Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures
AbstractEncrypted DNS protocols—DNS-over-TLS (DoT), DNS-over-HTTPS (DoH), and DNS-over-QUIC (DoQ), have been standardized and widely embraced by the industry to enhance the security and privacy of DNS transmissions. As more software and devices support ...
- research-articleJuly 2024
Privacy-preserving multi-party logistic regression in cloud computing
AbstractIn recent years, machine learning techniques have been widely deployed in various fields. However, machine learning faces problems like high computation overhead, low training accuracy, and poor security due to data silos, privacy issues and ...
Highlights- We propose a PPMLR scheme that supports authentication.
- Our scheme is fault tolerant and does not need the data owner to interact with the cloud server.
- Our scheme is enabled to create highly accurate models because it does not ...
- ArticleJuly 2024
Research on Fault Diagnosis of Surge Arresters Based on Support Vector Recurrent Neural Network
- Ying Jin,
- Xiaodong Zhang,
- Lingfeng Qiu,
- Yong Ding,
- Yamei Luo,
- Zhijun Zhang,
- Yongxia Han,
- Jiantao Zhang,
- Lin Yang
AbstractSurge arresters are crucial protective components within electrical power systems, and the proper functioning is vital for the safety and reliability of the entire system. However, due to factors such as prolonged operation and environmental ...
- ArticleSeptember 2024
LifeBank: Integrating Blockchain Technology with Blood Donation Systems
AbstractBlockchain technology offers promising solutions for enhancing transparency, traceability, and privacy in blood donation information management. By creating a decentralized system, it secures data authenticity and donor privacy through encryption. ...
-
- research-articleJuly 2024
Predicting financial distress using current reports: A novel deep learning method based on user-response-guided attention
AbstractEffective financial distress prediction (FDP) can discover a company's potential financial risks and support relevant decisions in a timely manner. Previous studies on FDP have mostly focused on using financial indicators and periodic reports. ...
Highlights- A novel deep attention network is proposed for financial distress prediction.
- Financial indicators, current report texts, and user responses are jointly used.
- User responses are utilized to guide the semantic feature ...
- research-articleApril 2024
Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain
IEEE Wireless Communications (IEEEWIRCOM), Volume 31, Issue 2Pages 22–29https://doi.org/10.1109/MWC.001.2300368As a critical infrastructure for contemporary information technology industry, industrial internet of things (IIoT) contains a vast amount of sensitive data, making it a key requirement to ensure data security. As the use of wireless networks as a means ...
- research-articleMarch 2024
Privacy-preserving federated learning based on partial low-quality data
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00618-8AbstractTraditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect participants’ data privacy by ...
- research-articleAugust 2024
Design of smart flowerpot based on lightweight plant disease detection model
CAICE '24: Proceedings of the 3rd International Conference on Computer, Artificial Intelligence and Control EngineeringPages 811–815https://doi.org/10.1145/3672758.3672892The application of neural networks in embedded systems is currently a hot topic in artificial intelligence research. In the design of the smart flowerpot based on soilless cultivation, a lightweight plant disease detection scheme is proposed in this ...
- research-articleJanuary 2024
LSOIT: Lexicon and Syntax Enhanced Opinion Induction Tree for Aspect-based Sentiment Analysis
Expert Systems with Applications: An International Journal (EXWA), Volume 235, Issue Chttps://doi.org/10.1016/j.eswa.2023.121137AbstractAspect-based sentiment analysis (ABSA) is a subtask of sentiment classification, and the difficulty is how to capture the sentiment aspect and sentiment polarity pairs in a sentence. Early studies applied serialization models with attention ...
Highlights- Lexicon and Syntax Enhanced Opinion Induction Tree is proposed.
- Using reinforcement learning and attention mechanism builds opinion induction trees.
- Knowledge enhanced opinion induction tree is presented.
- GCNs is constructed ...
- research-articleDecember 2023
CTVSR: Collaborative Spatial–Temporal Transformer for Video Super-Resolution
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 6Pages 5018–5032https://doi.org/10.1109/TCSVT.2023.3340439Video super-resolution (VSR) is important in video processing for reconstructing high-definition image sequences from corresponding continuous and highly-related video frames. However, existing VSR methods have limitations in fusing spatial-temporal ...
- research-articleMay 2024
Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring
ICBCT '23: Proceedings of the 2023 5th International Conference on Blockchain TechnologyPages 29–35https://doi.org/10.1145/3638025.3638033With the rapid development of society and economy, soil issues have been emphasized. As the front-end of data collection, sensor networks are used in various soil monitoring applications. However, current wireless sensor networks face the difficulty of ...
- research-articleFebruary 2024
An artificial immunity based intrusion detection system for unknown cyberattacks
AbstractThe evolving unknown cyberattacks have rapidly expanded the cyber threat landscape. Identifying unknown cyberattacks, therefore, remains a challenging issue, compounded by the widespread implementation of emerging technologies, such as 5G, ...
Highlights- The artificial immunity based intrusion detection effectively detects unknown attacks.
- Possible unknown attacks are created by evolution algorithm for generating detectors.
- The filtering mechanism designed for evolved antigens ...
- research-articleOctober 2023
Verifiable Federated Learning With Privacy-Preserving Data Aggregation for Consumer Electronics
IEEE Transactions on Consumer Electronics (ITOCE), Volume 70, Issue 1Pages 2696–2707https://doi.org/10.1109/TCE.2023.3323206With the development of information technology, massive and heterogeneous consumer electronic products can access the network. These products may engage third-party servers for federated learning and generating more accurate models, where they can monitor,...
- research-articleOctober 2023
Phishing detection on Ethereum via transaction subgraphs embedding
AbstractWith the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective measures and better ...
We designed an improved subgraph embedding algorithm called imgraph2vec with biases of transaction blockheight, transaction timestamp and transaction amount for detection of phishing addresses. Experiments show that our designed detection framework has ...
- research-articleOctober 2023
Security and privacy protection technologies in securing blockchain applications
Information Sciences: an International Journal (ISCI), Volume 645, Issue Chttps://doi.org/10.1016/j.ins.2023.119322AbstractAs a key technology for building trust networks and implementing value interconnections, blockchain has received extensive attention. There are numerous technical use cases for blockchains in a variety of areas, such as digital currency systems, ...
- research-articleAugust 2023
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network
ACM Transactions on Internet Technology (TOIT), Volume 23, Issue 3Article No.: 41, Pages 1–23https://doi.org/10.1145/3511901Edge networks are providing services for an increasing number of companies, and they can be used for communication between edge devices and edge gateways. However, the performance of edge devices varies greatly, and it is not easy to upgrade low-...
- research-articleAugust 2023
Blockchain enabled task offloading based on edge cooperation in the digital twin vehicular edge network
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 12, Issue 1https://doi.org/10.1186/s13677-023-00496-6AbstractThe rapid development of the Internet of Vehicles (IoV) along with the emergence of intelligent applications have put forward higher requirements for massive task offloading. Even though Mobile Edge Computing (MEC) can diminish network ...
- research-articleJune 2023
Joint blind reconstruction of cyclic codes and self‐synchronous scramblers
AbstractThe inverse analysis of the intercepted signals to reconstruct the communication scheme used by the transmitter is a key problem in the non‐cooperative context. In this paper, the problem of blind reconstruction of cyclic codes and self‐...
There is no effective method to reconstruct scramblers and cyclic codes from scrambled cyclic code sequences. To solve this problem, a joint blind reconstruction method of cyclic codes and self‐synchronous scramblers is proposed in this paper. image image
- ArticleApril 2023
IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability
AbstractThe majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are many security problems in real world ...