期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
1
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
2
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
Cross-Domain Data Traceability Mechanism Based on Blockchain
3
作者 Shoucai Zhao Lifeng Cao +2 位作者 Jinhui Li Jiling Wan Jinlong Bai 《Computers, Materials & Continua》 SCIE EI 2023年第8期2531-2549,共19页
With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,... With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,multi-security domain collaboration,etc.To solve these problems,it is proposed to construct trust domains based on federated chains.The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration.First,the architecture of the blockchain cross-domain model is designed.Combined with the data access strategy and the decision mechanism,the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.And the public chain consensus node election mechanism is realized based on PageRank.Then,according to the characteristics of a nonsingle chain structure in the process of data flow,a data retrievalmechanism based on a Bloom filter is designed,and the cross-domain traceability algorithm is given.Finally,the safety and effectiveness of the traceability mechanism are verified by security evaluation and performance analysis. 展开更多
关键词 cross-domain data traceability blockchain bloom filter
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
4
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
5
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
6
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 cross-domain authentication blockchain smart parks Certificate Authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
7
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 cross-domain authentication trust evaluation autoencoder
下载PDF
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
8
作者 Chunhui Li Hua Jiang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4491-4512,共22页
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed... In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed,the necessity for seamless information exchange has surged significantly.The existing cross-domain solutions are challenged by such issues as insufficient security,high communication overhead,and a lack of effective update mechanisms,rendering them less feasible for prolonged application on resource-limited devices.This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload.Within this framework,individual nodes solely engage in training local data and subsequently amalgamate the final model employing a federated learning algorithm to uphold enterprise systems with efficiency and security.To curtail the resource utilization of blockchains and deter malicious nodes,a node administration module predicated on the workload paradigm is introduced,enabling the release of surplus resources in response to variations in a node’s contribution metric.Upon encountering an intrusion,the system triggers an alert and logs the characteristics of the breach,facilitating a comprehensive global update across all nodes for collective defense.Experimental results across multiple scenarios have verified the security and effectiveness of the proposed solution,with no loss of its recognition accuracy. 展开更多
关键词 cross-domain collaboration blockchain federated learning contribution value node management release slack resources
下载PDF
SwinFusion: Cross-domain Long-range Learning for General Image Fusion via Swin Transformer 被引量:20
9
作者 Jiayi Ma Linfeng Tang +3 位作者 Fan Fan Jun Huang Xiaoguang Mei Yong Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第7期1200-1217,共18页
This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achi... This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achieve sufficient integration of complementary information and global interaction.More specifically,the proposed method involves an intra-domain fusion unit based on self-attention and an interdomain fusion unit based on cross-attention,which mine and integrate long dependencies within the same domain and across domains.Through long-range dependency modeling,the network is able to fully implement domain-specific information extraction and cross-domain complementary information integration as well as maintaining the appropriate apparent intensity from a global perspective.In particular,we introduce the shifted windows mechanism into the self-attention and cross-attention,which allows our model to receive images with arbitrary sizes.On the other hand,the