Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing i...Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms.展开更多
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ...In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.展开更多
With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing ...With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing system,in order to ensure the credibility of the source of terminal data,mobile edge computing(MEC)needs to verify the signature of the terminal node on the data.During the signature process,the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance.Therefore,it is very necessary to improve efficiency through computational offloading.Therefore,this paper proposes an identitybased edge computing anonymous authentication protocol.The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information.The encryption algorithm is implemented through a thresholded identity-based proxy ring signature.When a large number of terminals offload computing,MEC can set the priority of offloading tasks according to the user’s identity and permissions,thereby improving offloading efficiency.Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures.The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle.According to the efficiency analysis,in the case of MEC offloading,the computational complexity is significantly reduced,the computing power of edge devices is liberated,and the signature efficiency is improved.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
To investigate the influences of co-flowand counter-flowmodes of reactant flowarrangement on a proton exchange membrane fuel cell(PEMFC)during start-up,unsteady physical and mathematical models fully coupling the flow...To investigate the influences of co-flowand counter-flowmodes of reactant flowarrangement on a proton exchange membrane fuel cell(PEMFC)during start-up,unsteady physical and mathematical models fully coupling the flow,heat,and electrochemical reactions in a PEMFC are established.The continuity equation and momentum equation are solved by handling pressure-velocity coupling using the SIMPLE algorithm.The electrochemical reaction rates in the catalyst layers(CLs)of the cathode and anode are calculated using the Butler-Volmer equation.The multiphase mixture model describes the multiphase transport process of gas mixtures and liquid water in the fuel cell.After validation,the influences of co-flow and counter-flow modes on the PEMFC performance are investigated,including the evolution of the current density,flow field,temperature field,and reactant concentration field during start-up,as well as the steady distribution of the current density,reactant concentration,andmembrane water content when the start-up stabilizes.Co-flow and counter-flow modes influence the current density distribution and temperature distribution.On the one hand,the co-flow mode accelerates the start-up process of the PEMFC and leads to a more evenly distributed current density than the counter-flow mode.On the other hand,the temperature difference between the inlet and outlet sections of the cell is up to 10.1℃ under the co-flow mode,much larger than the 5.0℃ observed in the counter-flow mode.Accordingly,the counter-flowmode results in a more evenly distributed temperature and a lower maximum temperature than the co-flow case.Therefore,in the flow field design of a PEMFC,the reactant flow arrangements can be considered to weigh between better heat management and higher current density distribution of the cell.展开更多
The approach of Li and Zhou(2014)is adopted to find the Laplace transform of occupation time over interval(0,a)and joint occupation times over semi-infinite intervals(-∞,a)and(b,∞)for a time-homogeneous diffusion pr...The approach of Li and Zhou(2014)is adopted to find the Laplace transform of occupation time over interval(0,a)and joint occupation times over semi-infinite intervals(-∞,a)and(b,∞)for a time-homogeneous diffusion process up to an independent exponential time e_(q)for 0<a<b.The results are expressed in terms of solutions to the differential equations associated with the diffusion generator.Applying these results,we obtain explicit expressions on the Laplace transform of occupation time and joint occupation time for Brownian motion with drift.展开更多
With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed ...With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.展开更多
To date,there is still a lack of a comprehensive explanation for caged dynamics which is regarded as one of the intricate dynamic behaviors in amorphous alloys.This study focuses on Pd_(82)Si_(18)as the research objec...To date,there is still a lack of a comprehensive explanation for caged dynamics which is regarded as one of the intricate dynamic behaviors in amorphous alloys.This study focuses on Pd_(82)Si_(18)as the research object to further elucidate the underlying mechanism of caged dynamics from multiple perspectives,including the cage's lifetime,atomic local environment,and atomic potential energy.The results reveal that Si atoms exhibit a pronounced cage effect due to the hindrance of Pd atoms,resulting in an anomalous peak in the non-Gaussian parameters.An in-depth investigation was conducted on the caged dynamics differences between fast and slow Si atoms.In comparison to fast Si atoms,slow Si atoms were surrounded by more Pd atoms and occupied lower potential energy states,resulting in smaller diffusion displacements for the slow Si atoms.Concurrently,slow Si atoms tend to be in the centers of smaller clusters with coordination numbers of 9 and 10.During the isothermal relaxation process,clusters with coordination numbers 9 and 10 have longer lifetimes,suggesting that the escape of slow Si atoms from their cages is more challenging.The findings mentioned above hold significant implications for understanding the caged dynamics.展开更多
