Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Leyi SHI"'
Publikováno v:
IEEE Access, Vol 9, Pp 18112-18122 (2021)
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data. Currently available methods for trajectory an
Externí odkaz:
https://doaj.org/article/38abc1e316274a94a01d42eb1d48a4f5
Publikováno v:
Tongxin xuebao, Vol 40, Pp 125-135 (2019)
Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information wa
Externí odkaz:
https://doaj.org/article/71885d0cbd654676a4751e8944e98abb
Publikováno v:
IEEE Access, Vol 7, Pp 66347-66357 (2019)
The extreme sparsity of the rating data seriously affects the recommendation quality of the recommendation system. In order to alleviate the problem of data sparsity, some convolutional neural network (CNN)-based models make full use of text data to
Externí odkaz:
https://doaj.org/article/d81d2bb827344506adca1a1bfb6a0379
Publikováno v:
IEEE Access, Vol 7, Pp 72234-72246 (2019)
Honeypot technology can be applied to efficiently attract attackers and exhaust their resources. However, the traditional static honeypot is easy to be recognized by anti-honeypot technology. By contrast, most of the dynamic honeypots can simulate th
Externí odkaz:
https://doaj.org/article/c6205408caba47a0aaa9f168b550bba3
Publikováno v:
IEEE Access, Vol 6, Pp 54435-54446 (2018)
Radio frequency identification (RFID) is one of the key technologies of the Internet of Things, which has been widely applied to many scenarios, such as tracking, warehouse monitoring, and vehicular social network. In such applications, some of the o
Externí odkaz:
https://doaj.org/article/ed2c5c9f6e024850a6b72ef981e0f218
Publikováno v:
Mathematics, Vol 9, Iss 8, p 805 (2021)
Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus
Externí odkaz:
https://doaj.org/article/dac988926fc346a2b537330b1db7cc5a
Publikováno v:
Remote Sensing, Vol 13, Iss 7, p 1262 (2021)
With the development of satellite communication networks and the increase of satellite services, security problems have gradually become some of the most concerning issues. Researchers have made great efforts, including conventional safety methods su
Externí odkaz:
https://doaj.org/article/40023e3d13824095871f5afe71fdf93d
Publikováno v:
Sensors, Vol 20, Iss 24, p 7300 (2020)
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability. Software Defined Network (SDN) boasts more freedom thanks to its s
Externí odkaz:
https://doaj.org/article/b4a6145bd67348849b1e94a3c628ae51
Publikováno v:
Arabian Journal of Chemistry, Vol 9, Iss 1, Pp 163-169 (2016)
The H2SiSi: and its derivatives (X2SiSi:, X = H, Me, F, Cl, Br, Ph, Ar…) is a new species. Its cycloaddition reaction is a new area for the study of silylene chemistry. The mechanism of the cycloaddition reaction between singlet Me2SiSi: a
Externí odkaz:
https://doaj.org/article/dc3a0b77da564324b703c91bfb34ff5a
Publikováno v:
Future Internet, Vol 11, Iss 3, p 65 (2019)
A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics a
Externí odkaz:
https://doaj.org/article/3ff2840f4a37492f957f6fd46d3e083b