Iterative thresholding-type algorithm, as one of the typical methods of compressed sensing (CS) theory, is widely used in sparse recovery field, because of its simple computational process. However, the estimation acc...
详细信息
Google's success derives in large part from its PageRank algorithm, which assign a score to every web page according to its importance. Recently, G. Modjtaba et al. (2021) [19] proved that similar vertices in a gr...
详细信息
Let {un}∞n=1 be the Sylvester’s sequence (sequence A000058 in the OEIS), and let a1 ∞i=1 a1i = 1. In this paper, we solve a conjecture of Erdős and Graham, which asks whether (formula presented) We prove this conje...
详细信息
The recent integration of blockchain technology with the Internet of Things (IoT) has created a new platform for secure and decentralized communication among IoT devices. However, this integration has raised concerns ...
详细信息
ISBN:
(数字)9798331513733
ISBN:
(纸本)9798331513740
The recent integration of blockchain technology with the Internet of Things (IoT) has created a new platform for secure and decentralized communication among IoT devices. However, this integration has raised concerns about privacy preservation due to the inherent transparency and immutability of the blockchain. To address these challenges, our paper presents a comprehensive framework for privacy preservation in IoT-based blockchain systems. We propose a privacy-preserving blockchain-based framework that classifies transactions as public or private at the IoT level, using a combination of low-computation cryptographic techniques and a low-complexity consensus protocol to ensure data confidentiality and privacy. Additionally, we integrate an anomaly-based intrusion detection system (IDS) to monitor and address threats in real time, making IoT networks resilient against evolving cyber threats. We evaluated our proposed system model through comprehensive simulations and experiments, demonstrating the practicality and effectiveness of our approach in real-world IoT scenarios. Our findings show that our proposed protocol can comprehensively safeguard the privacy of IoT data while maintaining the security and transparency inherent in blockchain-based systems. This private-by-design model provides a real-world solution to privacy concerns in IoT-based blockchain systems, contributing to the development of secure, decentralized IoT communication.
Given a weighted bipartite graph G = (L, R, E, w), the maximum weight matching (MWM) problem aims to find a matching M ⊆ E that maximizes the total weight ∑e∈M w(e). The widely used Hungarian algorithm efficiently s...
详细信息
With the rapid growth of data in modern applications, parallel combinatorial algorithms for maximizing non-monotone submodular functions have gained significant attention. The state-of-the-art approximation ratio of 1...
详细信息
As the power grid integrates a higher proportion of distributed energy resources, there remains a need to develop comprehensive regulatory strategies that optimize the economic operation of distribution networks and i...
详细信息
ISBN:
(数字)9798331521950
ISBN:
(纸本)9798331521967
As the power grid integrates a higher proportion of distributed energy resources, there remains a need to develop comprehensive regulatory strategies that optimize the economic operation of distribution networks and improve the capacity for integrating renewable energy *** paper introduces an innovative two-layer regulatory strategy designed to significantly reduce the operational costs of distribution networks and enhance the capacity for integrating wind and solar energy. The upper layer focuses on the coordinated scheduling of adjustable energy storage aggregator, in the lower layer of the strategy, a consensus algorithm is employed to swiftly and precisely relay instructions from the upper layer to the distributed energy storage systems within the aggregator. Through case studies, the effectiveness of this method has been validated, demonstrating its potential to enhance both the efficiency and economic performance of distribution networks.
In this paper, we study the problem of robust subspace recovery (RSR) in the presence of both strong adversarial corruptions and Gaussian noise. Specifically, given a limited number of noisy samples—some of which are...
详细信息
Data security is today regarded as one of the most difficult duties that IT professionals must fight for. And today, consumers are more concerned about their data, and they begin to wonder why the rules that attempted...
详细信息
Data security is today regarded as one of the most difficult duties that IT professionals must fight for. And today, consumers are more concerned about their data, and they begin to wonder why the rules that attempted to protect their data, particularly in the proximity marketing arena, have failed. Users’ information is shared without their awareness among market participants. Many systems have emerged through regulation to safeguard users and the market, the most well-known of which is Opt-in/Opt-out, which asks users for permission to use and share personal information with a third party. In addition, they have the opportunity to revoke their permission at any moment. In practice, however, this approach is ineffectual because opting out does not prohibit corporations from exploiting the data. In this work, we propose a novel invention that combines Opt-in/Opt-out with consensus algorithms in a decentralized way to provide a more secure environment for the user, giving the user the primary control to grant the company access to his data or a real withdrawal consent at any time.
暂无评论