Zobrazeno 1 - 10
of 216
pro vyhledávání: '"Jingfeng Xue"'
Publikováno v:
Journal of Marine Science and Engineering, Vol 12, Iss 10, p 1689 (2024)
To fulfill the demand for high-precision underwater acoustic positioning at full sea depth, an ultra-short baseline (USBL) positioning method with the square array based on the least squares estimating signal parameters via rotational invariance tech
Externí odkaz:
https://doaj.org/article/d529c43d2e6c412fb5080b2f32a1b48e
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 1, Pp 101898- (2024)
With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to detect or classify malware. Therefore, ensuring high-quality labels for malware samples is crucial to ma
Externí odkaz:
https://doaj.org/article/a9e94528b02e4aa09a8aaf6a7b8eef3c
Publikováno v:
Biomimetics, Vol 9, Iss 6, p 312 (2024)
Variable camber wing technology stands out as the most promising morphing technology currently available in green aviation. Despite the ongoing advancements in smart materials and compliant structures, they still fall short in terms of driving force,
Externí odkaz:
https://doaj.org/article/8e71f4d4385c4b38b2538b6d4d5a167a
Publikováno v:
Sensors, Vol 23, Iss 16, p 7105 (2023)
Currently, decentralized redactable blockchains have been widely applied in IoT systems for secure and controllable data management. Unfortunately, existing works ignore policy privacy (i.e., the content of users’ redaction policies), causing sever
Externí odkaz:
https://doaj.org/article/a7f3439f33234c4a916d7528d7f61f68
Publikováno v:
Journal of the American Chemical Society; 7/31/2024, Vol. 146 Issue 30, p20963-20971, 9p
Publikováno v:
IEEE Access, Vol 8, Pp 66315-66326 (2020)
With the rapid development of networks, network security is a serious problem. To evaluate a network accurately, this paper proposes a network risk evaluation method based on a differential manifold (DM) and research on traditional methods. The DM di
Externí odkaz:
https://doaj.org/article/001a54a48d5e484baac18e0fe8ef8745
Publikováno v:
IEEE Access, Vol 7, Pp 70610-70623 (2019)
Traditionally, network risk assessment uses a statistical computation method. This paper proposes Lie group kinematics to describe the feature space of the attack behavior. A matrix composed of indicators and topologies in a network system is mapped
Externí odkaz:
https://doaj.org/article/16fdd2bf1c4942a2a21efbb439bab381
Publikováno v:
IEEE Access, Vol 7, Pp 143573-143596 (2019)
In the era of cyberspace, malware is the main weapon for launching cyber-attacks and the critical rival for the security community. More and more researchers are investing in the wave of anti-malware research. In order to promote researchers to enter
Externí odkaz:
https://doaj.org/article/222bc52125564f4d8b55438b8a57b31f
Publikováno v:
Security and Communication Networks. 2023:1-15
At present, the network security problem is facing a serious threat, and network security events continue to occur. It has become an important link to prevent network attacks and ensure network security. According to the network security protection m
Publikováno v:
Neurocomputing. 522:89-104