期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Study on the Application of Real-Time Drone Monitoring in Ordos Open-Pit Coal Mine
1
作者 Junyi Wu weizheng wang Xuesong Ni 《Open Journal of Applied Sciences》 CAS 2023年第4期483-495,共13页
In the process of intelligent mine construction in open-pit mine, in order to improve the safety monitoring ability of mine transportation system, solve the problems of large human interference and blind Angle detecti... In the process of intelligent mine construction in open-pit mine, in order to improve the safety monitoring ability of mine transportation system, solve the problems of large human interference and blind Angle detection by existing conventional monitoring methods, this paper establishes an open-pit mine monitoring data set, and proposes a real-time intelligent monitoring model based on UAV. The reasoning component with strong computing power and low power consumption is selected, and the lightweight object detection model is selected for the experiment. A quantitative standard of dynamic energy consumption detection by evaluation algorithm is proposed. Through experimental comparison, it is found that YOLOv4-tiny has the highest comprehensive grade in detection accuracy, speed, energy consumption and other aspects, which is suitable for application in the above model. 展开更多
关键词 Open-Pit Mine Safety Monitoring UAV Object Detection
下载PDF
Hypertrophic Anal Papillotomy by Transparent Cap-Assisted Endoscopic Hot Snare Resection
2
作者 Peixue wang Qian Jiang +4 位作者 Isaac Kumi Adu Minghua Ai weizheng wang Fen Yang Xiaoping Tan 《Yangtze Medicine》 2022年第4期121-130,共10页
Background/Aim: Conventional treatment for hypertrophic anal papillae (HAP) has effectiveness and safety concerns. This study aimed to investigate the feasibility, safety, and efficacy of transparent cap-assisted endo... Background/Aim: Conventional treatment for hypertrophic anal papillae (HAP) has effectiveness and safety concerns. This study aimed to investigate the feasibility, safety, and efficacy of transparent cap-assisted endoscopic hot snare resection for the treatment of HAP. Methods: Endoscopic and clinical data of patients treated with transparent cap-assisted endoscopic hot snare resection for HAP at the Department of Gastroenterology, First Affiliated Hospital of Yangtze University from June 2019 to June 2021, were collected and retrospectively analyzed. Results: A total of 56 patients with HAP were treated with transparent cap-assisted endoscopic hot snare resection, including 53 patients (94.6%) with single hypertrophic anal papillae and 3 patients (5.4%) with multiple HAP;51 patients (83.6%) with basal diameter <5 mm and 10 patients (16.4%) with basal diameter ≥5 mm. The procedures that were performed together with transparent cap-assisted endoscopic hot snare resection for HAP treatment included total colon examination in 56 cases (100%), endoscopic polypectomy in 20 cases (35.7%), endoscopic sclerotherapy for hemorrhoids in 29 cases (51.8%), and endoscopic rubber band ligation for hemorrhoids in 11 cases (19.6%). No patient experienced bleeding during or after HAP with transparent cap-assisted endoscopic hot snare resection. Pain level was evaluated by the visual analog score (VAS) method. 52 patients (92.9%) did not have pain and 4 patients (7.1%) had mild pain 3 days after surgery. At a postoperative follow-up of 2 to 18 months, patient satisfaction with transparent cap-assisted endoscopic hot snare resection for HAP treatment was 100% (56/56). Conclusion: Transparent cap-assisted endoscopic hot snare resection is safe and effective for treating HAP. 展开更多
关键词 Hypertrophic Anal Papillae Transparent Cap-Assisted Endoscopic Hot Snare Resection Hot Snare Colonoscopy
下载PDF
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen 被引量:7
3
作者 Lejun Zhang Zhijie Zhang +4 位作者 weizheng wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期597-616,共20页
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T... As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain. 展开更多
关键词 Covert communication blockchain Bitcoin address
下载PDF
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain 被引量:4
4
作者 Lejun Zhang Minghui Peng +3 位作者 weizheng wang Yansen Su Shuna Cui Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2021年第1期499-515,共17页
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical data.The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dy... In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical data.The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing.The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput.To address these issues,we propose a secure and efficient medical data storage and sharing scheme based on double blockchain.In our scheme,we encrypt the original EMR and store it in the cloud.The storage blockchain stores the index of the complete EMR,and the shared blockchain stores the index of the shared part of the EMR.Users with different attributes can make requests to different blockchains to share different parts according to their own permissions.Through experiments,it was found that cloud storage combined with blockchain not only solved the problem of limited storage capacity of blockchain,but also greatly reduced the risk of leakage of the original EMR.Content Extraction Signature(CES)combined with the double blockchain technology realized the separation of the privacy part and the shared part of the original EMR.The symmetric encryption technology combined with Ciphertext-Policy Attribute-Based Encryption(CP–ABE)not only ensures the safe storage of data in the cloud,but also achieves the consistency and convenience of data update,avoiding redundant backup of data.Safety analysis and performance analysis verified the feasibility and effectiveness of our scheme. 展开更多
关键词 Cloud storage blockchain electronic medical records access control data sharing PRIVACY
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things 被引量:2
5
作者 weizheng wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain Privacy preservation Smart contract Industrial IoT
下载PDF
An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
6
作者 weizheng wang Xiangqi wang +5 位作者 Xianmin Pan Xingxing Gong Jian Liang Pradip Kumar Sharma Osama Alfarraj Wael Said 《Computers, Materials & Continua》 SCIE EI 2023年第9期3859-3876,共18页
Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they ... Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they propagate through deeper layers of the network,leading to misclassifications.Moreover,image denoising compromises the classification accuracy of original examples.To address these challenges in AE defense through image denoising,this paper proposes a novel AE detection technique.The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network(CNN)network structures.The used detector model integrates the classification results of different models as the input to the detector and calculates the final output of the detector based on a machine-learning voting algorithm.By analyzing the discrepancy between predictions made by the model on original examples and denoised examples,AEs are detected effectively.This technique reduces computational overhead without modifying the model structure or parameters,effectively avoiding the error amplification caused by denoising.The proposed approach demonstrates excellent detection performance against mainstream AE attacks.Experimental results show outstanding detection performance in well-known AE attacks,including Fast Gradient Sign Method(FGSM),Basic Iteration Method(BIM),DeepFool,and Carlini&Wagner(C&W),achieving a 94%success rate in FGSM detection,while only reducing the accuracy of clean examples by 4%. 展开更多
关键词 Deep neural networks adversarial example image denoising adversarial example detection machine learning adversarial attack
下载PDF
A Novel Secure Scan Design Based on Delayed Physical Unclonable Function
7
作者 weizheng wang Xingxing Gong +3 位作者 Xiangqi wang Gwang-jun Kim Fayez Alqahtani Amr Tolba 《Computers, Materials & Continua》 SCIE EI 2023年第3期6605-6622,共18页
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,etc.But its manufacturing process exists unreliability,so cryptographic chips must b... The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,etc.But its manufacturing process exists unreliability,so cryptographic chips must be rigorously tested.Due to scan testing provides high test coverage,it is applied to the testing of cryptographic integrated circuits.However,while providing good controllability and observability,it also provides attackers with a backdoor to steal keys.In the text,a novel protection scheme is put forward to resist scan-based attacks,in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuseantifuse structures in a non-linear shift register(NLSR),then determine the scan input code according to the configuration of the fuse-antifuse structures and the styles of connection between the NLSR cells and the scan cells.If the key is right,the chip can be tested normally;otherwise,the data in the scan chain cannot be propagated normally,it is also impossible for illegal users to derive the desired scan data.The proposed technique not only enhances the security of cryptographic chips,but also incurs acceptable overhead. 展开更多
关键词 Cryptographic chips scan testing scan-based attacks hardware security PUF
下载PDF
Reliability Analysis of Correlated Competitive and Dependent Components Considering Random Isolation Times
8
作者 Shuo Cai Tingyu Luo +3 位作者 Fei Yu Pradip Kumar Sharma weizheng wang Lairong Yin 《Computers, Materials & Continua》 SCIE EI 2023年第9期2763-2777,共15页
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosenso... In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy efficiency.When the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting power.However,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the system.Therefore,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is considered.This approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing failures.Finally,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail. 展开更多
关键词 BSN Internet of Things reliability analysis random isolation time
下载PDF
A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
9
作者 Lejun Zhang Xiaoyan Hu +5 位作者 Zhijie Zhang weizheng wang Tianwen Huang Donghai Guan Chunhui Zhao Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2020年第9期2013-2030,共18页
Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect c... Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect content of communication.The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator.However,because the establishment of proxy communication needs to consume traffic,the communication capacity will be reduced,and in recent years,the tor technology often has vulnerabilities that led to the leakage of secret information.In this paper,the covert channel model of the packet ordering is applied into the distributed system,and a distributed covert channel of the packet ordering enhancement model based on data compression(DCCPOEDC)is proposed.The data compression algorithms are used to reduce the amount of data and transmission time.The distributed system and data compression algorithms can weaken the hidden statistical probability of information.Furthermore,they can enhance the unknowability of the data and weaken the time distribution characteristics of the data packets.This paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity,transmission efficiency,and transmission performance.According to the analysis results,it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering,which saves the transmission time and improves the concealment compared with the original covert channel. 展开更多
关键词 Covert channels information hiding data compression distributed system
下载PDF
Jointly beam stealing attackers detection and localization without training:an image processing viewpoint
10
作者 Yaoqi YANG Xianglin WEI +3 位作者 Renhui XU weizheng wang Laixian PENG Yangang wang 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期145-160,共16页
Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications.The premise to restore normal network service is detecting and locating beam stealing attackers w... Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications.The premise to restore normal network service is detecting and locating beam stealing attackers without their cooperation.Current consistency-based methods are only valid for one single attacker and are parametersensitive.From the viewpoint of image processing,this paper proposes an algorithm to jointly detect and locate multiple beam stealing attackers based on RSSI(Received Signal Strength Indicator)map without the training process involved in deep learning-based solutions.Firstly,an RSSI map is constructed based on interpolating the raw RSSI data for enabling high-resolution localization while reducing monitoring cost.Secondly,three image processing steps,including edge detection and segmentation,are conducted on the constructed RSSI map to detect and locate multiple attackers without any prior knowledge about the attackers.To evaluate our proposal’s performance,a series of experiments are conducted based on the collected data.Experimental results have shown that in typical parameter settings,our algorithm’s positioning error does not exceed 0.41 m with a detection rate no less than 91%. 展开更多
关键词 beam-stealing attacks DETECTION LOCALIZATION image processing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部