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For...Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.展开更多
As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most q...As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.展开更多
Semiconductor devices are often operated at elevated temperatures that are well above zero Kelvin,which is the temperature in most first-principles density functional calculations.Computational approaches to com-putin...Semiconductor devices are often operated at elevated temperatures that are well above zero Kelvin,which is the temperature in most first-principles density functional calculations.Computational approaches to com-puting and understanding the properties of semiconductors at finite temperatures are thus in critical demand.In this review,we discuss the recent progress in computationally assessing the electronic and phononic band structures of semiconductors at finite temperatures.As an emerging semiconductor with particularly strong temperature-induced renormalization of the electronic and phononic band structures,halide perovskites are used as a representative example to demonstrate how computational advances may help to understand the band struc-tures at elevated temperatures.Finally,we briefly illustrate the remaining computational challenges and outlook promising research directions that may help to guide future research in this field.展开更多
In this paper,we investigate sufficient and necessary conditions such that generalized Forelli-Rudin type operators T_(λ,τ,k),S_(λ,τ,k),Q_(λ,τ,k)and R_(λ,τ,k)are bounded between Lebesgue type spaces.In order t...In this paper,we investigate sufficient and necessary conditions such that generalized Forelli-Rudin type operators T_(λ,τ,k),S_(λ,τ,k),Q_(λ,τ,k)and R_(λ,τ,k)are bounded between Lebesgue type spaces.In order to prove the main results,we first give some bidirectional estimates for several typical integrals.展开更多
We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive co...We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive constant.By using weighted global estimates,maximal regularity estimates in the Lorentz space for the Stokes system,and the Lagrangian approach,we show that the 2-D MHD equations have a unique global solution.展开更多
The combination of non-Hermitian physics and Majorana fermions can give rise to new effects in quantum transport systems. In this work, we investigate the interplay of PT-symmetric complex potentials, Majorana tunneli...The combination of non-Hermitian physics and Majorana fermions can give rise to new effects in quantum transport systems. In this work, we investigate the interplay of PT-symmetric complex potentials, Majorana tunneling and interdot tunneling in a non-Hermitian double quantum dots system. It is found that in the weak-coupling regime the Majorana tunneling has pronounced effects on the transport properties of such a system, manifested as splitting of the single peak into three and a reduced 1/4 peak in the transmission function. In the presence of the PT-symmetric complex potentials and interdot tunneling, the 1/4 central peak is robust against them, while the two side peaks are tuned by them. The interdot tunneling only induces asymmetry, instead of moving the conductance peak, due to the robustness of the Majorana modes. There is an exceptional point induced by the union of Majorana tunneling and interdot tunneling. With increased PT-symmetric complex potentials, the two side peaks will move towards each other. When the exceptional point is passed through, these two side peaks will disappear. In the strong-coupling regime, the Majorana fermion induces a 1/4 conductance dip instead of the three-peak structure. PT-symmetric complex potentials induce two conductance dips pinned at the exceptional point. These effects should be accessible in experiments.展开更多
The application of the eigenstate thermalization hypothesis to non-Hermitian quantum systems has become one of the most important topics in dissipative quantum chaos, recently giving rise to intense debates. The proce...The application of the eigenstate thermalization hypothesis to non-Hermitian quantum systems has become one of the most important topics in dissipative quantum chaos, recently giving rise to intense debates. The process of thermalization is intricate, involving many time-evolution trajectories in the reduced Hilbert space of the system. By considering two different expansion forms of the density matrices adopted in the biorthogonal and right-state time evolutions, we derive two versions of the Gorini–Kossakowski–Sudarshan–Lindblad(GKSL)master equations describing the non-Hermitian systems coupled to a bosonic heat bath in thermal equilibrium. By solving the equations, we identify a sufficient condition for thermalization under both time evolutions, resulting in Boltzmann biorthogonal and right-eigenstate statistics, respectively. This finding implies that the recently proposed biorthogonal random matrix theory needs an appropriate revision. Moreover, we exemplify the precise dynamics of thermalization and thermodynamic properties with test models.展开更多
