期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Global Governance in Cyberspace: Process,Conflict and China’s Proposals
1
作者 Wang Jiayi 《学术界》 CSSCI 北大核心 2020年第6期226-234,共9页
In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivat... In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation. 展开更多
关键词 CYBERSPACE global governance sovereign state international rule of law
下载PDF
A Pricing-Based Cooperative Relay Selection Scheme for Reliable Communications
2
作者 Xiao Yulong Wu Yu +2 位作者 Amr Tolba Chen Ziqiang Li Tengfei 《China Communications》 SCIE CSCD 2024年第8期30-44,共15页
With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety... With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety and efficiency.However,the uneven energy collection and consumption among IoT devices at varying distances may lead to resource imbalance within energy harvesting networks,thereby resulting in low energy transmission efficiency.To enhance the energy transmission efficiency of IoT devices in energy harvesting,this paper focuses on the utilization of collaborative communication,along with pricing-based incentive mechanisms and auction strategies.We propose a dynamic relay selection scheme,including a ladder pricing mechanism based on energy level and a Kuhn-Munkre Algorithm based on an auction theory employing a negotiation mechanism,to encourage more IoT devices to participate in the collaboration process.Simulation results demonstrate that the proposed algorithm outperforms traditional algorithms in terms of improving the energy efficiency of the system. 展开更多
关键词 cooperative communication edge net-work energy harvesting relay selection
下载PDF
Participants Recruitment for Coverage Maximization by Mobility Predicting in Mobile Crowd Sensing 被引量:1
3
作者 Yuanni Liu Xi Liu +2 位作者 Xin Li Mingxin Li Yi Li 《China Communications》 SCIE CSCD 2023年第8期163-176,共14页
Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS a... Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS applications,which requires adequate participants.However,recruiting enough participants to provide the sensing data for free is hard for the MCS platform under a limited budget,which may lead to a low coverage ratio of sensing area.This paper proposes a novel method to choose participants uniformly distributed in a specific sensing area based on the mobility patterns of mobile users.The method consists of two steps:(1)A second-order Markov chain is used to predict the next positions of users,and select users whose next places are in the target sensing area to form a candidate pool.(2)The Average Entropy(DAE)is proposed to measure the distribution of participants.The participant maximizing the DAE value of a specific sensing area with different granular sub-areas is chosen to maximize the coverage ratio of the sensing area.Experimental results show that the proposed method can maximize the coverage ratio of a sensing area under different partition granularities. 展开更多
关键词 data average entropy human mobility prediction markov chain mobile crowd sensing
下载PDF
The deep spatiotemporal network with dual-flow fusion for video-oriented facial expression recognition
4
作者 Chenquan Gan Jinhui Yao +2 位作者 Shuaiying Ma Zufan Zhang Lianxiang Zhu 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1441-1447,共7页
The video-oriented facial expression recognition has always been an important issue in emotion perception.At present,the key challenge in most existing methods is how to effectively extract robust features to characte... The video-oriented facial expression recognition has always been an important issue in emotion perception.At present,the key challenge in most existing methods is how to effectively extract robust features to characterize facial appearance and geometry changes caused by facial motions.On this basis,the video in this paper is divided into multiple segments,each of which is simultaneously described by optical flow and facial landmark trajectory.To deeply delve the emotional information of these two representations,we propose a Deep Spatiotemporal Network with Dual-flow Fusion(defined as DSN-DF),which highlights the region and strength of expressions by spatiotemporal appearance features and the speed of change by spatiotemporal geometry features.Finally,experiments are implemented on CKþand MMI datasets to demonstrate the superiority of the proposed method. 展开更多
关键词 Facial expression recognition Deep spatiotemporal network Optical flow Facial landmark trajectory Dual-flow fusion
下载PDF
A notary group-based cross-chain mechanism 被引量:3
5
作者 Anping Xiong Guihua Liu +2 位作者 Qingyi Zhu Ankui Jing Seng W.Loke 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1059-1067,共9页
As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between... As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between different independent blockchain systems is restricting the expansion of blockchain. In this paper, a notary group-based cross-chain interaction model is proposed to achieve the interoperability between different blockchains. Firstly, a notary election mechanism is proposed to choose one notary from the notary group to act as a bridge for cross-chain transactions. Secondly, a margin pool is introduced to limit the misconduct of the elected notary and ensure the value transfer between the involved blockchains. Moreover, a reputation based incentive mechanism is used to encourage members of the notary group to participate in cross-chain transactions. Ethereum-based experiments demonstrate that the proposed mechanism can provide an acceptable performance for cross-chain transactions and provide a higher security level than ordinary cross-chain mechanisms. 展开更多
关键词 Blockchain Cross-chain Notary group Reputation ranking Incentive mechanisms
下载PDF
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data
6
作者 Fei Tang Shikai Liang +1 位作者 Guowei Ling Jinyong Shan 《Cybersecurity》 EI CSCD 2024年第2期96-112,共17页
Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent performance.However,current VFL systems usually primarily focus on the privacy protection during model training,whi... Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent performance.However,current VFL systems usually primarily focus on the privacy protection during model training,while the preparation of training data receives little attention.In real-world applications,like smart healthcare,the process of the training data preparation may involve some participant's intention which could be privacy information for this partici-pant.To protect the privacy of the model training intention,we describe the idea of Intention-Hiding Vertical Feder-ated Learning(IHVFL)and illustrate a framework to achieve this privacy-preserving goal.First,we construct two secure screening protocols to enhance the privacy protection in feature engineering.Second,we implement the work of sample alignment bases on a novel private set intersection protocol.Finally,we use the logistic regression algorithm to demonstrate the process of IHVFL.Experiments show that our model can perform better efficiency(less than 5min)and accuracy(97%)on Breast Cancer medical dataset while maintaining the intention-hiding goal. 展开更多
关键词 Medical data Vertical federated learning Privacy-presserving Intention-hiding Logistic regression
原文传递
Authentication scheme for industrial Internet of things based on DAG blockchain
7
作者 Tang Fei Dong Kun +1 位作者 Ye Zhangtao Ling Guowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期1-12,共12页
Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks u... Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering. 展开更多
关键词 industrial Internet of things(IIoT) blockchain directed acyclic graph(DAG) aggregation signature
原文传递
Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
8
作者 Zhou Yousheng Huang Miao +1 位作者 Liu Yuanni Chen Zigang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期83-95,共13页
To achieve the confidentiality and retrievability of outsourced data simultaneously,a dynamic multi-keyword fuzzy ranked search scheme(DMFRS)with leakage resilience over encrypted cloud data based on two-level index s... To achieve the confidentiality and retrievability of outsourced data simultaneously,a dynamic multi-keyword fuzzy ranked search scheme(DMFRS)with leakage resilience over encrypted cloud data based on two-level index structure was proposed.The first level index adopts inverted index and orthogonal list,combined with 2-gram and location-sensitive Hashing(LSH)to realize a fuzzy match.The second level index achieves user search permission decision and search result ranking by combining coordinate matching with term frequency-inverse document frequency(TF-IDF).A verification token is generated within the results to verify the search results,which prevents the potential malicious tampering by cloud service providers(CSP).The semantic security of DMFRS is proved by the defined leakage function,and the performance is evaluated based on simulation experiments.The analysis results demonstrate that DMFRS gains certain advantages in security and performance against similar schemes,and it meets the needs of storage and privacy-preserving for outsourcing sensitive data. 展开更多
关键词 secure search multi-keyword FUZZY RANK dynamic PRIVACY-PRESERVING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部