In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivat...In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.展开更多
With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety...With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety and efficiency.However,the uneven energy collection and consumption among IoT devices at varying distances may lead to resource imbalance within energy harvesting networks,thereby resulting in low energy transmission efficiency.To enhance the energy transmission efficiency of IoT devices in energy harvesting,this paper focuses on the utilization of collaborative communication,along with pricing-based incentive mechanisms and auction strategies.We propose a dynamic relay selection scheme,including a ladder pricing mechanism based on energy level and a Kuhn-Munkre Algorithm based on an auction theory employing a negotiation mechanism,to encourage more IoT devices to participate in the collaboration process.Simulation results demonstrate that the proposed algorithm outperforms traditional algorithms in terms of improving the energy efficiency of the system.展开更多
Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS a...Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS applications,which requires adequate participants.However,recruiting enough participants to provide the sensing data for free is hard for the MCS platform under a limited budget,which may lead to a low coverage ratio of sensing area.This paper proposes a novel method to choose participants uniformly distributed in a specific sensing area based on the mobility patterns of mobile users.The method consists of two steps:(1)A second-order Markov chain is used to predict the next positions of users,and select users whose next places are in the target sensing area to form a candidate pool.(2)The Average Entropy(DAE)is proposed to measure the distribution of participants.The participant maximizing the DAE value of a specific sensing area with different granular sub-areas is chosen to maximize the coverage ratio of the sensing area.Experimental results show that the proposed method can maximize the coverage ratio of a sensing area under different partition granularities.展开更多
The video-oriented facial expression recognition has always been an important issue in emotion perception.At present,the key challenge in most existing methods is how to effectively extract robust features to characte...The video-oriented facial expression recognition has always been an important issue in emotion perception.At present,the key challenge in most existing methods is how to effectively extract robust features to characterize facial appearance and geometry changes caused by facial motions.On this basis,the video in this paper is divided into multiple segments,each of which is simultaneously described by optical flow and facial landmark trajectory.To deeply delve the emotional information of these two representations,we propose a Deep Spatiotemporal Network with Dual-flow Fusion(defined as DSN-DF),which highlights the region and strength of expressions by spatiotemporal appearance features and the speed of change by spatiotemporal geometry features.Finally,experiments are implemented on CKþand MMI datasets to demonstrate the superiority of the proposed method.展开更多
As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between...As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between different independent blockchain systems is restricting the expansion of blockchain. In this paper, a notary group-based cross-chain interaction model is proposed to achieve the interoperability between different blockchains. Firstly, a notary election mechanism is proposed to choose one notary from the notary group to act as a bridge for cross-chain transactions. Secondly, a margin pool is introduced to limit the misconduct of the elected notary and ensure the value transfer between the involved blockchains. Moreover, a reputation based incentive mechanism is used to encourage members of the notary group to participate in cross-chain transactions. Ethereum-based experiments demonstrate that the proposed mechanism can provide an acceptable performance for cross-chain transactions and provide a higher security level than ordinary cross-chain mechanisms.展开更多
Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent performance.However,current VFL systems usually primarily focus on the privacy protection during model training,whi...Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent performance.However,current VFL systems usually primarily focus on the privacy protection during model training,while the preparation of training data receives little attention.In real-world applications,like smart healthcare,the process of the training data preparation may involve some participant's intention which could be privacy information for this partici-pant.To protect the privacy of the model training intention,we describe the idea of Intention-Hiding Vertical Feder-ated Learning(IHVFL)and illustrate a framework to achieve this privacy-preserving goal.First,we construct two secure screening protocols to enhance the privacy protection in feature engineering.Second,we implement the work of sample alignment bases on a novel private set intersection protocol.Finally,we use the logistic regression algorithm to demonstrate the process of IHVFL.Experiments show that our model can perform better efficiency(less than 5min)and accuracy(97%)on Breast Cancer medical dataset while maintaining the intention-hiding goal.展开更多
Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks u...Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering.展开更多
To achieve the confidentiality and retrievability of outsourced data simultaneously,a dynamic multi-keyword fuzzy ranked search scheme(DMFRS)with leakage resilience over encrypted cloud data based on two-level index s...To achieve the confidentiality and retrievability of outsourced data simultaneously,a dynamic multi-keyword fuzzy ranked search scheme(DMFRS)with leakage resilience over encrypted cloud data based on two-level index structure was proposed.The first level index adopts inverted index and orthogonal list,combined with 2-gram and location-sensitive Hashing(LSH)to realize a fuzzy match.The second level index achieves user search permission decision and search result ranking by combining coordinate matching with term frequency-inverse document frequency(TF-IDF).A verification token is generated within the results to verify the search results,which prevents the potential malicious tampering by cloud service providers(CSP).The semantic security of DMFRS is proved by the defined leakage function,and the performance is evaluated based on simulation experiments.The analysis results demonstrate that DMFRS gains certain advantages in security and performance against similar schemes,and it meets the needs of storage and privacy-preserving for outsourcing sensitive data.展开更多
基金funded by the Ministry of Education’s Humanities and Social Sciences Research Youth Fund Project“Research on Legal Issues in China Promoting the Construction of Cyberspace Global Governance System”(18YJC820060)Chongqing Municipal Education Commission’s Humanities and Social Sciences Research Project “Research on International Legal Institutionalization of Cyberspace Destiny Community”(20SKGH067)a phased achievement of interpretation and collaborative innovation team for the Research on Chongqing Municipal Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era。
文摘In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.
基金funded by the Researchers Supporting Project Number RSPD2024R681,King Saud University,Riyadh,Saudi Arabia.
文摘With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety and efficiency.However,the uneven energy collection and consumption among IoT devices at varying distances may lead to resource imbalance within energy harvesting networks,thereby resulting in low energy transmission efficiency.To enhance the energy transmission efficiency of IoT devices in energy harvesting,this paper focuses on the utilization of collaborative communication,along with pricing-based incentive mechanisms and auction strategies.We propose a dynamic relay selection scheme,including a ladder pricing mechanism based on energy level and a Kuhn-Munkre Algorithm based on an auction theory employing a negotiation mechanism,to encourage more IoT devices to participate in the collaboration process.Simulation results demonstrate that the proposed algorithm outperforms traditional algorithms in terms of improving the energy efficiency of the system.
基金supported by the Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2021-1-18)the General Program of Natural Science Foundation of Chongqing(cstc2020jcyj-msxmX1021)+1 种基金the Science and Technology Research Program of Chongqing Municipal Education Commission(KJZD-K202000602)Chongqing graduate research and innovation project(CYS22478).
文摘Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS applications,which requires adequate participants.However,recruiting enough participants to provide the sensing data for free is hard for the MCS platform under a limited budget,which may lead to a low coverage ratio of sensing area.This paper proposes a novel method to choose participants uniformly distributed in a specific sensing area based on the mobility patterns of mobile users.The method consists of two steps:(1)A second-order Markov chain is used to predict the next positions of users,and select users whose next places are in the target sensing area to form a candidate pool.(2)The Average Entropy(DAE)is proposed to measure the distribution of participants.The participant maximizing the DAE value of a specific sensing area with different granular sub-areas is chosen to maximize the coverage ratio of the sensing area.Experimental results show that the proposed method can maximize the coverage ratio of a sensing area under different partition granularities.
