Zobrazeno 1 - 10
of 88
pro vyhledávání: '"Chuan Kun Wu"'
Autor:
Chuan-Kun Wu, Bin Zhao
Publikováno v:
Security and Communication Networks. 2022:1-6
It is known that, given an RSA modulus, n = p q , the public key e and the corresponding private key d satisfy the modulo congruence e d ≡ 1 mod ϕ n , where ϕ n = p − 1 q − 1 . Usually, the private key d can be computed efficiently using the
Publikováno v:
Fuzzy Sets and Systems. 443:30-49
Recently, the polynomial-based radial basis function neural networks (P-RBFNNs) have been successfully applied to regression tasks. However, the redundant and non-linear partitioned data easily interfere with accurate partitioning of clusters complet
Publikováno v:
Neurocomputing. 482:139-153
In recent years, classical fuzzy clustering-based neural networks (FCNNs) have been successfully applied to regression tasks. The determination of the parameters such as cluster centers of the existing hard c-means (HCM) or fuzzy c-means (FCM), leads
Autor:
Chuan-Kun, Wu
Publikováno v:
Frontiers of Computer Science. 16
Publikováno v:
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP).
Publikováno v:
Tongxin xuebao, Vol 33, Pp 143-148 (2012)
The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic
Externí odkaz:
https://doaj.org/article/167a5536b8ba42a9a91550b4d7dc075f
Autor:
Chuan-Kun Wu
Publikováno v:
Advances in Computer Science and Technology ISBN: 9789811613715
Advances in Computer Science and Technology
Advances in Computer Science and Technology
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d196aa1b105d52f3608662d91a4ab0b5
https://doi.org/10.1007/978-981-16-1372-2
https://doi.org/10.1007/978-981-16-1372-2
Autor:
Chuan-Kun Wu
Publikováno v:
Internet of Things Security ISBN: 9789811613715
Privacy protection is a normal security requirement in network environment. The applications of IoT make the privacy protection issue more significant, because some IoT devices are used to catch personal private information such as health condition,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c309df158721fbd06bc3b3643b0ce642
https://doi.org/10.1007/978-981-16-1372-2_9
https://doi.org/10.1007/978-981-16-1372-2_9
Autor:
Chuan-Kun Wu
Publikováno v:
Internet of Things Security ISBN: 9789811613715
This chapter introduces security threats, security requirements and common techniques of security protection in IoT processing layer. A typical IoT processing layer is cloud computing, hence the security of cloud computing can represent the IoT proce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5de23f2b79c496cde35d6a9a0d4a8ad9
https://doi.org/10.1007/978-981-16-1372-2_8
https://doi.org/10.1007/978-981-16-1372-2_8
Autor:
Chuan-Kun Wu
Publikováno v:
Internet of Things Security ISBN: 9789811613715
In the three-layer IoT architecture, the network layer means wide area networks (WANs). This chapter describes some common security techniques of IoT network layer, including those based on TCP/IP network model and those for mobile communication netw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e43cdd6839b28a5dafba3783e457cba5
https://doi.org/10.1007/978-981-16-1372-2_7
https://doi.org/10.1007/978-981-16-1372-2_7