The rapid advancement and broad application of machine learning(ML)have driven a groundbreaking revolution in computational biology.One of the most cutting-edge and important applications of ML is its integration with...The rapid advancement and broad application of machine learning(ML)have driven a groundbreaking revolution in computational biology.One of the most cutting-edge and important applications of ML is its integration with molecular simulations to improve the sampling efficiency of the vast conformational space of large biomolecules.This review focuses on recent studies that utilize ML-based techniques in the exploration of protein conformational landscape.We first highlight the recent development of ML-aided enhanced sampling methods,including heuristic algorithms and neural networks that are designed to refine the selection of reaction coordinates for the construction of bias potential,or facilitate the exploration of the unsampled region of the energy landscape.Further,we review the development of autoencoder based methods that combine molecular simulations and deep learning to expand the search for protein conformations.Lastly,we discuss the cutting-edge methodologies for the one-shot generation of protein conformations with precise Boltzmann weights.Collectively,this review demonstrates the promising potential of machine learning in revolutionizing our insight into the complex conformational ensembles of proteins.展开更多
As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolatio...As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolation,the quantum version of bicubic interpolation has not yet been studied.In this work,we present the first quantum image scaling scheme for bicubic interpolation based on the novel enhanced quantum representation(NEQR).Our scheme can realize synchronous enlargement and reduction of the image with the size of 2^(n)×2^(n) by integral multiple.Firstly,the image is represented by NEQR and the original image coordinates are obtained through multiple CNOT modules.Then,16 neighborhood pixels are obtained by quantum operation circuits,and the corresponding weights of these pixels are calculated by quantum arithmetic modules.Finally,a quantum matrix operation,instead of a classical convolution operation,is used to realize the sum of convolution of these pixels.Through simulation experiments and complexity analysis,we demonstrate that our scheme achieves exponential speedup over the classical bicubic interpolation algorithm,and has better effect than the quantum version of bilinear interpolation.展开更多
While density functional theory(DFT)serves as a prevalent computational approach in electronic structure calculations,its computational demands and scalability limitations persist.Recently,leveraging neural networks t...While density functional theory(DFT)serves as a prevalent computational approach in electronic structure calculations,its computational demands and scalability limitations persist.Recently,leveraging neural networks to parameterize the Kohn-Sham DFT Hamiltonian has emerged as a promising avenue for accelerating electronic structure computations.Despite advancements,challenges such as the necessity for computing extensive DFT training data to explore each new system and the complexity of establishing accurate machine learning models for multi-elemental materials still exist.Addressing these hurdles,this study introduces a universal electronic Hamiltonian model trained on Hamiltonian matrices obtained from first-principles DFT calculations of nearly all crystal structures on the Materials Project.We demonstrate its generality in predicting electronic structures across the whole periodic table,including complex multi-elemental systems,solid-state electrolytes,Moir´e twisted bilayer heterostructure,and metal-organic frameworks.Moreover,we utilize the universal model to conduct high-throughput calculations of electronic structures for crystals in GNoME datasets,identifying 3940 crystals with direct band gaps and 5109 crystals with flat bands.By offering a reliable efficient framework for computing electronic properties,this universal Hamiltonian model lays the groundwork for advancements in diverse fields,such as easily providing a huge data set of electronic structures and also making the materials design across the whole periodic table possible.展开更多
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machi...With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data sets.However,FDL can only guarantee data security and privacy among multiple clients during data training.If the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively affected.In this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs.Specifically,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and recovery.In addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data dynamics.Finally,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear groups.Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.展开更多
