期刊文献+
共找到1,236篇文章
< 1 2 62 >
每页显示 20 50 100
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
1
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
Cross-Domain Data Traceability Mechanism Based on Blockchain
2
作者 Shoucai Zhao Lifeng Cao +2 位作者 Jinhui Li Jiling Wan Jinlong Bai 《Computers, Materials & Continua》 SCIE EI 2023年第8期2531-2549,共19页
With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,... With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,multi-security domain collaboration,etc.To solve these problems,it is proposed to construct trust domains based on federated chains.The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration.First,the architecture of the blockchain cross-domain model is designed.Combined with the data access strategy and the decision mechanism,the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.And the public chain consensus node election mechanism is realized based on PageRank.Then,according to the characteristics of a nonsingle chain structure in the process of data flow,a data retrievalmechanism based on a Bloom filter is designed,and the cross-domain traceability algorithm is given.Finally,the safety and effectiveness of the traceability mechanism are verified by security evaluation and performance analysis. 展开更多
关键词 cross-domain data traceability blockchain bloom filter
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
3
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
4
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 cross-domain authentication blockchain smart parks Certificate Authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
5
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
SwinFusion: Cross-domain Long-range Learning for General Image Fusion via Swin Transformer 被引量:13
6
作者 Jiayi Ma Linfeng Tang +3 位作者 Fan Fan Jun Huang Xiaoguang Mei Yong Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第7期1200-1217,共18页
This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achi... This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achieve sufficient integration of complementary information and global interaction.More specifically,the proposed method involves an intra-domain fusion unit based on self-attention and an interdomain fusion unit based on cross-attention,which mine and integrate long dependencies within the same domain and across domains.Through long-range dependency modeling,the network is able to fully implement domain-specific information extraction and cross-domain complementary information integration as well as maintaining the appropriate apparent intensity from a global perspective.In particular,we introduce the shifted windows mechanism into the self-attention and cross-attention,which allows our model to receive images with arbitrary sizes.On the other hand,the multi-scene image fusion problems are generalized to a unified framework with structure maintenance,detail preservation,and proper intensity control.Moreover,an elaborate loss function,consisting of SSIM loss,texture loss,and intensity loss,drives the network to preserve abundant texture details and structural information,as well as presenting optimal apparent intensity.Extensive experiments on both multi-modal image fusion and digital photography image fusion demonstrate the superiority of our SwinFusion compared to the state-of-theart unified image fusion algorithms and task-specific alternatives.Implementation code and pre-trained weights can be accessed at https://github.com/Linfeng-Tang/SwinFusion. 展开更多
关键词 cross-domain long-range learning image fusion Swin transformer
下载PDF
FedCDR:Privacy-preserving federated cross-domain recommendation
7
作者 Dengcheng Yan Yuchuan Zhao +2 位作者 Zhongxiu Yang Ying Jin Yiwen Zhang 《Digital Communications and Networks》 SCIE CSCD 2022年第4期552-560,共9页
Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.H... Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.However,most existing approaches rely on the assumption of centralized storage of user data,which undoubtedly poses a significant risk of user privacy leakage because user data are highly privacy-sensitive.To this end,we propose a privacy-preserving Federated framework for Cross-Domain Recommendation,called FedCDR.In our method,to avoid leakage of user privacy,a general recommendation model is trained on each user's personal device to obtain embeddings of users and items,and each client uploads weights to the central server.The central server then aggregates the weights and distributes them to each client for updating.Furthermore,because the weights implicitly contain private information about the user,local differential privacy is adopted for the gradients before uploading them to the server for better protection of user privacy.To distill the relationship of user embedding between two domains,an embedding transformation mechanism is used on the server side to learn the cross-domain embedding transformation model.Extensive experiments on real-world datasets demonstrate that ourmethod achieves performance comparable with that of existing data-centralized methods and effectively protects user privacy. 展开更多
关键词 cross-domain recommendation Federated learning Privacy preserving
下载PDF
Context Information and Fragments Based Cross-Domain Word Segmentation 被引量:8
8
作者 Huang Degen Tong Deqin 《China Communications》 SCIE CSCD 2012年第3期49-57,共9页
A new joint decoding strategy that combines the character-based and word-based conditional random field model is proposed.In this segmentation framework,fragments are used to generate candidate Out-of-Vocabularies(OOV... A new joint decoding strategy that combines the character-based and word-based conditional random field model is proposed.In this segmentation framework,fragments are used to generate candidate Out-of-Vocabularies(OOVs).After the initial segmentation,the segmentation fragments are divided into two classes as "combination"(combining several fragments as an unknown word) and "segregation"(segregating to some words).So,more OOVs can be recalled.Moreover,for the characteristics of the cross-domain segmentation,context information is reasonably used to guide Chinese Word Segmentation(CWS).This method is proved to be effective through several experiments on the test data from Sighan Bakeoffs 2007 and Bakeoffs 2010.The rates of OOV recall obtain better performance and the overall segmentation performances achieve a good effect. 展开更多
关键词 上下文信息 分词 解码策略 合理使用 测试数据 未登录词 召回率 分割
下载PDF
Achieving Consistence for Cross-Domain WAN Control in Software-Defined Networks 被引量:2
9
作者 ZHOU Boyang WU Chunming +3 位作者 GAO Wen HONG Xiaoyan JIANG Ming CHEN Shuangxi 《China Communications》 SCIE CSCD 2015年第10期136-146,共11页
When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain ser... When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain services,to ensure the data plane configured in consensus for different domains.Such consistence process is complicated by potential failure and errors of WANs.In this paper,we propose a consistence layer to actively and passively snapshot the cross-domain control states,to reduce the complexities of service realizations.We implement the layer and evaluate performance in the PlanetLab testbed for the WAN emulation.The testbed conditions are extremely enlarged comparing to the real network.The results show its scalability,reliability and responsiveness in dealing with the control dynamics.In the normalized results,the active and passive snapshots are executed with the mean times of 1.873 s and 105 ms in135 controllers,indicating its readiness to be used in the real network. 展开更多
关键词 广域网络 软件定义 控制性 中跨 可扩展性 平面配置 控制状态 仿真性能
下载PDF
CNN-Based Broad Learning for Cross-Domain Emotion Classification 被引量:1
10
作者 Rong Zeng Hongzhan Liu +4 位作者 Sancheng Peng Lihong Cao Aimin Yang Chengqing Zong Guodong Zhou 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期360-369,共10页
Cross-domain emotion classification aims to leverage useful information in a source domain to help predict emotion polarity in a target domain in a unsupervised or semi-supervised manner.Due to the domain discrepancy,... Cross-domain emotion classification aims to leverage useful information in a source domain to help predict emotion polarity in a target domain in a unsupervised or semi-supervised manner.Due to the domain discrepancy,an emotion classifier trained on source domain may not work well on target domain.Many researchers have focused on traditional cross-domain sentiment classification,which is coarse-grained emotion classification.However,the