Device-to-Device (D2D) relaying helps improve the coverage range and throughput of the millimeter Wave (mmWave) networks. This work focuses on improving the uplink throughput in a single-cell mmWave-based Internet-of-...
详细信息
Detecting and promptly identifying cracks on road surfaces is of paramount importance for preserving infrastructure integrity and ensuring the safety of road users, including both drivers and pedestrians. Presently, t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues. Due to its flexible and efficient fine-grained access control feature, Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is suitable for data sharing in IoV. However, there are many flaws in most existing CP-ABE schemes, such as attribute privacy leakage and key misuse. This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP). A partially hidden access structure is adopted to hide sensitive user attribute values, and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure. In addition, key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse. Since the main computation task is outsourced to the cloud, the burden of the user side is relatively low. Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co...
详细信息
In the era of advancement in technology and modern agriculture, early disease detection of potato leaves will improve crop yield. Various researchers have focussed on disease due to different types of microbial infect...
详细信息
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori...
详细信息
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me...
详细信息
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent systems with bandit feedback is to explore and understand the equilibrium state to ensure stable and tractable system performance.
Individuals with sensorineural hearing loss often experience difficulty comprehending speech when background noise is present. This paper investigates the extent of this problem in various listening scenarios and with...
详细信息
To predict the lithium-ion(Li-ion) battery degradation trajectory in the early phase,arranging the maintenance of battery energy storage systems is of great ***,under different operation conditions,Li-ion batteries pr...
详细信息
To predict the lithium-ion(Li-ion) battery degradation trajectory in the early phase,arranging the maintenance of battery energy storage systems is of great ***,under different operation conditions,Li-ion batteries present distinct degradation patterns,and it is challenging to capture negligible capacity fade in early *** the data-driven method showing promising performance,insufficient data is still a big issue since the ageing experiments on the batteries are too slow and *** this study,we proposed twin autoencoders integrated into a two-stage method to predict the early cycles' degradation *** two-stage method can properly predict the degradation from course to *** twin autoencoders serve as a feature extractor and a synthetic data generator,***,a learning procedure based on the long-short term memory(LSTM) network is designed to hybridize the learning process between the real and synthetic *** performance of the proposed method is verified on three datasets,and the experimental results show that the proposed method can achieve accurate predictions compared to its competitors.
暂无评论