基金This work is supported by Natural Science Foundation of China(Grant No.61903056)Major Project of Science and Technology Research Program of Chongqing Education Commission of China(Grant No.KJZDM201900601)+3 种基金Chongqing Research Program of Basic Research and Frontier Technology(Grant Nos.cstc2019jcyj-msxmX0681,cstc2021jcyj-msxmX0530,and cstc2021jcyjmsxmX0761)Project Supported by Chongqing Municipal Key Laboratory of Institutions of Higher Education(Grant No.cqupt-mct-201901)Project Supported by Chongqing Key Laboratory of Mobile Communications Technology(Grant No.cqupt-mct-202002)Project Supported by Engineering Research Center of Mobile Communications,Ministry of Education(Grant No.cqupt-mct202006)。
文摘The video-oriented facial expression recognition has always been an important issue in emotion perception.At present,the key challenge in most existing methods is how to effectively extract robust features to characterize facial appearance and geometry changes caused by facial motions.On this basis,the video in this paper is divided into multiple segments,each of which is simultaneously described by optical flow and facial landmark trajectory.To deeply delve the emotional information of these two representations,we propose a Deep Spatiotemporal Network with Dual-flow Fusion(defined as DSN-DF),which highlights the region and strength of expressions by spatiotemporal appearance features and the speed of change by spatiotemporal geometry features.Finally,experiments are implemented on CKþand MMI datasets to demonstrate the superiority of the proposed method.
基金supported by the National Natural Science Foundation of China (Nos. 61903056 and 61702066)the Chongqing Research Program of Basic Research and Frontier Technology (No. cstc2019jcyj-msxmX0681).
文摘As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between different independent blockchain systems is restricting the expansion of blockchain. In this paper, a notary group-based cross-chain interaction model is proposed to achieve the interoperability between different blockchains. Firstly, a notary election mechanism is proposed to choose one notary from the notary group to act as a bridge for cross-chain transactions. Secondly, a margin pool is introduced to limit the misconduct of the elected notary and ensure the value transfer between the involved blockchains. Moreover, a reputation based incentive mechanism is used to encourage members of the notary group to participate in cross-chain transactions. Ethereum-based experiments demonstrate that the proposed mechanism can provide an acceptable performance for cross-chain transactions and provide a higher security level than ordinary cross-chain mechanisms.
基金This work was supported by the National Key Research and Development Program of China under Grant 2021YFF0704102.
文摘Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent performance.However,current VFL systems usually primarily focus on the privacy protection during model training,while the preparation of training data receives little attention.In real-world applications,like smart healthcare,the process of the training data preparation may involve some participant's intention which could be privacy information for this partici-pant.To protect the privacy of the model training intention,we describe the idea of Intention-Hiding Vertical Feder-ated Learning(IHVFL)and illustrate a framework to achieve this privacy-preserving goal.First,we construct two secure screening protocols to enhance the privacy protection in feature engineering.Second,we implement the work of sample alignment bases on a novel private set intersection protocol.Finally,we use the logistic regression algorithm to demonstrate the process of IHVFL.Experiments show that our model can perform better efficiency(less than 5min)and accuracy(97%)on Breast Cancer medical dataset while maintaining the intention-hiding goal.
基金supported in part by the Natural Science Foundation of Chongqing (cstc2020jcyj-msxmX0343)in part by the National Defense Basic Scientific Research Program(JCKY2020205C013)。
文摘Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering.
基金supported by the National Natural Science Foundation of China(62272076)the Chongqing Natural Science Foundation of China(cstc2020jcyj-msxm X0343,cstc2020jcyj-msxm X1021)+1 种基金the Science and Technology Research Program of Chongqing Municipal Education Commission(KJZD-K20200602)the Sichuan Science and technology Foundation of China(22ZDYF3568)。
文摘To achieve the confidentiality and retrievability of outsourced data simultaneously,a dynamic multi-keyword fuzzy ranked search scheme(DMFRS)with leakage resilience over encrypted cloud data based on two-level index structure was proposed.The first level index adopts inverted index and orthogonal list,combined with 2-gram and location-sensitive Hashing(LSH)to realize a fuzzy match.The second level index achieves user search permission decision and search result ranking by combining coordinate matching with term frequency-inverse document frequency(TF-IDF).A verification token is generated within the results to verify the search results,which prevents the potential malicious tampering by cloud service providers(CSP).The semantic security of DMFRS is proved by the defined leakage function,and the performance is evaluated based on simulation experiments.The analysis results demonstrate that DMFRS gains certain advantages in security and performance against similar schemes,and it meets the needs of storage and privacy-preserving for outsourcing sensitive data.