problem of emotion classification for cross-domain is rarely involved.In this paper,we propose a method,called convolutional neural network(CNN)based broad learning,for cross-domain emotion classification by combining the strength of CNN and broad learning.We first utilized CNN to extract domain-invariant and domain-specific features simultaneously,so as to train two more efficient classifiers by employing broad learning.Then,to take advantage of these two classifiers,we designed a co-training model to boost together for them.Finally,we conducted comparative experiments on four datasets for verifying the effectiveness of our proposed method.The experimental results show that the proposed method can improve the performance of emotion classification more effectively than those baseline methods. 展开更多
关键词 cross-domain emotion classification CNN broad learning CLASSIFIER CO-TRAINING
原文传递
Teachers cooperation:team-knowledge distillation for multiple cross-domain few-shot learning
11
作者 Zhong JI Jingwei NI +1 位作者 Xiyao LIU Yanwei PANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第2期91-99,共9页
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(C... Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(CD-FSL).Utilizing more source domain data is an effective way to improve the performance of CD-FSL.However,knowledge from different source domains may entangle and confuse with each other,which hurts the performance on the target domain.Therefore,we propose team-knowledge distllation networks(TKD-Net)to tackle this problem,which explores a strategy to help the cooperation of multiple teachers.Specifically,we distill knowledge from the cooperation of teacher networks to a single student network in a meta-learning framework.It incorporates task-oriented knowledge distillation and multiple cooperation among teachers to train an efficient student with better generalization ability on unseen tasks.Moreover,our TKD-Net employs both response-based knowledge and relation-based knowledge to transfer more comprehensive and effective knowledge.Extensive experimental results on four fine-grained datasets have demonstrated the effectiveness and superiority of our proposed TKD-Net approach. 展开更多
关键词 cross-domain few-shot learning meta-learning knowledge distillation multiple teachers
原文传递
Three Heads Better than One:Pure Entity,Relation Label and Adversarial Training for Cross-domain Few-shot Relation Extraction
12
作者 Wenlong Fang Chunping Ouyang +1 位作者 Qiang Lin Yue Yuan 《Data Intelligence》 EI 2023年第3期807-823,共17页
In this paper,we study cross-domain relation extraction.Since new data mapping to feature spaces always differs from the previously seen data due to a domain shif,few-shot relation extraction often perform poorly.To s... In this paper,we study cross-domain relation extraction.Since new data mapping to feature spaces always differs from the previously seen data due to a domain shif,few-shot relation extraction often perform poorly.To solve the problems caused by cross-domain,we propose a method for combining the pure entity,relation labels and adversarial(PERLA).We first use entities and complete sentences for separate encoding to obtain context-independent entity features.Then,we combine relation labels which are useful for relation extraction to mitigate context noise.We combine adversarial to reduce the noise caused by cross-domain.We conducted experiments on the publicly available cross-domain relation extraction dataset Fewrel 2.o[1]o,and the results show that our approach improves accuracy and has better transferability for better adaptation to cross-domain tasks. 展开更多
关键词 cross-domain Adversarial Learning Prototypical Networks Pure eatity Relation label META-LEARNING
原文传递
Cross-domain identity authentication scheme based on blockchain and PKI system
13
作者 Hai Zhang Feng Zhao 《High-Confidence Computing》 2023年第1期8-17,共10页
