secrecy rate optimization frameworks (i.e., secrecy rate maximization and harvested energy maximization) are investigated. These two optimization problems are… ▽ More

    Submitted 22 March, 2015; originally announced March 2015.

    Comments: 14 pages, 7 figures

  45. Cusp Summations and Cusp Relations of Simple Quad Lenses

    Authors: Zhe Chu, G. L. Li, W. P. Lin

    Abstract: We review five often used quad lens models, each of which has analytical solutions and can produce four images at most. Each lens model has two parameters, including one that describes the intensity of non-dimensional mass density, and the other one that describes the deviation from the circular lens. In our recent work, we have found that the cusp and the fold summations are not equal to 0, when… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: 8 pages, 4 figures, accepted for publication in MNRAS

  46. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying

    Authors: Hong Xing, Kai-Kit Wong, Zheng Chu, Arumugam Nallanathan

    Abstract: This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our objective is to maximize the secrecy rate at the destination subject to the transmit power constraints of the AF relay and the HJ helpers. In the case of perfect channel state infor… ▽ More

    Submitted 21 October, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

    Comments: 16 pages (double column), 8 figures, submitted for possible journal publication

  47. arXiv:1408.5230  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Quantum Superposition States of Two Valleys in Graphene

    Authors: Jia-Bin Qiao, Zhao-Dong Chu, Liang-Mei Wu, Lin He

    Abstract: A system in a quantum superposition of distinct states usually exhibits many peculiar behaviors. Here we show that putting quasiparticles of graphene into superpositions of states in the two valleys can complete change the properties of the massless Dirac fermions. Due to the coexistence of both the quantum and relativistic characteristics, the superposition states exhibit many oddball behaviors i… ▽ More

    Submitted 22 August, 2014; originally announced August 2014.

    Comments: 4 Figures

  48. arXiv:1408.0327  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Crossover from Room-temperature Double-channel Ballistic Transport to Single-channel Ballistic Transport in Zigzag Graphene Nanoribbons

    Authors: Zhao-Dong Chu, Lin He

    Abstract: Very recently, it was demonstrated explicitly that a zigzag graphene nanoribbon (GNR) exhibits a crossover of conductance from G0 to G0/2 with increasing the length (G0 = 2e2/h is the quantum of conductance) even at room-temperature [Baringhaus, et al. Nature 506, 349 (2014)]. Such a result is puzzling as none of previous theories seem to match the experimental observations. Here, we propose a mod… ▽ More

    Submitted 8 January, 2015; v1 submitted 1 August, 2014; originally announced August 2014.

    Comments: 4 Figures

    Journal ref: Science China Materials 58, 677 (2015)

  49. arXiv:1404.4406  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall

    Angle-Dependent van Hove Singularities and Their Breakdown in Twisted Graphene Bilayers

    Authors: Wei Yan, Lan Meng, Mengxi Liu, Jia-Bin Qiao, Zhao-Dong Chu, Rui-Fen Dou, Zhongfan Liu, Jia-Cai Nie, Lin He

    Abstract: The creation of van der Waals heterostructures based on a graphene monolayer and other two-dimensional crystals has attracted great interest because atomic registry of the two-dimensional crystals can modify the electronic spectra and properties of graphene. Twisted graphene bilayer can be viewed as a special van der Waals structure composed of two mutual misoriented graphene layers, where the sub… ▽ More

    Submitted 16 April, 2014; originally announced April 2014.

    Comments: 5 figures

    Journal ref: Phys. Rev. B 90, 115402 (2014)

  50. arXiv:1312.2053  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Tuning Structures and Electronic Spectra of Graphene Layers by Tilt Grain Boundaries

    Authors: Long-Jing Yin, Jia-Bin Qiao, Wen-Xiao Wang, Zhao-Dong Chu, Kai Fen Zhang, Rui-Fen Dou, Chun Lei Gao, Jin-Feng Jia, Jia-Cai Nie, Lin He

    Abstract: Despite the structures and properties of tilt grain boundaries of graphite surface and graphene have been extensively studied, their effect on the structures and electronic spectra of graphene layers has not been fully addressed. Here we study effects of one-dimensional tilt grain boundaries on structures and electronic spectra of graphene multilayers by scanning tunneling microscopy and spectrosc… ▽ More

    Submitted 9 April, 2014; v1 submitted 6 December, 2013; originally announced December 2013.

    Comments: 4 figures in main text and 8 figures in SI

    Journal ref: Phys. Rev. B 89, 205410 (2014)