期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A New Evaluation Algorithm for the Influence of User in Social Network 被引量:5
1
作者 JIANG Wei GAO Mengdi +1 位作者 WANG Xiaoxi WU Xianda 《China Communications》 SCIE CSCD 2016年第2期200-206,共7页
Online social networks have gradually permeated into every aspect of people's life.As a research hotspot in social network, user influence is of theoretical and practical significant for information transmission, ... Online social networks have gradually permeated into every aspect of people's life.As a research hotspot in social network, user influence is of theoretical and practical significant for information transmission, optimization and integration. A prominent application is a viral marketing campaign which aims to use a small number of targeted infl uence users to initiate cascades of infl uence that create a global increase in product adoption. In this paper, we analyze mainly evaluation methods of user infl uence based on IDM evaluation model, Page Rank evaluation model, use behavior model and some other popular influence evaluation models in currently social network. And then, we extract the core idea of these models to build our influence evaluation model from two aspects, relationship and activity. Finally, the proposed approach was validated on real world datasets,and the result of experiments shows that our method is both effective and stable. 展开更多
关键词 社会网络 用户 影响评价 PAGERANK 算法 评价模型 网络社交 营销活动
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
2
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 数据系统 计算环境 第三方 信任 采购 验证 服务供应商 数据计算
下载PDF
Authentication of Vehicles and Road Side Units in Intelligent Transportation System
3
作者 Muhammad Waqas Shanshan Tu +5 位作者 Sadaqat Ur Rehman Zahid Halim Sajid Anwar Ghulam Abbas Ziaul Haq Abbas Obaid Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2020年第7期359-371,共13页
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ... Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and governments.Smart and autonomous vehicles are connected wirelessly,which are more attracted for attackers due to the open nature of wireless communication.One of the problems is the rogue attack,in which the attacker pretends to be a legitimate user or access point by utilizing fake identity.To figure out the problem of a rogue attack,we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication link.We consider the communication link between vehicle-to-vehicle,and vehicle-to-infrastructure.We evaluate the performance of our proposed technique by measuring the rogue attack probability,false alarm rate(FAR),mis-detection rate(MDR),and utility function of a receiver based on the test threshold values of reinforcement learning algorithm.The results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver’s utility. 展开更多
关键词 Intelligent transportation system AUTHENTICATION rogue attack
下载PDF
Online prediction of EEG based on KRLST algorithm
4
作者 连召洋 Duan Lijuan +2 位作者 Chen Juncheng Qiao Yuanhua Miao Jun 《High Technology Letters》 EI CAS 2021年第4期357-364,共8页
Kernel adaptive algorithm is an extension of adaptive algorithm in nonlinear,and widely used in the field of non-stationary signal processing.But the distribution of classic data sets seems relatively regular and simp... Kernel adaptive algorithm is an extension of adaptive algorithm in nonlinear,and widely used in the field of non-stationary signal processing.But the distribution of classic data sets seems relatively regular and simple in time series.The distribution of the electroencephalograph(EEG)signal is more randomness and non-stationarity,so online prediction of EEG signal can further verify the robustness and applicability of kernel adaptive algorithms.What’s more,the purpose of modeling and analyzing the time series of EEG signals is to discover and extract valuable information,and to reveal the internal relations of EEG signals.The time series prediction of EEG plays an important role in EEG time series analysis.In this paper,kernel RLS tracker(KRLST)is presented to online predict the EEG signals of motor imagery and compared with other 13 kernel adaptive algorithms.The experimental results show that KRLST algorithm has the best effect on the brain computer interface(BCI)dataset. 展开更多
关键词 brain computer interface(BCI) kernel adaptive algorithm online prediction of electroencephalograph(EEG)
下载PDF
EEG Source Localization Using Spatio-Temporal Neural Network 被引量:3
5
作者 Song Cui Lijuan Duan +4 位作者 Bei Gong Yuanhua Qiao Fan Xu Juncheng Chen Changming Wang 《China Communications》 SCIE CSCD 2019年第7期131-143,共13页
Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is ... Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is proposed to model the EEG inverse problem using spatio-temporal long-short term memory recurrent neural networks (LSTM). The network model consists of two parts, sEEG encoding and source decoding, to model the sEEG signal and receive the regression of source location. As there does not exist enough annotated sEEG signals correspond to specific source locations, simulated data is generated with forward model using finite element method (FEM) to act as a part of training signals. A framework for source localization is proposed to estimate the source position based on simulated training data. Experiments are done on simulated testing data. The results on simulated data exhibit good robustness on noise signal, and the proposed network solves the EEG inverse problem with spatio-temporal deep network. The result show that the proposed method overcomes the highly ill-posed linear inverse problem with data driven learning. 展开更多
