In this paper, we propose the first symmetric encryption scheme based on traversals in the supersingular isogeny graph and point mapping under the 2n -isogeny, using the Legendre form of elliptic curves. In a supersin...
详细信息
Hospitals are individual health service facilities that provide inpatient and outpatient care, therefore, quality hospital services, facilities, and resources are a necessity and must be met by every hospital. To asse...
详细信息
Sparse modeling or model selection with categorical data is challenging even for a moderate number of variables, because roughly one parameter is needed to encode one category or level. The Group Lasso is a well known...
详细信息
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and ***,with the a...
详细信息
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and ***,with the advancement of information and communication technology,new security and privacy challenges have emerged for *** address these challenges and enhance the security and privacy of user data in the smart grid,a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance(HPPM-AMICFA)is proposed in this *** proposed model integrates cloud and fog computing with hierarchical threshold encryption,offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart *** methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance,thereby assigning appropriate protection ***,a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs,ensuring secure aggregation and encryption of user *** results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs,thereby safeguarding user data in the smart grid.
High availability (HA) in MySQL databases remains a critical challenge, particularly due to risks such as single point of failure (SPOF) and limited scalability in existing setups. Previous studies have explored vario...
详细信息
With the rapid development of the fifth-generation wireless communication systems, a profound revolution in terms of transmission capacity, energy efficiency, reliability, latency, and connectivity is highly expected ...
详细信息
With the rapid development of the fifth-generation wireless communication systems, a profound revolution in terms of transmission capacity, energy efficiency, reliability, latency, and connectivity is highly expected to support a new batch of industries and applications. To achieve this goal, wireless networks are becoming extremely dynamic, heterogeneous, and complex. The modeling and optimization for the performance of realworld wireless networks are extremely challenging due to the difficulty to predict the network performance as a function of network parameters, and the prohibitively huge number of parameters to optimize. The conventional network modeling and optimization approaches rely on drive test, trial-and-error, and engineering experience,which are labor intensive, error-prone, and far from optimal. On the other hand, while the research community has spent significant efforts in understanding the fundamental limits of radio channels and developing physical layer techniques to operate close to it, very little is known about the performance limits of wireless networks, where millions of radio channels interact with one another in complex manners. This paper reviews the very recent mathematical and learning based techniques for modeling and optimizing the performance of real-world wireless networks in five aspects, including channel modeling, user demand and traffic modeling, throughput modeling and prediction, network parameter optimization, and IRS empowered performance optimization, and also presents the corresponding notable performance gains.
Video embedding is the pivot in Temporal Action Detection (TAD). Once the video embedding can robustly capture the essence of actions and perceive activities in complex scenes, the TAD model can more accurately locali...
详细信息
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r...
详细信息
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants related to commercial and industrial systems must communicate and generate ***,due to the small storage capacities of IoT devices,they are required to store and transfer the generated data to third-party entity called“cloud”,which creates one single point to store their ***,as the number of participants increases,the size of generated data also ***,such a centralized mechanism for data collection and exchange between participants is likely to face numerous challenges in terms of security,privacy,and *** address these challenges,Federated Learning(FL)has been proposed as a reasonable decentralizing approach,in which clients no longer need to transfer and store real data in the central ***,they only share updated training models that are trained over their private *** the same time,FL enables clients in distributed systems to share their machine learning models collaboratively without their training data,thus reducing data privacy and security ***,slow model training and the execution of additional unnecessary communication rounds may hinder FL applications from operating properly in a distributed ***,these unnecessary communication rounds make the system vulnerable to security and privacy issues,because irrelevant model updates are sent between clients and ***,in this work,we propose an algorithm for fully homomorphic encryption called Cheon-Kim-Kim-Song(CKKS)to encrypt model parameters for their local information privacy-preserving *** proposed solution uses the impetus term to speed up model convergence during the model training ***,it establishes a secure communication channel between IoT devices and the *** a
Technology and information growth enable internet users to play a role in disseminating information, including hoax news. One way that to avoid hoax news is to look for sources of information, but valid news is not al...
详细信息
Remote sensing images present classification challenges due to the complexity of their structural and spatial patterns. This research explores a hybrid approach that combines convolutional neural network (CNN) and att...
详细信息
暂无评论