multi-scene image fusion problems are generalized to a unified framework with structure maintenance,detail preservation,and proper intensity control.Moreover,an elaborate loss function,consisting of SSIM loss,texture loss,and intensity loss,drives the network to preserve abundant texture details and structural information,as well as presenting optimal apparent intensity.Extensive experiments on both multi-modal image fusion and digital photography image fusion demonstrate the superiority of our SwinFusion compared to the state-of-theart unified image fusion algorithms and task-specific alternatives.Implementation code and pre-trained weights can be accessed at https://github.com/Linfeng-Tang/SwinFusion. 展开更多
关键词 cross-domain long-range learning image fusion Swin transformer
下载PDF
FedCDR:Privacy-preserving federated cross-domain recommendation 被引量:1
10
作者 Dengcheng Yan Yuchuan Zhao +2 位作者 Zhongxiu Yang Ying Jin Yiwen Zhang 《Digital Communications and Networks》 SCIE CSCD 2022年第4期552-560,共9页
Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.H... Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.However,most existing approaches rely on the assumption of centralized storage of user data,which undoubtedly poses a significant risk of user privacy leakage because user data are highly privacy-sensitive.To this end,we propose a privacy-preserving Federated framework for Cross-Domain Recommendation,called FedCDR.In our method,to avoid leakage of user privacy,a general recommendation model is trained on each user's personal device to obtain embeddings of users and items,and each client uploads weights to the central server.The central server then aggregates the weights and distributes them to each client for updating.Furthermore,because the weights implicitly contain private information about the user,local differential privacy is adopted for the gradients before uploading them to the server for better protection of user privacy.To distill the relationship of user embedding between two domains,an embedding transformation mechanism is used on the server side to learn the cross-domain embedding transformation model.Extensive experiments on real-world datasets demonstrate that ourmethod achieves performance comparable with that of existing data-centralized methods and effectively protects user privacy. 展开更多
关键词 cross-domain recommendation Federated learning Privacy preserving
下载PDF
Environment drives the co-occurrence of bacteria and microeukaryotes in a typical subtropical bay
11
作者 Yifan MA Lingfeng HUANG Wenjing ZHANG 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2023年第6期2292-2308,共17页
The co-occurrence of bacteria and microeukaryote species is a ubiquitous ecological phenomenon,but there is limited cross-domain research in aquatic environments.We conducted a network statistical analysis and visuali... The co-occurrence of bacteria and microeukaryote species is a ubiquitous ecological phenomenon,but there is limited cross-domain research in aquatic environments.We conducted a network statistical analysis and visualization of microbial cross-domain co-occurrence patterns based on DNA sampling of a typical subtropical bay during four seasons,using high-throughput sequencing of both 18S rRNA and 16S rRNA genes.First,we found obvious relationships between network stability and network complexity indices.For example,increased cooperation and modularity were found to weaken the stability of cross-domain networks.Secondly,we found that bacterial operational taxonomic units(OTUs)were the most important contributors to network complexity and stability as they occupied more nodes,constituted more keystone OTUs,built more connections,more importantly,ignoring bacteria led to greater variation in network robustness.Gammaproteobacteria,Alphaproteobacteria,Bacteroidetes,and Actinobacteria were the most ecologically important groups.Finally,we found that the environmental drivers most associated with cross-domain networks varied across seasons(in detail,the network in January was primarily constrained by temperature and salinity,the network in April was primarily constrained by depth and temperature,the network in July was mainly affected by depth,temperature,and salinity,depth was the most important factor affecting the network in October)and that environmental influence was stronger on bacteria than on microeukaryotes. 展开更多
关键词 co-occurrence network cross-domain network stability network complexity subtropical bay
下载PDF
Knowledge Transfer Learning via Dual Density Sampling for Resource-Limited Domain Adaptation
