期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Modeling and Analysis of the Decentralized Interactive Cyber Defense Approach
1
作者 Ming liu ruiguang li +4 位作者 Weiling Chang Jieming Gu Shouying Bai Jia Cui Lu Ma 《China Communications》 SCIE CSCD 2022年第10期116-128,共13页
Powered by the Internet and the ever-increasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collabo... Powered by the Internet and the ever-increasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collaborative defense technologies. In this paper, we introduced an extended interactive multi-agent decision model for decentralized cyber defense. Based on the significant advantages of the cooperative multi-agent decision-making, the decentralized interactive decision model DI-MDPs and the corresponding interaction and retrieval algorithms are proposed. Then, we analyzed the interactive decision by the calculation and update processes of three matrices, the stability and evolutionary equilibrium of the proposed model are also analyzed. Finally, we evaluated the performance of the proposed algorithms based on open data sets and standard test environments, the experimental results shown that the proposed work will be more applicable in cyber defense. 展开更多
关键词 cyber defense multi-agent coordination evolutionary game heuristic decision algorithm
下载PDF
Bitcoin Network Measurement and a New Approach to Infer the Topology
2
作者 ruiguang li Jiawei Zhu +3 位作者 Dawei Xu Fudong Wu Jiaqi Gao liehuang Zhu 《China Communications》 SCIE CSCD 2022年第10期169-179,共11页
Bitcoin has made an increasing impact on the world's economy and financial order,which attracted extensive attention of researchers and regulators from all over the world.Most previous studies had focused more on ... Bitcoin has made an increasing impact on the world's economy and financial order,which attracted extensive attention of researchers and regulators from all over the world.Most previous studies had focused more on the transaction layer,but less on the network layer.In this paper,we developed BNS(Bitcoin Network Sniffer),which could find and connect nodes in the Bitcoin network,and made a measurement in detail.We collected nearly 4.1 million nodes in 1.5 hours and identified 9,515 reachable nodes.We counted the reachable nodes'properties such as:service type,port number,client version and geographic distribution.In addition,we analyzed the stability of the reachable nodes in depth and found nearly 60%kept stable during 15 days.Finally,we proposed a new approach to infer the Bitcoin network topology by analyzing the Neighbor Addresses of Adjacent Nodes and their timestamps,which had an accuracy over 80%. 展开更多
关键词 Bitcoin network reachable nodes node properties node stability network topology
下载PDF
Privacy-Preserving Collaborative Filtering Algorithm Based on Local Differential Privacy
3
作者 Ting Bao Lei Xu +3 位作者 liehuang Zhu lihong Wang ruiguang li Tielei li 《China Communications》 SCIE CSCD 2021年第11期42-60,共19页
Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the s... Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the service quality of recommendation systems.In a MEC-based recommendation system,users’rating data are collected and analyzed by the edge servers.If the servers behave dishonestly or break down,users’privacy may be disclosed.To solve this issue,we design a recommendation framework that applies local differential privacy(LDP)to collaborative filtering.In the proposed framework,users’rating data are perturbed to satisfy LDP and then released to the edge servers.The edge servers perform partial computing task by using the perturbed data.The cloud computing center computes the similarity between items by using the computing results generated by edge servers.We propose a data perturbation method to protect user’s original rating values,where the Harmony mechanism is modified so as to preserve the accuracy of similarity computation.And to enhance the protection of privacy,we propose two methods to protect both users’rating values and rating behaviors.Experimental results on real-world data demonstrate that the proposed methods perform better than existing differentially private recommendation methods. 展开更多
关键词 personalized recommendation collaborative filtering data perturbation privacy protection local differential privacy
下载PDF
BUES: A Blockchain-Based Upgraded Email System
4
作者 Dawei Xu Fudong Wu +3 位作者 liehuang Zhu ruiguang li Jiaqi Gao Yijie She 《China Communications》 SCIE CSCD 2022年第10期250-264,共15页
This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the securi... This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the security and stability of the system. The email content is extracted and stored in the blockchain network to achieve regulatory traceability between the email service provider and the higher-level organization. In turn, A Blockchain-based Upgraded Email System(BUES) is proposed. The defects of the existing traditional email system are addressed. Firstly, the threat model of the traditional email system is analyzed, and solutions are proposed for various threats. Then a system architecture consisting of the blockchain network, email servers, and users are constructed. The implementation of BUES is carried out, and the related experimental process and algorithm steps are given. After the experimental analysis, it is shown that BUES can ensure the security, reliability, efficiency, and traceability of email transmission. 展开更多
关键词 blockchain email service chaincode hyperledger fabric
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部