Coverless information hiding method based on the keyword
Information hiding is an important technique to make secure the transmission of information. However, the existing information hiding method based on text is difficult to resist various steganography detection. Coverless text information hiding, a new ...
Measurement method of carbon dioxide using spatial decomposed parallel computing
According to the carbon dioxide (CO2) characteristics of weak absorption in the ultraviolet and visible (UV-VIS) bands, a measurement method based on spatial decomposed parallel computing of traditional differential optical absorption spectroscopy is ...
Design and implementation of an Openflow SDN controller in NS-3 discrete-event network simulator
The NS-3 simulator comes with the Openflow protocol and a rudimentary controller for classic layer-2 bridge simulations. This controller lacks basic functionality provided by real SDN controllers, making it inadequate for experimentation in the scientific ...
Exploring traffic condition based on massive taxi trajectories
As the increasing volumes of urban traffic data become available, more and more opportunities arise for the data-driven analysis that can lead to the improvements of traffic conditions. In this paper, we focus on a particularly important type of urban ...
1.25 Gbits/s-message experimental transmission utilising chaos-based fibre-optic secure communications over 143 km
Chaotic optical secure communications (COSC) are a kind of fast-speed hardware encryption technique at the physical layer. Concerning the practical applications, high-speed long-haul message transmission is always the goal to pursue. In this paper, we ...
Optimisation of ANFIS using mine blast algorithm for predicting strength of Malaysian small medium enterprises
Adaptive neuro-fuzzy inference system (ANFIS) is popular among other fuzzy inference systems, as it is widely applied in business and economics. Many have trained ANFIS parameters using metaheuristic algorithms, but very few have tried optimising its rule-...
Keyword guessing on multi-user searchable encryption
Multi-user searchable encryption enables the client to perform keyword search over encrypted data while supporting authorisation management. Most of these schemes are constructed using public key encryption. However, public key encryption with keyword ...
Semi-supervised dimensionality reduction based on local estimation error
The construction of a graph is extremely important in graph-based semi-supervised learning. However, it is unstable by virtue of sensitivity to the selection of neighbourhood parameter and inaccuracy of the edge weights. Inspired by the good performance ...
Securing SDN controller and switches from attacks
In this paper, we propose techniques for securing the SDN controller and the switches from malicious end-host attacks. Our model makes use of trusted computing and introspection-based intrusion detection to deal with attacks in SDN. We have developed a ...
Fast graph centrality computation via sampling: a case study of influence maximisation over OSNs
Graph centrality computation, e.g., asking for the most important vertices in a graph, may incur a high time cost with the increasing size of graphs. To address this challenge, this paper presents a sampling-based framework to speed up the computation of ...
Non-intrusive load monitoring and its challenges in a NILM system framework
With the increasing of energy demand and electricity price, researchers show more and more interest in residential load monitoring. In order to feed back the individual appliance's energy consumption instead of the whole-house energy consumption, non-...
A similarity algorithm based on hamming distance used to detect malicious users in cooperative spectrum sensing
The collaborative spectrum sensing (CSS) methods have been proposed to improve the sensing performance. However, studies rarely take security into account. CSS methods are vulnerable to the potential attacks from malicious users (MUs). Most existing MU ...