Zobrazeno 1 - 10
of 113
pro vyhledávání: '"Shoushan Luo"'
Publikováno v:
Entropy, Vol 25, Iss 5, p 760 (2023)
The Space–Air–Ground Integrated Network (SAGIN) expands cyberspace greatly. Dynamic network architecture, complex communication links, limited resources, and diverse environments make SAGIN’s authentication and key distribution much more diffic
Externí odkaz:
https://doaj.org/article/9f42ed9639c542da8278513bd0c686ef
Publikováno v:
IEEE Access, Vol 8, Pp 108387-108401 (2020)
Because social networks exemplify the phenomenon of homogeneity in complex networks, researchers generally believe that a user's privacy disclosure is closely related to that of the users around them, but we find that the related users studied in pre
Externí odkaz:
https://doaj.org/article/e963a12aa90143a3a0d4eb43ecb34e92
Publikováno v:
IEEE Access, Vol 7, Pp 151120-151130 (2019)
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node. Previous studies in this area generally only provided an app
Externí odkaz:
https://doaj.org/article/da2afdb232a043038a551dbff667cf59
Publikováno v:
IEEE Access, Vol 7, Pp 150540-150551 (2019)
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises. As an important device for detecting and analyzing malicious behaviors in networks, IDS (Intrusion
Externí odkaz:
https://doaj.org/article/d4b7927e488c423785491be6691556b6
Publikováno v:
IEEE Access, Vol 7, Pp 65982-65995 (2019)
In a real network environment, multiple types of attacks can occur. The more important the service or network, the more attacks it may suffer simultaneously. Moving target defense (MTD) technology is a revolutionary game-changing cyberspace technolog
Externí odkaz:
https://doaj.org/article/7e09823fcacc41dca3343040c7f0e802
Publikováno v:
IEEE Access, Vol 7, Pp 149080-149096 (2019)
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities. Therefore, determining how to balance the privacy protection requirements of user commu
Externí odkaz:
https://doaj.org/article/bf6be79683f94dedb4e4e83ce7feede2
Autor:
Guangcan Yang, Shoushan Luo, Hongliang Zhu, Yang Xin, Ke Xiao, Yuling Chen, Mingzhen Li, Yunfeng Wang
Publikováno v:
IEEE Access, Vol 7, Pp 156659-156674 (2019)
Local business service systems (LBSS), as an essential role of location-based service (LBS), have been gaining tremendous popularity in our daily life. Individuals' reviews in these systems are very important as they not only contribute to building r
Externí odkaz:
https://doaj.org/article/6d7789c342504a39aa7caa272581026e
Autor:
Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin, Hongliang Zhu, Yuling Chen, Guangcan Yang, Yixian Yang
Publikováno v:
IEEE Access, Vol 7, Pp 182886-182905 (2019)
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and
Externí odkaz:
https://doaj.org/article/6e300dad378e48a79fe711c0ea93cf8e
Publikováno v:
IEEE Access, Vol 7, Pp 110439-110450 (2019)
In a general secure multi-party computation (MPC) protocol, two or more participants who do not trust each other, use their respective secret inputs to calculate a joint function in a distributed environment without a centralized organization. They c
Externí odkaz:
https://doaj.org/article/93404039dbb0499a9cb252ac2b155b5a
Publikováno v:
IEEE Access, Vol 6, Pp 13706-13715 (2018)
Instant messaging (IM) systems can be considered the most frequently used applications in mobile social networks. Nowadays, people are becoming increasingly concerned about data security and privacy protection with IM applications. Therefore, a compr
Externí odkaz:
https://doaj.org/article/a9ebde57da4748b08178677e10215e77