期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Diversified and compatible web APIs recommendation based on game theory in IoT
1
作者 Wenwen Gong Huiping Wu +4 位作者 Xiaokang Wang Xuyun Zhang Yawei Wang Yifei Chen Mohammad R.Khosravi 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1198-1209,共12页
With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can b... With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can be accessible remotely.In this context,finding and writing a list of existing Web APIs that can collectively meet the functional needs of software developers has become a promising approach to economically and easily develop successful mobile applications.However,the number and diversity of candidate IoT Web APIs places an additional burden on application developers’Web API selection decisions,as it is often a challenging task to simultaneously ensure the diversity and compatibility of the final set of Web APIs selected.Considering this challenge and latest successful applications of game theory in IoT,a Diversified and Compatible Web APIs Recommendation approach,namely DivCAR,is put forward in this paper.First of all,to achieve API diversity,DivCAR employs random walk sampling technique on a pre-built“API-API”correlation graph to generate diverse“API-API”correlation subgraphs.Afterwards,with the diverse“API-API”correlation subgraphs,the compatible Web APIs recommendation problem is modeled as a minimum group Steiner tree search problem.A sorted set of multiple compatible and diverse Web APIs are returned to the application developer by solving the minimum group Steiner tree search problem.At last,a set of experiments are designed and implemented on a real dataset crawled from www.programmableweb.com.Experimental results validate the effectiveness and efficiency of our proposed DivCAR approach in balancing the Web APIs recommendation diversity and compatibility. 展开更多
关键词 Internet of things Web APIs recommendation Game theory Diversity and compatibility
在线阅读 下载PDF
Attacks and defences on intelligent connected vehicles:a survey 被引量:6
2
作者 Mahdi Dibaei Xi Zheng +5 位作者 Kun Jiang Robert Abbas Shigang Liu Yuexin Zhang Yang Xiang Shui Yu 《Digital Communications and Networks》 SCIE 2020年第4期399-421,共23页
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up new possibilities for different cyber-attacks,including in-vehicle attacks(e.g.,hijacking attacks)a... Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up new possibilities for different cyber-attacks,including in-vehicle attacks(e.g.,hijacking attacks)and vehicle-to-everything communicationattacks(e.g.,data theft).These problems are becoming increasingly serious with the development of 4G LTE and 5G communication technologies.Although many efforts are made to improve the resilience to cyber attacks,there are still many unsolved challenges.This paper first identifies some major security attacks on intelligent connected vehicles.Then,we investigate and summarize the available defences against these attacks and classify them into four categories:cryptography,network security,software vulnerability detection,and malware detection.Remaining challenges and future directions for preventing attacks on intelligent vehicle systems have been discussed as well. 展开更多
关键词 Intelligent vehicles Vehicular networks Software vulnerabilities Deep learning 3GPP Software defined security
在线阅读 下载PDF
Sports match prediction model for training and exercise using attention-based LSTM network 被引量:2
3
作者 Qiyun Zhang Xuyun Zhang +3 位作者 Hongsheng Hu Caizhong Li Yinping Lin Rui Ma 《Digital Communications and Networks》 SCIE CSCD 2022年第4期508-515,共8页
Sports matches are very popular all over the world.The prediction of a sports match is helpful to grasp the team's state in time and adjust the strategy in the process of the match.It's a challenging effort to... Sports matches are very popular all over the world.The prediction of a sports match is helpful to grasp the team's state in time and adjust the strategy in the process of the match.It's a challenging effort to predict a sports match.Therefore,a method is proposed to predict the result of the next match by using teams'historical match data.We combined the Long Short-Term Memory(LSTM)model with the attention mechanism and put forward an ASLSTM model for predicting match results.Furthermore,to ensure the timeliness of the prediction,we add the time sliding window to make the prediction have better timeliness.Taking the football match as an example,we carried out a case study and proposed the feasibility of this method. 展开更多
关键词 SPORTS Prediction Long short-term memory ATTENTION Sliding window
在线阅读 下载PDF
Graph-Based Chinese Word Sense Disambiguation with Multi-Knowledge Integration 被引量:1
4
作者 Wenpeng Lu Fanqing Meng +4 位作者 Shoujin Wang Guoqiang Zhang Xu Zhang Antai Ouyang Xiaodong Zhang 《Computers, Materials & Continua》 SCIE EI 2019年第7期197-212,共16页
