期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Ensuring Both Development and Security:Theoretical Construction and Practical Achievements
1
作者 Han Liqun Huang Zheng 《Contemporary International Relations》 2024年第6期25-47,共23页
The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between dev... The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between development and security;furthermore,we must achieve positive interplay between high-quality development and high-level security to effectively ensure China's long-term stability.Ensuring both development and security is a major principle underlying the CPC's governance.This principle has been gradually established and enriched in the CPC's struggle to promote socio-economic development and safeguard national security.It is an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,encapsulating the worldview and methodology of the CPC's innovative theories in the new era and realizing the dialectical unity of political security and economic security,a people-centered development philosophy and a people-oriented security philosophy,the fundamental approaches to development and the fundamental requirements of security,high-quality development and high-level security,and maintaining the initiative for development and enhancing security preparedness.Since the 18th CPC National Congress,the principle of ensuring both development and security has demonstrated great strength in guiding our thinking and promoting practical creativity,showing that the CPC's understanding of the dialectical relationship between development and security and its capacity to enhance security through development and ensure development through security have reached new heights. 展开更多
关键词 Chinese modernization ensuring both development and security holistic approach to national security
下载PDF
Cyberspace Endogenous Safety and Security 被引量:4
2
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
Credibility and Security of Weighing System for Large Structure Object 被引量:1
3
作者 章青 周延兴 《Transactions of Tianjin University》 EI CAS 2006年第2期92-95,共4页
The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of ... The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced. 展开更多
关键词 weighing system hydraulic system computer controlling loading system reliability and security
下载PDF
CALL FOR PAPERS Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06)
4
《复杂系统与复杂性科学》 EI CSCD 2005年第1期84-86,共3页
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as... Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region. 展开更多
关键词 security in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining CALL FOR PAPERS Workshop on Intelligence and security Informatics ASIA
下载PDF
Challenges to Common Interests China-US-Africa Cooperation on Peace and Security
5
作者 Li Wentao Yang Zhiguang 《Contemporary International Relations》 2017年第5期61-68,共8页
The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa ha... The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa has featured high return and high risk historically,and it remains clear that no single entity can properly solve current security challenges that Africa faces.The moment calls for international joint collaboration and concerted effort on the part of China,the US and African countries. 展开更多
关键词 AFRICA peace and security tilateral cooperation
下载PDF
Balancing Development and Security in the Context of Containment and Pressure by the United States
6
作者 Zhang Wenzong 《Contemporary International Relations》 2022年第5期33-53,共21页
The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China ... The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term. 展开更多
关键词 United States containment holistic approach to national security balancing development and security
下载PDF
Ensuring Both Development and Security: Evolutionary Logic and Contemporary Values
7
作者 Huang Dahui Hu Qing 《Contemporary International Relations》 2022年第6期24-51,共28页
China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to... China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics. 展开更多
关键词 ensuring both development and security holistic approach to national security path of national security with Chinese characteristics
下载PDF
Bilateral and Regional Strategic and Security Relationship Between China and the US after the Cold War
8
作者 楚树龙 《Contemporary International Relations》 2000年第5期1-13,共13页
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet... Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field. 展开更多
关键词 US Bilateral and Regional Strategic and security Relationship Between China and the US after the Cold War security
下载PDF
Examining the Condition of Controlling and Inspecting State Vessels (in Terms of Technical and Security Factors) Traveling to Bushehr Ports and Providing Suitable Solutions
9
作者 Danial Hayati Zadeh Behrooz Amraie Gholamreza Delbar 《Open Journal of Marine Science》 2016年第2期247-257,共11页
The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling off... The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling officers of Bushehrvessels. The results of Kolmogrov-Smirinov test suggest that the data are normal and T-test has been used for questionnaire analysis. The findings indicate that failure in technical and security certificates, failure of qualification certificate, failure of machinery and electrical appliances, structural safety defects, failure of telecommunication equipment, failure of security in under 500 tons motor boats and traditional and metal vessels [1]. As well, above 500 tons vessels traveling to Bushehr waters (state vessels) have suitable conditions. 展开更多
关键词 Technical and security Condition State Vessels Ports of Bushehr
下载PDF
The Future and Influence of the European Common Foreign and Security Policy
10
作者 Tang HaijunWangZheng 《International Understanding》 2003年第4期20-21,共2页
关键词 security The Future and Influence of the European Common Foreign and security Policy of
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
11
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
12
作者 Maryam Roshanaei Mahir R. Khan Natalie N. Sylvester 《Journal of Information Security》 2024年第3期320-339,共20页
The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cyber... The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security. 展开更多
关键词 Artificial Intelligence Machine Learning CYBERsecurity Data Privacy and security Ethical Standards
下载PDF
Regional Security Dilemma and Security Ownership——Some Observations on the Possibility of the U.S.Return to Asia-Pacific
13
作者 Ma Yankun 《Peace》 2013年第3期24-34,共11页
The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma... The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity. 展开更多
关键词 Asia Regional security Dilemma and security Ownership Some Observations on the Possibility of the U.S.Return to Asia-Pacific security
原文传递
Investigation and Analysis of Pesticide Residues in Citrus from Parts of Hubei Province 被引量:1
14
作者 易甜 胡定金 +4 位作者 龚艳 彭立军 王明锐 张惠贤 姚晶晶 《Agricultural Science & Technology》 CAS 2017年第4期680-682,共3页
