Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Chongzhi Gao"'
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2023, Iss 1, Pp 1-20 (2023)
Abstract To support multi-source data stream generated from Internet of Things devices, edge computing emerges as a promising computing pattern with low latency and high bandwidth compared to cloud computing. To enhance the performance of edge comput
Externí odkaz:
https://doaj.org/article/de33d735b79846bda198faf26cff9196
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2023, Iss 1, Pp 1-17 (2023)
Abstract Due to its low latency and energy consumption, edge computing technology is essential in processing multi-source data streams from intelligent devices. This article investigates a mobile edge computing network aided by wireless power transfe
Externí odkaz:
https://doaj.org/article/60210b21ef644ae185bf261920a7d70d
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2023, Iss 1, Pp 1-15 (2023)
Abstract This paper investigates a non-orthogonal multiple access (NOMA)-aided mobile edge computing (MEC) network with multiple sources and one computing access point (CAP), in which NOMA technology is applied to transmit multi-source data streams t
Externí odkaz:
https://doaj.org/article/5a994151c57e4c058cf444cd05f5eedc
Publikováno v:
Digital Communications and Networks, Vol 8, Iss 4, Pp 485-491 (2022)
In recent years, many adversarial malware examples with different feature strategies, especially GAN and its variants, have been introduced to handle the security threats, e.g., evading the detection of machine learning detectors. However, these solu
Externí odkaz:
https://doaj.org/article/32ba3d7902444406ad78db74dd6c6f3a
Autor:
Lianhong Zhang, Wenqi Zhou, Junjuan Xia, Chongzhi Gao, Fusheng Zhu, Chengyuan Fan, Jiangtao Ou
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2022, Iss 1, Pp 1-16 (2022)
Abstract In this paper, we investigate a multiuser mobile edge computing (MEC)-aided smart Internet of vehicle (IoV) network, where one edge server can help accomplish the intensive calculating tasks from the vehicular users. For the MEC networks, mo
Externí odkaz:
https://doaj.org/article/649096aaec054ea7813cbf970a592121
Publikováno v:
IEEE Access, Vol 6, Pp 38860-38869 (2018)
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leaka
Externí odkaz:
https://doaj.org/article/a5cf675cf8864b509511f712fd1b49a2
Publikováno v:
Digital Communications and Networks. 8:485-491
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 34:2306-2323
Homomorphic encryption (HE) schemes, such as fully homomorphic encryption (FHE), support a number of useful computations on ciphertext in a broad range of applications, such as e-voting, private information retrieval, cloud security, and privacy prot
Publikováno v:
Journal of Computer and System Sciences. 120:137-148
In a proxy re-signature scheme, a semi-trusted proxy can convert Alice's (also called as delegatee's) signature into Bob's (also called as delegator's) signature on the same message. However, the proxy itself cannot produce any signatures on behalf o
Communication-efficient outsourced privacy-preserving classification service using trusted processor
Publikováno v:
Information Sciences. 505:473-486
Machine learning (ML) classification has been one of the most important techniques of popular Internet services that aim to provide accurate predictions of data by means of a classifier model . In a machine-learning-as-a-service (MLaaS) system, the s