Word sense disambiguation(WSD)is a fundamental but significant task in natural language processing,which directly affects the performance of upper applications.However,WSD is very challenging due to the problem of kno... Word sense disambiguation(WSD)is a fundamental but significant task in natural language processing,which directly affects the performance of upper applications.However,WSD is very challenging due to the problem of knowledge bottleneck,i.e.,it is hard to acquire abundant disambiguation knowledge,especially in Chinese.To solve this problem,this paper proposes a graph-based Chinese WSD method with multi-knowledge integration.Particularly,a graph model combining various Chinese and English knowledge resources by word sense mapping is designed.Firstly,the content words in a Chinese ambiguous sentence are extracted and mapped to English words with BabelNet.Then,English word similarity is computed based on English word embeddings and knowledge base.Chinese word similarity is evaluated with Chinese word embedding and HowNet,respectively.The weights of the three kinds of word similarity are optimized with simulated annealing algorithm so as to obtain their overall similarities,which are utilized to construct a disambiguation graph.The graph scoring algorithm evaluates the importance of each word sense node and judge the right senses of the ambiguous words.Extensive experimental results on SemEval dataset show that our proposed WSD method significantly outperforms the baselines. 展开更多
关键词 Word sense disambiguation graph model multi-knowledge integration word similarity
在线阅读 下载PDF
Secure ticket-based authentication method for IoT applications
5
作者 Mojtaba Alizadeh Mohammad Hesam Tadayon Alireza Jolfaei 《Digital Communications and Networks》 SCIE CSCD 2023年第3期710-716,共7页
The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model u... The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model used in the Internet of Things(IoT),and it protects data communications from various attacks,such as impersonation and denial of service,by verifying and allowing legitimate users to access the IoT resources.However,recent authentication literature has not addressed the need for developing a scalable and efficient authentication method in this field.This paper proposes a secure and anonymous ticket-based authentication method for the IoT.The proposed method protects the network from various security and privacy threats such as data alternation and denial of service while also offering mutual authentication and sensor anonymity.Our security and performance evaluations confirm the improvement. 展开更多
关键词 IOT Internet of things AUTHENTICATION PRIVACY Security
在线阅读 下载PDF
Achieving Privacy-Preserving Iris Identification Via El Gamal
6
作者 Yong Ding Lei Tian +3 位作者 Bo Han Huiyong Wang Yujue Wang James Xi Zheng 《Computers, Materials & Continua》 SCIE EI 2019年第8期727-738,共12页
Currently,many biometric systems maintain the user’s biometrics and templates in plaintext format,which brings great privacy risk to uses’biometric information.Biometrics are unique and almost unchangeable,which mea... Currently,many biometric systems maintain the user’s biometrics and templates in plaintext format,which brings great privacy risk to uses’biometric information.Biometrics are unique and almost unchangeable,which means it is a great concern for users on whether their biometric information would be leaked.To address this issue,this paper proposes a confidential comparison algorithm for iris feature vectors with masks,and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme.In our scheme,the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask information.Also,this paper improves the Hamming distance of iris features,which makes the similarity matching work better than existing ones.Experimental results confirm the practicality of our proposed schemes in real world applications,that is,for the iris feature vectors and masks of 2048 bits,nearly 12 comparisons can be performed per second. 展开更多
关键词 Homomorphic encryption template matching Hamming distance
在线阅读 下载PDF
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
7
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks
原文传递
High-precision shape approximation low-thrust trajectory optimization method satisfying bi-objective index 被引量:1
8
作者 Ruiye JIANG Ming YANG +2 位作者 Songyan WANG Tao CHAO Rajan SHANKARAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第1期436-457,共22页