The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in C... The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in Citrus reticulate was 91.9%. The detection rate of banned pesticides was 1.6%. The detection rate of restricted pesticides was 9.5%. The detection rate of allowed pesticides was 68.3%. The detection rate of unregistered pesticides was 15.9%. The pesticide used in citrus was relatively common. Because of the banned and restricted pesticides were both in the control degree, on the whole, the quality and security of Citrus reticulata was safe. 展开更多
关键词 CITRUS pesticide residues Quality and security
下载PDF
Key Optimization Issues for Renewable Energy Systems under Carbon-Peaking and Carbon Neutrality Targets:Current States and Perspectives
15
作者 Bo Yang Zhengxun Guo +3 位作者 JingboWang Chao Duan Yaxing Ren Yixuan Chen 《Energy Engineering》 EI 2022年第5期1789-1795,共7页
1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhil... 1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhile,has announced through the“carbon-peaking and carbon neutrality targets”in September 2020 that it aims to achieve“peak carbon use”by 2030 and“carbon neutrality”by 2060[1].According to statistical data from the International Energy Agency(IEA),Fig.1 illustrates the carbon intensity of electricity generation in various regions in the Announced Pledge Scenario(APS)from 2010 to 2040[2].One can easily observe that each region aims to accomplish a sharp decrease in the carbon intensity of electricity generation after 2020. 展开更多
关键词 Carbon-peaking and carbon neutrality targets renewable energy optimization modeling power forecast planning and dispatching reliability and security analysis
下载PDF
The Governance of Complementary Global Regimes Dealing With War and Crime:The Interaction Between the United Nations and the International Criminal Court
16
作者 Andrea Marrone 《Journalism and Mass Communication》 2023年第1期17-25,共9页
The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an i... The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance? 展开更多
关键词 International Law International Relations Peace and security International Criminal Justice
下载PDF
Multifunctional HDPE/Cu biocidal nanocomposites for MEX additive manufactured parts: Perspectives for the defense industry
17
作者 Nectarios Vidakis Nikolaos Michailidis +7 位作者 Markos Petousis Nektarios K.Nasikas Vassilios Saltas Vassilis Papadakis Nikolaos Mountakis Apostolos Argyros Mariza Spiridaki Ioannis Valsamos 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第8期16-32,共17页
In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0... In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum. 展开更多
关键词 High-density polyethylene(HDPE) Copper(Cu) Material extrusion(MEX) Mechanical performance Electrical properties ANTIBACTERIAL Defense and security
下载PDF
Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things 被引量:2
18
作者 Alaa Omran Almagrabi Rashid Ali +2 位作者 Daniyal Alghazzawi Abdullah AlBarakati Tahir Khurshaid 《Computers, Materials & Continua》 SCIE EI 2021年第7期359-376,共18页
The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturi... The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturing,smart logistics,smart banking,and smart insurance.In the advancement of the IoT,connected devices become smart and intelligent with the help of sensors and actuators.However,issues and challenges need to be addressed regarding the data reliability and protection for signicant nextgeneration IoT applications like smart healthcare.For these next-generation applications,there is a requirement for far-reaching privacy and security in the IoT.Recently,blockchain systems have emerged as a key technology that changes the way we exchange data.This emerging technology has revealed encouraging implementation scenarios,such as secured digital currencies.As a technical advancement,the blockchain network has the high possibility of transforming various industries,and the next-generation healthcare IoT(HIoT)can be one of those applications.There have been several studies on the integration of blockchain networks and IoT.However,blockchain-as-autility(BaaU)for privacy and security in HIoT systems requires a systematic framework.This paper reviews blockchain networks and proposes BaaU as one of the enablers.The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios.The rst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts,such as Ethereum,to automate and control the trusted devices’subscription in the HIoT services. 展开更多
关键词 blockchain next-generation IoT privacy and security healthcare IoT complex healthcare applications
下载PDF
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G 被引量:1
19
作者 Mamoon M.Saeed Mohammad Kamrul Hasan +4 位作者 Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta 《Computers, Materials & Continua》 SCIE EI 2022年第3期5551-5568,共18页
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ... The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme. 展开更多
关键词 5G privacy and security user identity IMSI authentication and key agreement(AKA)
下载PDF
Enabling Intelligence at Network Edge: An Overview of Federated Learning 被引量:4
20
作者 Howard H.YANG ZHAO Zhongyuan Tony Q.S.QUEK 《ZTE Communications》 2020年第2期2-10,共9页
The burgeoning advances in machine learning and wireless technologies are forg?ing a new paradigm for future networks, which are expected to possess higher degrees of in?telligence via the inference from vast dataset ... The burgeoning advances in machine learning and wireless technologies are forg?ing a new paradigm for future networks, which are expected to possess higher degrees of in?telligence via the inference from vast dataset and being able to respond to local events in a timely manner. Due to the sheer volume of data generated by end-user devices, as well as the increasing concerns about sharing private information, a new branch of machine learn?ing models, namely federated learning, has emerged from the intersection of artificial intelli?gence and edge computing. In contrast to conventional machine learning methods, federated learning brings the models directly to the device for training, where only the resultant param?eters shall be sent to the edge servers. The local copies of the model on the devices bring along great advantages of eliminating network latency and preserving data privacy. Never?theless, to make federated learning possible, one needs to tackle new challenges that require a fundamental departure from standard methods designed for distributed optimizations. In this paper, we aim to deliver a comprehensive introduction of federated learning. Specifical?ly, we first survey the basis of federated learning, including its learning structure and the distinct features from conventional machine learning models. We then enumerate several critical issues associated with the deployment of federated learning in a wireless network, and show why and how technologies should be jointly integrated to facilitate the full imple?mentation from different perspectives, ranging from algorithmic design, on-device training, to communication resource management. Finally, we conclude by shedding light on some po?tential applications and future trends. 展开更多
关键词 federated learning edge intelligence learning algorithm communication efficiency privacy and security
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部