Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Chengzhe Lai"'
Publikováno v:
Tongxin xuebao, Vol 44, Pp 151-160 (2023)
To address vehicle identity legitimacy verification issues, a continuous authentication scheme for vehicular digital twin based on convolutional neural network (CNN) was proposed.Specifically, the digital twin was used to acquire the data collected b
Externí odkaz:
https://doaj.org/article/e69f079da940414da26c4965c5d02df4
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-13 (2022)
Abstract In the era of big data, an ocean of data generated by Internet of Things (IoT) devices will be analyzed and processed by cloud computing. However, outsourcing of data can lead to leakage of user privacy to those unreliable service providers.
Externí odkaz:
https://doaj.org/article/351570d527de4b6cb357a7b82621767e
Publikováno v:
Tongxin xuebao, Vol 43, Pp 44-54 (2022)
In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of sec
Externí odkaz:
https://doaj.org/article/b30a5facd9fe461cbd854ca480aaf43b
Publikováno v:
IEEE Access, Vol 7, Pp 184759-184768 (2019)
Most spectrum sensing algorithms mainly use the characteristics of frequency, time, and geographical dimensions to detect spectrum holes. In this paper, we propose a novel spectrum sensing scheme from the space domain by using beamspace transformatio
Externí odkaz:
https://doaj.org/article/4936d5e3a91a4219a54f36ef996e5b38
Publikováno v:
Tongxin xuebao, Vol 39, Pp 48-55 (2018)
Aiming at the selection of security defense strategy in network attack-defense,the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense,the attack-defense game mo
Externí odkaz:
https://doaj.org/article/f5c3746293db4e8b95824532d0555ce8
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems. The group-based MTC, especially when MTC devices belong to
Externí odkaz:
https://doaj.org/article/114569d2871f459badc7eb40f70462df
Publikováno v:
IEEE Transactions on Cloud Computing. 11:879-896
Outsourcing medical data to healthcare cloud has become a popular trend. Since medical data of patients contain sensitive personal information, they should be encrypted before outsourcing. However, information retrieval methods based on plaintext can
Publikováno v:
IEEE Network. :1-9
Publikováno v:
Peer-to-Peer Networking and Applications. 16:675-689
Publikováno v:
IEEE Transactions on Vehicular Technology. 71:4535-4550