Decomposition of a complex multi-objective optimisation problem(MOP)to multiple simple subMOPs,known as M2M for short,is an effective approach to multi-objective optimisation.However,M2M facilitates little communicati...Decomposition of a complex multi-objective optimisation problem(MOP)to multiple simple subMOPs,known as M2M for short,is an effective approach to multi-objective optimisation.However,M2M facilitates little communication/collaboration between subMOPs,which limits its use in complex optimisation scenarios.This paper extends the M2M framework to develop a unified algorithm for both multi-objective and manyobjective optimisation.Through bilevel decomposition,an MOP is divided into multiple subMOPs at upper level,each of which is further divided into a number of single-objective subproblems at lower level.Neighbouring subMOPs are allowed to share some subproblems so that the knowledge gained from solving one subMOP can be transferred to another,and eventually to all the subMOPs.The bilevel decomposition is readily combined with some new mating selection and population update strategies,leading to a high-performance algorithm that competes effectively against a number of state-of-the-arts studied in this paper for both multiand many-objective optimisation.Parameter analysis and component analysis have been also carried out to further justify the proposed algorithm.展开更多
基金supported in part by the National Natural Science Foun-dation of China(61902029)R&D Program of Beijing Municipal Education Commission(No.KM202011232015)Project for Acceleration of University Classi cation Development(Nos.5112211036,5112211037,5112211038).
文摘Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms.
文摘In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
基金Beijing Postdoctoral Research Foundation(No.2021-ZZ-077,No.2020-YJ-006)Chongqing Industrial Control System Security Situational Awareness Platform,2019 Industrial Internet Innovation and Development Project-Provincial Industrial Control System Security Situational Awareness Platform,Center for Research and Innovation in Software Engineering,School of Computer and Information Science(Southwest University,Chongqing 400175,China)Chongqing Graduate Education Teaching Reform Research Project(yjg203032).
文摘With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing system,in order to ensure the credibility of the source of terminal data,mobile edge computing(MEC)needs to verify the signature of the terminal node on the data.During the signature process,the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance.Therefore,it is very necessary to improve efficiency through computational offloading.Therefore,this paper proposes an identitybased edge computing anonymous authentication protocol.The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information.The encryption algorithm is implemented through a thresholded identity-based proxy ring signature.When a large number of terminals offload computing,MEC can set the priority of offloading tasks according to the user’s identity and permissions,thereby improving offloading efficiency.Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures.The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle.According to the efficiency analysis,in the case of MEC offloading,the computational complexity is significantly reduced,the computing power of edge devices is liberated,and the signature efficiency is improved.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
基金supported by the Projects of Talents Recruitment of Guangdong University of Petrochemical Technology(No.2018rc14)Maoming City Science and Technology Plan Project(Nos.210427094551264 and 220415004552411).
文摘To investigate the influences of co-flowand counter-flowmodes of reactant flowarrangement on a proton exchange membrane fuel cell(PEMFC)during start-up,unsteady physical and mathematical models fully coupling the flow,heat,and electrochemical reactions in a PEMFC are established.The continuity equation and momentum equation are solved by handling pressure-velocity coupling using the SIMPLE algorithm.The electrochemical reaction rates in the catalyst layers(CLs)of the cathode and anode are calculated using the Butler-Volmer equation.The multiphase mixture model describes the multiphase transport process of gas mixtures and liquid water in the fuel cell.After validation,the influences of co-flow and counter-flow modes on the PEMFC performance are investigated,including the evolution of the current density,flow field,temperature field,and reactant concentration field during start-up,as well as the steady distribution of the current density,reactant concentration,andmembrane water content when the start-up stabilizes.Co-flow and counter-flow modes influence the current density distribution and temperature distribution.On the one hand,the co-flow mode accelerates the start-up process of the PEMFC and leads to a more evenly distributed current density than the counter-flow mode.On the other hand,the temperature difference between the inlet and outlet sections of the cell is up to 10.1℃ under the co-flow mode,much larger than the 5.0℃ observed in the counter-flow mode.Accordingly,the counter-flowmode results in a more evenly distributed temperature and a lower maximum temperature than the co-flow case.Therefore,in the flow field design of a PEMFC,the reactant flow arrangements can be considered to weigh between better heat management and higher current density distribution of the cell.
