scispace - formally typeset
Search or ask a question
Institution

Beihang University

EducationBeijing, China
About: Beihang University is a education organization based out in Beijing, China. It is known for research contribution in the topics: Computer science & Control theory. The organization has 67002 authors who have published 73507 publications receiving 975691 citations. The organization is also known as: Beijing University of Aeronautics and Astronautics.


Papers
More filters
Journal ArticleDOI
TL;DR: This work combines the advantages of the fibril network donor and the state of the art Y6 acceptor in a two-step approach to deliver a high efficiency of 16% without batch-to-batch variation.
Abstract: Morphology control in laboratory and industry setting remains as a major challenge for organic solar cells (OSCs) due to the difference in film-drying kinetics between spin coating and the printing process. A two-step sequential deposition method is developed to control the active layer morphology. A conjugated polymer that self-assembles into a well-defined fibril structure is used as the first layer, and then a non-fullerene acceptor is introduced into the fibril mesh as the second layer to form an optimal morphology. A benefit of the combined fibril network morphology and non-fullerene acceptor properties was that a high efficiency of 16.5% (certified as 16.1%) was achieved. The preformed fibril network layer and the sequentially deposited non-fullerene acceptor form a robust morphology that is insensitive to the polymer batches, solving a notorious issue in OSCs. Such progress demonstrates that the utilization of polymer fibril networks in a sequential deposition process is a promising approach towards the fabrication of high-efficiency OSCs. Reliably controlling the morphology in organic solar cells is desired for up-scaling. Here Weng et al. combine the advantages of the fibril network donor and the state of the art Y6 acceptor in a two-step approach to deliver a high efficiency of 16% without batch-to-batch variation.

191 citations

Journal ArticleDOI
TL;DR: In this paper, a fuzzy integrated evaluation model based on the entropy weight was constructed to rate the energy investment risk for 50 nations along China's "Belt & Road initiative" and found that resource potential and Chinese factors have become the main determinant of energy investment risks, while environmental constraints and political risk should also be considered for investing decisions.

191 citations

Journal ArticleDOI
TL;DR: IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data, and each security metric is questionable, which undermines the security credibility of IEAIE.
Abstract: Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.

190 citations

Journal ArticleDOI
TL;DR: In this paper, Li et al. proposed a public-key encryption with fuzzy keyword search (PEFKS) scheme, in which two or more keywords share the same fuzzy keyword trapdoor.
Abstract: Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However, it is shown that the keyword will be compromised by a malicious third party under a keyword guess attack (KGA) if the keyword space is in a polynomial size. We address this problem with a keyword privacy enhanced variant of PEKS referred to as public-key encryption with fuzzy keyword search (PEFKS). In PEFKS, each keyword corresponds to an exact keyword search trapdoor and a fuzzy keyword search trapdoor. Two or more keywords share the same fuzzy keyword trapdoor. To search encrypted documents containing a specific keyword, only the fuzzy keyword search trapdoor is provided to the third party, i.e., the searcher. Thus, in PEFKS, a malicious searcher can no longer learn the exact keyword to be searched even if the keyword space is small. We propose a universal transformation which converts any anonymous identity-based encryption (IBE) scheme into a secure PEFKS scheme. Following the generic construction, we instantiate the first PEFKS scheme proven to be secure under KGA in the case that the keyword space is in a polynomial size.

190 citations

Journal ArticleDOI
TL;DR: Experimental results on real database indicate that the hyperspectral algorithm is robust, even for the ships with low contrast, and the extended HOG feature turns out to be better than HOG itself as well as some other features such as local binary pattern.
Abstract: Ship detection in high-resolution optical imagery is a challenging task due to the variable appearances of ships and background. This paper aims at further investigating this problem and presents an approach to detect ships in a “coarse-to-fine” manner. First, to increase the separability between ships and background, we concentrate on the pixels in the vicinities of ships. We rearrange the spatially adjacent pixels into a vector, transforming the panchromatic image into a “fake” hyperspectral form. Through this procedure, each produced vector is endowed with some contextual information, which amplifies the separability between ships and background. Afterward, for the “fake” hyperspectral image, a hyperspectral algorithm is applied to extract ship candidates preliminarily and quickly by regarding ships as anomalies. Finally, to validate real ships out of ship candidates, an extra feature is provided with histograms of oriented gradients (HOGs) to generate a hypothesis using AdaBoost algorithm. This extra feature focuses on the gray values rather than the gradients of an image and includes some information generated by very near but not closely adjacent pixels, which can reinforce HOG to some degree. Experimental results on real database indicate that the hyperspectral algorithm is robust, even for the ships with low contrast. In addition, in terms of the shape of ships, the extended HOG feature turns out to be better than HOG itself as well as some other features such as local binary pattern.

190 citations


Authors

Showing all 67500 results

NameH-indexPapersCitations
Yi Chen2174342293080
H. S. Chen1792401178529
Alan J. Heeger171913147492
Lei Jiang1702244135205
Wei Li1581855124748
Shu-Hong Yu14479970853
Jian Zhou128300791402
Chao Zhang127311984711
Igor Katkov12597271845
Tao Zhang123277283866
Nicholas A. Kotov12357455210
Shi Xue Dou122202874031
Li Yuan12194867074
Robert O. Ritchie12065954692
Haiyan Wang119167486091
Network Information
Related Institutions (5)
Harbin Institute of Technology
109.2K papers, 1.6M citations

96% related

Tsinghua University
200.5K papers, 4.5M citations

92% related

University of Science and Technology of China
101K papers, 2.4M citations

92% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

City University of Hong Kong
60.1K papers, 1.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
2023205
20221,178
20216,768
20206,916
20197,080