12
作者 Zefeng Zheng Luyao Teng +2 位作者 Wei Zhang Naiqi Wu Shaohua Teng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第12期2269-2291,共23页
Most existing domain adaptation(DA) methods aim to explore favorable performance under complicated environments by sampling.However,there are three unsolved problems that limit their efficiencies:ⅰ) they adopt global... Most existing domain adaptation(DA) methods aim to explore favorable performance under complicated environments by sampling.However,there are three unsolved problems that limit their efficiencies:ⅰ) they adopt global sampling but neglect to exploit global and local sampling simultaneously;ⅱ)they either transfer knowledge from a global perspective or a local perspective,while overlooking transmission of confident knowledge from both perspectives;and ⅲ) they apply repeated sampling during iteration,which takes a lot of time.To address these problems,knowledge transfer learning via dual density sampling(KTL-DDS) is proposed in this study,which consists of three parts:ⅰ) Dual density sampling(DDS) that jointly leverages two sampling methods associated with different views,i.e.,global density sampling that extracts representative samples with the most common features and local density sampling that selects representative samples with critical boundary information;ⅱ)Consistent maximum mean discrepancy(CMMD) that reduces intra-and cross-domain risks and guarantees high consistency of knowledge by shortening the distances of every two subsets among the four subsets collected by DDS;and ⅲ) Knowledge dissemination(KD) that transmits confident and consistent knowledge from the representative target samples with global and local properties to the whole target domain by preserving the neighboring relationships of the target domain.Mathematical analyses show that DDS avoids repeated sampling during the iteration.With the above three actions,confident knowledge with both global and local properties is transferred,and the memory and running time are greatly reduced.In addition,a general framework named dual density sampling approximation(DDSA) is extended,which can be easily applied to other DA algorithms.Extensive experiments on five datasets in clean,label corruption(LC),feature missing(FM),and LC&FM environments demonstrate the encouraging performance of KTL-DDS. 展开更多
关键词 cross-domain risk dual density sampling intra-domain risk maximum mean discrepancy knowledge transfer learning resource-limited domain adaptation
下载PDF
A Sketch-Based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network
13
作者 Jianfeng Lu Xinyi Liu +2 位作者 Mengtao Shi Chen Cui Mahmoud Emam 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2865-2882,共18页
Ceramic tiles are one of the most indispensable materials for interior decoration.The ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural textures.In this... Ceramic tiles are one of the most indispensable materials for interior decoration.The ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural textures.In this paper,we propose a sketch-based generation method for generating diverse ceramic tile images based on a hand-drawn sketches using Generative Adversarial Network(GAN).The generated tile images can be tailored to meet the specific needs of the user for the tile textures.The proposed method consists of four steps.Firstly,a dataset of ceramic tile images with diverse distributions is created and then pre-trained based on GAN.Secondly,for each ceramic tile image in the dataset,the corresponding sketch image is generated and then the mapping relationship between the images is trained based on a sketch extraction network using ResNet Block and jump connection to improve the quality of the generated sketches.Thirdly,the sketch style is redefined according to the characteristics of the ceramic tile images and then double cross-domain adversarial loss functions are employed to guide the ceramic tile generation network for fitting in the direction of the sketch style and to improve the training speed.Finally,we apply hidden space perturbation and interpolation for further enriching the output textures style and satisfying the concept of“one style with multiple faces”.We conduct the training process of the proposed generation network on 2583 ceramic tile images dataset.To measure the generative diversity and quality,we use Frechet Inception Distance(FID)and Blind/Referenceless Image Spatial Quality Evaluator(BRISQUE)metrics.The experimental results prove that the proposed model greatly enhances the generation results of the ceramic tile images,with FID of 32.47 and BRISQUE of 28.44. 展开更多