基金Supported by the National Natural Science Foundation of China(12271062,11731012)by the Hunan Provincial National Natural Science Foundation of China(2019JJ50405)。
文摘The approach of Li and Zhou(2014)is adopted to find the Laplace transform of occupation time over interval(0,a)and joint occupation times over semi-infinite intervals(-∞,a)and(b,∞)for a time-homogeneous diffusion process up to an independent exponential time e_(q)for 0<a<b.The results are expressed in terms of solutions to the differential equations associated with the diffusion generator.Applying these results,we obtain explicit expressions on the Laplace transform of occupation time and joint occupation time for Brownian motion with drift.
文摘With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.
基金Project supported by the National Natural Science Foundation of China (Grant No.51701071)the Natural Science Foundation of Hunan Province,China (Grant Nos.2022JJ50115 and 2021JJ30179)the Research Foundation of the Education Bureau of Hunan Province,China (Grant No.22A0522)。
文摘To date,there is still a lack of a comprehensive explanation for caged dynamics which is regarded as one of the intricate dynamic behaviors in amorphous alloys.This study focuses on Pd_(82)Si_(18)as the research object to further elucidate the underlying mechanism of caged dynamics from multiple perspectives,including the cage's lifetime,atomic local environment,and atomic potential energy.The results reveal that Si atoms exhibit a pronounced cage effect due to the hindrance of Pd atoms,resulting in an anomalous peak in the non-Gaussian parameters.An in-depth investigation was conducted on the caged dynamics differences between fast and slow Si atoms.In comparison to fast Si atoms,slow Si atoms were surrounded by more Pd atoms and occupied lower potential energy states,resulting in smaller diffusion displacements for the slow Si atoms.Concurrently,slow Si atoms tend to be in the centers of smaller clusters with coordination numbers of 9 and 10.During the isothermal relaxation process,clusters with coordination numbers 9 and 10 have longer lifetimes,suggesting that the escape of slow Si atoms from their cages is more challenging.The findings mentioned above hold significant implications for understanding the caged dynamics.
基金supported by the Natural Science Foundation under Grant No.61962009Major Scientific and Technological Special Project of Guizhou Province under Grant No.20183001Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No.2018BDKFJJ003,2018BDKFJJ005 and 2019BDKFJJ009.
文摘Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62172268 and 62302289)the Shanghai Science and Technology Project(Grant Nos.21JC1402800 and 23YF1416200)。
文摘As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.
基金supported by the National Natural Science Foundation of China(Grant Nos.11991060,52172136,12088101,12074029,and U2230402).
文摘Semiconductor devices are often operated at elevated temperatures that are well above zero Kelvin,which is the temperature in most first-principles density functional calculations.Computational approaches to com-puting and understanding the properties of semiconductors at finite temperatures are thus in critical demand.In this review,we discuss the recent progress in computationally assessing the electronic and phononic band structures of semiconductors at finite temperatures.As an emerging semiconductor with particularly strong temperature-induced renormalization of the electronic and phononic band structures,halide perovskites are used as a representative example to demonstrate how computational advances may help to understand the band struc-tures at elevated temperatures.Finally,we briefly illustrate the remaining computational challenges and outlook promising research directions that may help to guide future research in this field.
基金supported by the Natural Science Foundation of Hunan Province of China(2022JJ30369)the Education Department Important Foundation of Hunan Province in China(23A0095)。
文摘In this paper,we investigate sufficient and necessary conditions such that generalized Forelli-Rudin type operators T_(λ,τ,k),S_(λ,τ,k),Q_(λ,τ,k)and R_(λ,τ,k)are bounded between Lebesgue type spaces.In order to prove the main results,we first give some bidirectional estimates for several typical integrals.
基金supported by the National Natural Science Foundation of China(12371211,12126359)the postgraduate Scientific Research Innovation Project of Hunan Province(XDCX2022Y054,CX20220541).