The shape approximation method has been proven to be rapid and practicable in resolving low-thrust trajectory;however,it still faces the challenges of large deviation from the optimal solution and inability to satisfy... The shape approximation method has been proven to be rapid and practicable in resolving low-thrust trajectory;however,it still faces the challenges of large deviation from the optimal solution and inability to satisfy the specific flight time and fuel mass constraints.In this paper,a modified shape approximation low-thrust model is presented,and a novel constrained optimization algorithm is developed to solve this problem.The proposed method aims at settling the bi-objective optimization orbit involving the twin objectives of minimum flight time and low fuel consumption and enhancing the accuracy of optimized orbit.In particular,a transformed high-order polynomial model based on finite Fourier series is proposed,which can be characterized as a multi-constraint optimization problem.Then,a novel optimization algorithm is specifically developed to optimize the large-scale multi-constraint dynamical equations of shape trajectory.The key performance indicators of the index include minimum flight time,low fuel consumption and bi-objective optimization of the two.Simulation results prove that this approach possesses both the high precision achievable by numerical methods and low computational complexity offered by shape approximation techniques.Besides,the Pareto front of the fuel-time bi-objective optimization orbit is firstly introduced to analyze an intact optimal solution set.Furthermore,we have demonstrated that our proposed approach is appropriate to generate the preliminary orbit for pseudo-spectral method. 展开更多
关键词 Constrained optimization Intelligent optimization Low-thrust trajectory Multi-objective optimization Shape approximation method
原文传递
A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding 被引量:1
9
作者 Hong Lai Ming-Xing Luo +4 位作者 Yong-Jian Xu Josef Pieprzyk Jun Zhang Lei Pan Mehmet A.Orgun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第10期384-390,共7页
Since the use of a quantum channel is very expensive for transmitting large messages, it is vital to develop an effective quantum compression encoding scheme that is easy to implement. Given that, with the single-phot... Since the use of a quantum channel is very expensive for transmitting large messages, it is vital to develop an effective quantum compression encoding scheme that is easy to implement. Given that, with the single-photon spin-orbit entanglement, we propose a quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding. In our proposed scheme, we can represent the frequency of any secret message which is typically collection of bits encodings of text or integers as a bitstring using the base Fibonacci sequence, which is encoded multiple spin states for secret shares transmitted to participants. We demonstrate that Fibonacci compression encoding carries excellent properties that enable us to achieve more robust quantum secret sharing schemes with fewer number of photons. 展开更多
关键词 spin-orbit entanglement multiple spin states Fibonacci compression encoding quantum secretsharing
原文传递
Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding
10
作者 赖红 罗明星 +3 位作者 Josef Pieprzyk 陶丽 刘志明 Mehmet A.Orgun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第11期501-508,共8页
In this paper, we develop a large-capacity quantum digital secret sharing(QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum(OAM) entanglement with the recursive Fibonacci and Lucas matric... In this paper, we develop a large-capacity quantum digital secret sharing(QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum(OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie'(Bob') detected value. 展开更多
关键词 Fibonacci-and Lucas-valued orbital angular momentum(OAM) states the first kind of Chebyshev maps lower error rates longer destances
原文传递
Cleaning RFID data streams based on K-means clustering method
11
作者 Lin Qiaomin Fa Anqi +3 位作者 Pan Min Xie Qiang Du Kun Sheng Michael 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第2期72-81,共10页
Currentlyradio frequency identification(RFID)technology has been widely used in many kinds of applications.Store retailers use RFID readers with multiple antennas to monitor all tagged items.However,because of the int... Currentlyradio frequency identification(RFID)technology has been widely used in many kinds of applications.Store retailers use RFID readers with multiple antennas to monitor all tagged items.However,because of the interference from environment and limitations of the radio frequency technology,RFID tags are identified by more than one RFID antenna,leading to the false positive readings.To address this issue,we propose a RFID data stream cleaning method based on K-means to remove those false positive readings within sampling time.First,we formulate a new data stream model which adapts to our cleaning algorithm.Then we present the preprocessing method of the data stream model,including sliding window setting,feature extraction of data stream and normalization.Next,we introduce a novel way using K-means clustering algorithm to clean false positive readings.Last,the effectiveness and efficiency of the proposed method are verified by experiments.It achieves a good balance between performance and price. 展开更多
关键词 false positive reading data stream K-MEANS RFID
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部