关键词 Ceramic tile pattern design cross-domain learning deep learning GAN generative adversarial networks ResNet Block
下载PDF
基于两阶段规划模型的跨域服务流程动态构造方法
14
作者 崔立真 田君杰 王海洋 《小型微型计算机系统》 CSCD 北大核心 2011年第9期1753-1761,共9页
为了应对来自网络计算环境下业务流程跨越协同过程中层出不穷的业务需求,提出一种基于两阶段规划模型的跨域服务流程动态构造方法.第一阶段,利用跨域服务协同语义模型,基于层次任务网络规划方法,构建满足用户业务需求的跨域抽象业务流程... 为了应对来自网络计算环境下业务流程跨越协同过程中层出不穷的业务需求,提出一种基于两阶段规划模型的跨域服务流程动态构造方法.第一阶段,利用跨域服务协同语义模型,基于层次任务网络规划方法,构建满足用户业务需求的跨域抽象业务流程;第二阶段,在各域内部对抽象业务流程确定的候选服务集应用图规划数据流验证模型,构建最终的跨域可执行服务流程.方法在保证了业务需求与跨域服务流程逻辑结构的语义一致性的同时,满足了跨域服务流程中数据流的一致性,为网络计算环境下管理域间的业务协同和互操作提供了更为实际可用的可执行服务流程.原型系统实验及实例验证说明该方法的正确性和有效性. 展开更多
关键词 跨域服务流程 动态构造 两阶段规划 层次任务网络 图规划
下载PDF
截止期限约束的实例密集型云服务流调度算法
15
作者 刘炜 李陶深 黄汝维 《电信科学》 北大核心 2013年第12期87-91,100,共6页
针对商业云计算中存在大量实例密集型服务流的问题,提出一种新的云环境下两阶段服务流调度算法。该算法先将用户自定义的全局截止期限分配到系统中的每个实例,再将每个实例的截止期限分配到实例中的每个任务中,最后在服务流执行阶段,动... 针对商业云计算中存在大量实例密集型服务流的问题,提出一种新的云环境下两阶段服务流调度算法。该算法先将用户自定义的全局截止期限分配到系统中的每个实例,再将每个实例的截止期限分配到实例中的每个任务中,最后在服务流执行阶段,动态调整后续任务的截止期限,解决了任务可能存在的未能在其截止期限内完成的时间异常问题。CloudSim仿真结果表明,与现有的算法相比,该算法能满足用户定义的截止期限,节约了执行成本,并减少了资源的竞争率,提高了调度的成功率。 展开更多
关键词 云计算 服务流调度 时间异常 截止期限
下载PDF
Visualization Analysis of Multi-Domain Access Control Policy Integration Based on Tree-Maps and Semantic Substrates 被引量:2
16
作者 Li Pan Qian Xu 《Intelligent Information Management》 2012年第5期188-193,共6页
The complexity of multi-domain access control policy integration makes it difficult to understand and manage the policy conflict information. The policy information visualization technology can express the logical rel... The complexity of multi-domain access control policy integration makes it difficult to understand and manage the policy conflict information. The policy information visualization technology can express the logical relation of the complex information intuitively which can effectively improve the management ability of the multi-domain policy integration. Based on the role-based access control model, this paper proposed two policy analyzing methods on the separated domain statistical information of multi-domain policy integration conflicts and the policy element levels of inter-domain and element mapping of cross-domain respectively. In addition, the corresponding visualization tool is developed. We use the tree-maps algorithm to statistically analyze quantity and type of the policy integration conflicts. On that basis, the semantic substrates algorithm is applied to concretely analyze the policy element levels of inter-domain and role and permission mapping of cross-domain. Experimental result shows tree-maps and semantic substrates can effectively analyze the conflicts of multi-domain policy integration and have a good application value. 展开更多
关键词 cross-domain Information Exchange VISUALIZATION ANALYSIS Tree-Maps SEMANTIC SUBSTRATES
下载PDF
Image and Feature Space Based Domain Adaptation for Vehicle Detection 被引量:1
17
作者 Ying Tian Libing Wang +1 位作者 Hexin Gu Lin Fan 《Computers, Materials & Continua》 SCIE EI 2020年第12期2397-2412,共16页
The application of deep learning in the field of object detection has experienced much progress.However,due to the domain shift problem,applying an off-the-shelf detector to another domain leads to a significant perfo... The application of deep learning in the field of object detection has experienced much progress.However,due to the domain shift problem,applying an off-the-shelf detector to another domain leads to a significant performance drop.A large number of ground truth labels are required when using another domain to train models,demanding a large amount of human and financial resources.In order to avoid excessive resource requirements and performance drop caused by domain shift,this paper proposes a new domain adaptive approach to cross-domain vehicle detection.Our approach improves the cross-domain vehicle detection model from image space and feature space.We employ objectives of the generative adversarial network and cycle consistency loss for image style transfer in image space.For feature space,we align feature distributions between the source domain and the target domain to improve the detection accuracy.Experiments are carried out using the method with two different datasets,proving that this technique effectively improves the accuracy of vehicle detection in the target domain. 展开更多
关键词 Deep learning cross-domain vehicle detection
下载PDF
柔性可变形跨域智能飞行前沿探索 被引量:2
18
