Skip to main content

and
  1. No Access

    Article

    Cyber-Physical System Converged Digital Twin for Secure Patient Monitoring and Attack Detection

    A live or non-living object’s digital twin is its mirror image. Businesses, particularly in the healthcare sector, are entering a new era thanks to digital twins and cyber-physical systems (CPS), which collect...

    Jiang **ng, Dandan Wang, Liang Zhang, Lijie Li in Wireless Personal Communications (2024)

  2. No Access

    Chapter and Conference Paper

    Adaptive Finite-Time Event-Triggered Formation Control for Quadrotor UAVs with Experimentation

    Event-triggering formation control is investigated for second-order multi-agent systems (SOMASs) with compound disturbances. A novel adaptive distributed robust event-triggering controller is developed based o...

    Jianan Wang, Qingbiao Kuang, Dandan Wang in Advances in Guidance, Navigation and Contr… (2022)

  3. No Access

    Chapter and Conference Paper

    Event-Triggered Formation Control for Multi-agent Systems Using Terminal Sliding Mode Method

    The event-triggered control problem is investigated for multi-agent systems (MASs) with disturbances. An extended state observer-based fully distributed finite-time event-trigger controller with three adaptive...

    Jianan Wang, Changyu Bi, Dandan Wang in Advances in Guidance, Navigation and Contr… (2022)

  4. No Access

    Article

    A family of optimal ternary cyclic codes with minimum distance five and their duals

    As a subclass of linear codes, cyclic codes have important applications in consumer electronics, data storage systems and communication systems. In this paper, a new family of optimal ternary cyclic codes with...

    Dandan Wang, **wang Cao in Cryptography and Communications (2022)

  5. No Access

    Article

    Sparse recovery formulation for secure distance-based localization in the presence of cheating anchors

    Secure localization in the presence of cheating anchors is a critical issue in wireless sensor networks, where compromised anchors attempt to falsify the measured distances in the location references. In this ...

    Qiang Zhang, Jiangwen Wan, Dandan Wang, Donghao Wang in Wireless Networks (2018)

  6. No Access

    Chapter and Conference Paper

    Train Rolling Bearing Degradation Condition Assessment Based on Local Mean Decomposition and Support Vector Data Description

    For effective utilization of a large amount of vibration data which are collected during the normal operation of train rolling bearing, this paper puts forward a new method for rolling bearing degradation cond...

    Dandan Wang, Yong Qin, **aoqing Cheng in Proceedings of the 2015 International Conf… (2016)

  7. No Access

    Article

    Cooperation and Fairness for Slotted Aloha

    Wireless access based on slotted Aloha with selfish users may result in very inefficient use of the system resources. To impose cooperation and fairness in such systems, we propose an optimal pricing strategy,...

    Dandan Wang, Cristina Comaniciu, Uf Tureli in Wireless Personal Communications (2007)

  8. Article

    Open Access

    Joint MIMO-OFDM and MAC Design for Broadband Multihop Ad Hoc Networks

    Multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) are very promising techniques to exploit spatial diversity and frequency diversity in the physical layer of broadband...

    Dandan Wang, Uf Tureli in EURASIP Journal on Wireless Communications and Networking (2006)