文摘We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive constant.By using weighted global estimates,maximal regularity estimates in the Lorentz space for the Stokes system,and the Lagrangian approach,we show that the 2-D MHD equations have a unique global solution.
基金Project supported by the National Natural Science Foundation of China (Grant No.11834005)。
文摘The combination of non-Hermitian physics and Majorana fermions can give rise to new effects in quantum transport systems. In this work, we investigate the interplay of PT-symmetric complex potentials, Majorana tunneling and interdot tunneling in a non-Hermitian double quantum dots system. It is found that in the weak-coupling regime the Majorana tunneling has pronounced effects on the transport properties of such a system, manifested as splitting of the single peak into three and a reduced 1/4 peak in the transmission function. In the presence of the PT-symmetric complex potentials and interdot tunneling, the 1/4 central peak is robust against them, while the two side peaks are tuned by them. The interdot tunneling only induces asymmetry, instead of moving the conductance peak, due to the robustness of the Majorana modes. There is an exceptional point induced by the union of Majorana tunneling and interdot tunneling. With increased PT-symmetric complex potentials, the two side peaks will move towards each other. When the exceptional point is passed through, these two side peaks will disappear. In the strong-coupling regime, the Majorana fermion induces a 1/4 conductance dip instead of the three-peak structure. PT-symmetric complex potentials induce two conductance dips pinned at the exceptional point. These effects should be accessible in experiments.
基金supported by the National Key Research and Development Program of China (Grant No.2022YFA1402700)the National Natural Science Foundation of China (Grant Nos.12174020,12088101,11974244,and U2230402)。
文摘The application of the eigenstate thermalization hypothesis to non-Hermitian quantum systems has become one of the most important topics in dissipative quantum chaos, recently giving rise to intense debates. The process of thermalization is intricate, involving many time-evolution trajectories in the reduced Hilbert space of the system. By considering two different expansion forms of the density matrices adopted in the biorthogonal and right-state time evolutions, we derive two versions of the Gorini–Kossakowski–Sudarshan–Lindblad(GKSL)master equations describing the non-Hermitian systems coupled to a bosonic heat bath in thermal equilibrium. By solving the equations, we identify a sufficient condition for thermalization under both time evolutions, resulting in Boltzmann biorthogonal and right-eigenstate statistics, respectively. This finding implies that the recently proposed biorthogonal random matrix theory needs an appropriate revision. Moreover, we exemplify the precise dynamics of thermalization and thermodynamic properties with test models.
基金Project supported by the National Key Research and Development Program of China(Grant No.2023YFF1204402)the National Natural Science Foundation of China(Grant Nos.12074079 and 12374208)+1 种基金the Natural Science Foundation of Shanghai(Grant No.22ZR1406800)the China Postdoctoral Science Foundation(Grant No.2022M720815).
文摘The rapid advancement and broad application of machine learning(ML)have driven a groundbreaking revolution in computational biology.One of the most cutting-edge and important applications of ML is its integration with molecular simulations to improve the sampling efficiency of the vast conformational space of large biomolecules.This review focuses on recent studies that utilize ML-based techniques in the exploration of protein conformational landscape.We first highlight the recent development of ML-aided enhanced sampling methods,including heuristic algorithms and neural networks that are designed to refine the selection of reaction coordinates for the construction of bias potential,or facilitate the exploration of the unsampled region of the energy landscape.Further,we review the development of autoencoder based methods that combine molecular simulations and deep learning to expand the search for protein conformations.Lastly,we discuss the cutting-edge methodologies for the one-shot generation of protein conformations with precise Boltzmann weights.Collectively,this review demonstrates the promising potential of machine learning in revolutionizing our insight into the complex conformational ensembles of proteins.