作者 BAO Weimin LüXiaozhou +4 位作者 BAI Guanghui LI Xiaoping LIU Yanmin BAI Bowen SHI Yaoguang 《Aerospace China》 2021年第1期5-11,共7页
As human aeronautic and aerospace technology continues to prosper and the aerial flight space domain further expands,traditional fixed-shape air vehicles have been confronted with difficulties in satisfying complex mi... As human aeronautic and aerospace technology continues to prosper and the aerial flight space domain further expands,traditional fixed-shape air vehicles have been confronted with difficulties in satisfying complex missions in cross-domain scenarios.Owing to their flexible and deformable appearance,morphing air vehicles are expected to realize cross-domain intelligent flight,thus emerging as the most subversive strategic development trend and research focus in aeronautic and aerospace fields.This paper primarily reviews the research background and challenges of flexible and deformable cross-domain intelligent flight,proposing a corresponding research framework and mode as well as exploring the scientific issues and state-of-the-art solutions,where key research progress is introduced.The explorations covered in this paper also provide ideas and directions for the study of deformable cross-domain intelligent flight,which has critical scientific significance in promoting the study itself. 展开更多
关键词 cross-domain flight FLEXIBLE INTELLIGENT deformable configuration
下载PDF
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain 被引量:2
19
作者 Jing Liu Yixin Liu +3 位作者 Yingxu Lai Rongchen Li Siyu Wu Sami Mian 《Journal of Artificial Intelligence and Technology》 2021年第2期92-100,共9页
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use publ... With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use public key infrastructure to ensure security in accessing their data and applications.However,with the continuous development of identity-based encryption(IBE)technology,small-and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems.To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process,we propose using blockchain technology to establish a reliable cross-domain authentication scheme.Using the distributed and tamper-resistant characteristics of the blockchain,we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain.This model does not change the internal trust structure of each authentication domain and is highly scalable.Furthermore,on the premise of ensuring security,the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate,thereby improving the authentication efficiency.The developed prototype exhibits generality and simplicity compared to previous methods. 展开更多
关键词 public key infrastructure identity-based encryption cross-domain authentication blockchain
下载PDF
CNN-Based Broad Learning for Cross-Domain Emotion Classification 被引量:1
20
作者 Rong Zeng Hongzhan Liu +4 位作者 Sancheng Peng Lihong Cao Aimin Yang Chengqing Zong Guodong Zhou 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期360-369,共10页
Cross-domain emotion classification aims to leverage useful information in a source domain to help predict emotion polarity in a target domain in a unsupervised or semi-supervised manner.Due to the domain discrepancy,... Cross-domain emotion classification aims to leverage useful information in a source domain to help predict emotion polarity in a target domain in a unsupervised or semi-supervised manner.Due to the domain discrepancy,an emotion classifier trained on source domain may not work well on target domain.Many researchers have focused on traditional cross-domain sentiment classification,which is coarse-grained emotion classification.However,the problem of emotion classification for cross-domain is rarely involved.In this paper,we propose a method,called convolutional neural network(CNN)based broad learning,for cross-domain emotion classification by combining the strength of CNN and broad learning.We first utilized CNN to extract domain-invariant and domain-specific features simultaneously,so as to train two more efficient classifiers by employing broad learning.Then,to take advantage of these two classifiers,we designed a co-training model to boost together for them.Finally,we conducted comparative experiments on four datasets for verifying the effectiveness of our proposed method.The experimental results show that the proposed method can improve the performance of emotion classification more effectively than those baseline methods. 展开更多
关键词 cross-domain emotion classification CNN broad learning CLASSIFIER CO-TRAINING
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部