In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructur... In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructure(PKI)system is often used to solve the identity authentication and security trust problems faced by VANET.However,the PKI system has challenges such as too centralized Authority of Certification Authority(CA),frequent cross-domain access to certificate interactions and high authentication volume,leading to high certificate management costs,complex cross-domain authentication paths,easy privacy leakage,and overburdened networks.To address these problems,this paper proposes a lightweight blockchain-based PKI identity management and authentication architecture that uses smart contracts to reduce the heavy burden caused by CAs directly managing the life cycle of digital certificates.On this basis,a trust chain based on smart contracts is designed to replace the traditional CA trust chain to meet the general cross-domain requirements,to effectively avoid the communication pressure caused by a mass of certificate transmissions.For the cross-domain scenario with higher privacy and security requirements the identity attribute authentication service is provided directly while protecting privacy by using the Merkle tree to anchor identity attribute data on and off the blockchain chain.Finally,the proposed scheme was comprehensively analyzed in terms of cost,time consumption and security. 展开更多
关键词 Vehicular ad hoc network PKI Blockchain cross-domain authentication
原文传递
跨域无人集群协同反潜搜索方法研究
14
作者 王宁 梁晓龙 +2 位作者 张佳强 侯岳奇 杨爱武 《系统仿真学报》 CAS CSCD 北大核心 2024年第4期817-824,共8页
针对海上反潜搜索问题,提出一种将无人艇作为无人机的通信中继的跨域无人集群协同搜索方法,采用数字网格地图表征任务区域,构建了跨域平台的运动学模型;提出了跨域无人系统的协作方法,设计了无人系统之间的分布式信息融合机制;设计了异... 针对海上反潜搜索问题,提出一种将无人艇作为无人机的通信中继的跨域无人集群协同搜索方法,采用数字网格地图表征任务区域,构建了跨域平台的运动学模型;提出了跨域无人系统的协作方法,设计了无人系统之间的分布式信息融合机制;设计了异构平台的搜索目标函数,引导无人系统在搜索任务中实时决策。仿真结果表明:所提方法能够有效适用于文中反潜搜索任务想定,跨域平台之间能够通过优势互补提高搜索效能。 展开更多
关键词 反潜搜索 无人集群 航迹规划 跨域协同 信息交互
下载PDF
跨域数据管理
15
作者 杜小勇 李彤 +3 位作者 卢卫 范举 张峰 柴云鹏 《计算机科学》 CSCD 北大核心 2024年第1期4-12,共9页
随着数据成为新的生产要素和数字中国顶层战略的推进,跨域数据共享和流通对于实现数据要素价值最大化变得至关重要。国家通过布局全国一体化大数据中心体系、启动“东数西算”工程等一系列举措,为数据要素的跨域应用提供了基础设施。然... 随着数据成为新的生产要素和数字中国顶层战略的推进,跨域数据共享和流通对于实现数据要素价值最大化变得至关重要。国家通过布局全国一体化大数据中心体系、启动“东数西算”工程等一系列举措,为数据要素的跨域应用提供了基础设施。然而,传统的数据管理局限于单一域内,无法满足跨域场景下的数据管理需求。跨域数据管理面临通信层面的跨空间域挑战、数据建模层面的异构模型融合问题,以及数据访问层面的跨信任域挑战。从跨空间域、跨管辖域和跨信任域3个视角出发,探讨了跨域数据管理的内涵、研究挑战及关键技术,并展望了其未来发展趋势。 展开更多
关键词 数据管理 跨空间域 跨管辖域 跨信任域
下载PDF
卫星互联网支撑跨域无人集群作战
16
作者 李沫 郭栋 +4 位作者 周东红 董冠涛 李东禹 储红兵 商志刚 《水下无人系统学报》 2024年第2期208-214,共7页
跨域无人集群作为一种颠覆性的未来全新作战模式,其作战效能的发挥极大地受限于通信组网能力。近年来,卫星互联网凭借其广覆盖、低延时、高宽带及低成本等技术优势,在全球快速发展,是进一步发展跨域无人集群作战模式的关键。文中针对未... 跨域无人集群作为一种颠覆性的未来全新作战模式,其作战效能的发挥极大地受限于通信组网能力。近年来,卫星互联网凭借其广覆盖、低延时、高宽带及低成本等技术优势,在全球快速发展,是进一步发展跨域无人集群作战模式的关键。文中针对未来水下无人系统的发展趋势和现实需求,介绍了卫星互联网的发展、技术优势以及跨域无人集群的作战概念,深入分析了卫星互联网支撑跨域无人集群作战的优势,提出了结合卫星互联网技术与空域、海面、水下作战域无人集群相结合的空海跨域无人集群作战网络,并综合分析给出了技术架构,可为未来跨域无人集群作战研究提供参考。 展开更多
关键词 卫星互联网 跨域 无人集群
下载PDF
基于空海异构无人平台的水下目标搜索与跟踪
17
作者 丁文俊 柴亚军 +2 位作者 杨宇贤 刘佳敏 毛昭勇 《水下无人系统学报》 2024年第2期237-249,共13页
海上异构无人系统可有效提高复杂任务的完成效率。文中采用自主水下航行器(AUV)和无人机(UAV)来完成近海海域内未知水下目标的搜索与跟踪任务。首先,描述了水下目标搜索跟踪任务,将任务过程分为目标搜索和目标跟踪阶段,2个阶段的目标分... 海上异构无人系统可有效提高复杂任务的完成效率。文中采用自主水下航行器(AUV)和无人机(UAV)来完成近海海域内未知水下目标的搜索与跟踪任务。首先,描述了水下目标搜索跟踪任务,将任务过程分为目标搜索和目标跟踪阶段,2个阶段的目标分别是使AUV&UAV总搜索空间最大化以及AUV与水下目标的末端位置误差最小;然后,建立AUV&UAV跨域协同搜索模型,并设定模型中AUV和UAV探测范围和通信距离等约束条件;最后,在跨域协同搜索与路径跟踪规划中,基于传统粒子群算法,加入自适应学习因子调控策略和精英保存策略,生成搜索与跟踪路径。仿真实验表明,采用改进粒子群优化算法的AUV&UAV异构无人系统能够更高效地完成水下目标搜索与跟踪任务。 展开更多
关键词 跨域无人系统 自主水下航行器 无人机 改进粒子群优化算法
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
18
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 cross-domain authentication trust evaluation autoencoder
下载PDF
学科交叉背景下2023年产品设计研究进展及反思
19
作者 吕杰锋 孙荦 陆江艳 《创意与设计》 2024年第1期12-18,共7页
为进一步推动产品设计研究向着更深、更广的跨领域融合方向发展,通过文献研究法、Cite Space关键词共现分析及可视化呈现,系统梳理和深度剖析2023年度涵盖国家政策导向、教育体系改革、学术期刊论文发表概况、学位论文热点主题、国家级... 为进一步推动产品设计研究向着更深、更广的跨领域融合方向发展,通过文献研究法、Cite Space关键词共现分析及可视化呈现,系统梳理和深度剖析2023年度涵盖国家政策导向、教育体系改革、学术期刊论文发表概况、学位论文热点主题、国家级基金获批项目、高校与学术机构的论坛会议等多维度资料,揭示产品设计研究领域在学科交叉背景下的发展现状和特点,总结当前产品设计研究在跨学科交融过程中所面临的问题,展望了产品设计研究面向未来社会发展与产业需求、立足本土文化、跨领域创新理论与实践成果的高度融合等核心趋势,对未来研究方向做出了前瞻性的预测与建议。 展开更多
关键词 设计学 产品设计 学科交叉 跨领域融合
下载PDF
一种基于主从链的跨域身份认证算法
20
作者 王正 戴煜洲 +1 位作者 廖丹 张明 《通信技术》 2024年第1期72-79,共8页
为了抵御身份伪造攻击和解决认证效率低的问题,提出了一种基于主从链的跨域身份认证算法(Cross-domain identity Authentication algorithm based on the Master-Slave chain,CAMS)。该算法基于区块链技术利用主从链方式实现了车辆数据... 为了抵御身份伪造攻击和解决认证效率低的问题,提出了一种基于主从链的跨域身份认证算法(Cross-domain identity Authentication algorithm based on the Master-Slave chain,CAMS)。该算法基于区块链技术利用主从链方式实现了车辆数据的跨域存储和共享,从而提高了跨域身份认证效率。此外,CAMS算法在跨域认证过程中引入了假名的生成和验证参数。在验证消息之前,进一步验证车辆身份,确保认证身份的匿名性,抵御身份伪造攻击。仿真结果表明,CAMS在计算开销和认证效率方面具有较好的性能。 展开更多
关键词 跨域 身份验证 主从链 车联网
下载PDF
上一页 1 2 62 下一页 到第
使用帮助 返回顶部