基金Project supported by the Scientific Research Fund of Hunan Provincial Education Department,China (Grant No.21A0470)the Natural Science Foundation of Hunan Province,China (Grant No.2023JJ50268)+1 种基金the National Natural Science Foundation of China (Grant Nos.62172268 and 62302289)the Shanghai Science and Technology Project,China (Grant Nos.21JC1402800 and 23YF1416200)。
文摘As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolation,the quantum version of bicubic interpolation has not yet been studied.In this work,we present the first quantum image scaling scheme for bicubic interpolation based on the novel enhanced quantum representation(NEQR).Our scheme can realize synchronous enlargement and reduction of the image with the size of 2^(n)×2^(n) by integral multiple.Firstly,the image is represented by NEQR and the original image coordinates are obtained through multiple CNOT modules.Then,16 neighborhood pixels are obtained by quantum operation circuits,and the corresponding weights of these pixels are calculated by quantum arithmetic modules.Finally,a quantum matrix operation,instead of a classical convolution operation,is used to realize the sum of convolution of these pixels.Through simulation experiments and complexity analysis,we demonstrate that our scheme achieves exponential speedup over the classical bicubic interpolation algorithm,and has better effect than the quantum version of bilinear interpolation.
基金supported the National Key R&D Program of China (Grant No.2022YFA1402901)the National Natural Science Foundation of China (Grant Nos.11825403,11991061,and 12188101)the Guangdong Major Project of the Basic and Applied Basic Research (Future Functional Materials Under Extreme Conditions) (Grant No.2021B0301030005)。
文摘While density functional theory(DFT)serves as a prevalent computational approach in electronic structure calculations,its computational demands and scalability limitations persist.Recently,leveraging neural networks to parameterize the Kohn-Sham DFT Hamiltonian has emerged as a promising avenue for accelerating electronic structure computations.Despite advancements,challenges such as the necessity for computing extensive DFT training data to explore each new system and the complexity of establishing accurate machine learning models for multi-elemental materials still exist.Addressing these hurdles,this study introduces a universal electronic Hamiltonian model trained on Hamiltonian matrices obtained from first-principles DFT calculations of nearly all crystal structures on the Materials Project.We demonstrate its generality in predicting electronic structures across the whole periodic table,including complex multi-elemental systems,solid-state electrolytes,Moir´e twisted bilayer heterostructure,and metal-organic frameworks.Moreover,we utilize the universal model to conduct high-throughput calculations of electronic structures for crystals in GNoME datasets,identifying 3940 crystals with direct band gaps and 5109 crystals with flat bands.By offering a reliable efficient framework for computing electronic properties,this universal Hamiltonian model lays the groundwork for advancements in diverse fields,such as easily providing a huge data set of electronic structures and also making the materials design across the whole periodic table possible.
基金supported by the National Natural Science Foundation of China under Grants No.U1836115,No.61922045,No.61877034,No.61772280the Natural Science Foundation of Jiangsu Province under Grant No.BK20181408+2 种基金the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004the CICAEET fundthe PAPD fund.
文摘With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data sets.However,FDL can only guarantee data security and privacy among multiple clients during data training.If the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively affected.In this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs.Specifically,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and recovery.In addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data dynamics.Finally,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear groups.Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.
基金supported in part by the National Natural Science Foundation of China (62376288,U23A20347)the Engineering and Physical Sciences Research Council of UK (EP/X041239/1)the Royal Society International Exchanges Scheme of UK (IEC/NSFC/211404)。
文摘Decomposition of a complex multi-objective optimisation problem(MOP)to multiple simple subMOPs,known as M2M for short,is an effective approach to multi-objective optimisation.However,M2M facilitates little communication/collaboration between subMOPs,which limits its use in complex optimisation scenarios.This paper extends the M2M framework to develop a unified algorithm for both multi-objective and manyobjective optimisation.Through bilevel decomposition,an MOP is divided into multiple subMOPs at upper level,each of which is further divided into a number of single-objective subproblems at lower level.Neighbouring subMOPs are allowed to share some subproblems so that the knowledge gained from solving one subMOP can be transferred to another,and eventually to all the subMOPs.The bilevel decomposition is readily combined with some new mating selection and population update strategies,leading to a high-performance algorithm that competes effectively against a number of state-of-the-arts studied in this paper for both multiand many-objective optimisation.Parameter analysis and component analysis have been also carried out to further justify the proposed algorithm.