关键词 ELECTROENCEPHALOGRAM LSTM SOURCE LOCALIZATION SPATIO-TEMPORAL MODELING
下载PDF
New Collision Paths for Round-Reduced SKINNY-Hash
6
作者 Xinfang Song Wei Jiang +2 位作者 Zheng Li Lijing Liu Shenggen Wu 《China Communications》 SCIE CSCD 2020年第6期145-152,共8页
In recent years,with the rapid development of the Internet of Things(IoT),RFID tags,industrial controllers,sensor nodes,smart cards and other small computing devices are increasingly widely deployed.In order to help p... In recent years,with the rapid development of the Internet of Things(IoT),RFID tags,industrial controllers,sensor nodes,smart cards and other small computing devices are increasingly widely deployed.In order to help protect low-power,low-cost Internet of things devices,lightweight cryptography came into being.In order to launch the standard of cryptographic algorithm suitable for constrained environment,NIST started the process of lightweight cryptography standardization in 2016,and published the second round of candidate cryptographic algorithms in August2019.SKINNY-Hash in the sponge construction is one of the second round candidates,as well as SKINNY-AEAD.The tweakable block cipher SKINNY is the basic component for both of them.Although cryptanalysts have proposed several cryptanalysis results on SKINNY and SKINNY-AEAD,there is no cryptanalysis results on SKINNY-Hash.Based on the differential cryptanalysis and the method of mixed integer programming(MELP),we perform differential cryptanalysis on SKINNY-Hash.The core is to set up the inequations of the MILP model.Actually,it is hard to obtain the inequations of the substitution(i.e.S-box)obeying the previous method.By a careful study of the permutation,we partition the substitution into a nonlinear part and a linear part,then a series of inequations in the MILP model is obtained to describe the differentials with high possibilities.As a result,we propose a differential hash collision path of 3-round SKINNY-tk3-Hash.By adjusting the bit rate of SKINNY-tk3-Hash,we propose a 7-round collision path for the simplified algorithm.The cryptanalysis in this paper will help to promote the NIST Lightweight Crypto Standardization process. 展开更多
关键词 Internet of Things SKINNY-Hash differential cryptanalysis collision path MILP
下载PDF
Simulate Human Saccadic Scan-Paths in Target Searching
7
作者 Lijuan Duan Jun Miao +2 位作者 David M. W. Powers Jili Gu Laiyun Qing 《International Journal of Intelligence Science》 2016年第1期1-9,共9页
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode... Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a model for gaze movement control using both global and local cues. To test the performance of this model, an experiment is done to collect human eye movement data by using an SMI iVIEW X Hi-Speed eye tracker with a sampling rate of 1250 Hz. The experiment used a two-by-four mixed design with the location of the targets and the four initial positions. We compare the saccadic scan-paths generated by the proposed model against human eye movement data on a face benchmark dataset. Experimental results demonstrate that the simulated scan-paths by the proposed model are similar to human saccades in term of the fixation order, Hausdorff distance, and prediction accuracy for both static fixation locations and dynamic scan-paths. 展开更多
关键词 Saccadic Scan-Paths Eye Movement Fixation Locations Dynamic Scan-Paths
下载PDF
Three-Party Quantum Key Agreement Protocol Based on Continuous Variable Single-Mode Squeezed States
8
作者 周艺华 谭晶 +2 位作者 张静 侍伟敏 杨宇光 《Communications in Theoretical Physics》 SCIE CAS CSCD 2019年第12期1448-1454,共7页
The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed s... The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks. 展开更多
关键词 continuous variable single-mode squeezed states quantum key agreement
原文传递
Packet: a privacy-aware access control policy composition method for services composition in cloud environments 被引量:2
9
作者 Li LIN Jian HU Jianbiao ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第6期1142-1157,共16页
关键词 访问控制策略 服务组合 隐私问题 组合方法 冲突检测 感知 环境 分组方法
原文传递
Text extraction method for historical Tibetan document images based on block projections 被引量:3
10
作者 段立娟 张西群 +1 位作者 马龙龙 吴健 《Optoelectronics Letters》 EI 2017年第6期457-461,共5页
Text extraction is an important initial step in digitizing the historical documents. In this paper, we present a text extraction method for historical Tibetan document images based on block projections. The task of te... Text extraction is an important initial step in digitizing the historical documents. In this paper, we present a text extraction method for historical Tibetan document images based on block projections. The task of text extraction is considered as text area detection and location problem. The images are divided equally into blocks and the blocks are filtered by the information of the categories of connected components and corner point density. By analyzing the filtered blocks' projections, the approximate text areas can be located, and the text regions are extracted. Experiments on the dataset of historical Tibetan documents demonstrate the effectiveness of the proposed method. 展开更多
关键词 Text extraction method for historical Tibetan document images based on block projections
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部