trustedcomputing is an effective means of system security protection, encompassing various security solutions. However, these solutions exhibit individual shortcomings, such as the co-location of protective code and ...
详细信息
In the era of "digital intelligence", the security of critical information systems is vitally important. We propose a trusted assessment model to guarantee the trusted of the system operation process, which ...
详细信息
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns...
详细信息
Sharing data through the public cloud has turned into a popular way to exploit the data value today, and ciphertext-policy attribute-based encryption (CP-ABE) can protect data confidentiality while improving sharing e...
详细信息
In cloud computing environments characterized by "dynamics", the traditional static measurement to ensure the trust of the platform system is difficult to guarantee the trust of four dimensions in the cloud ...
详细信息
Software vulnerabilities will make the system vulnerable to attack, affect the reliability of the software and cause information leakage, which will have a huge impact on enterprises or individuals. Vulnerabilities ar...
详细信息
The existing Hash functions based on quantum walk construction are all proposed under the ideal closed environment. In order to better conform to the actual situation and improve the relevant performance of Hash funct...
详细信息
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is ***,the evolutionary mec...
详细信息
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is ***,the evolutionary mechanism of CFCC is analyzed from the attackers'view,the CFCC mathematical model is established,and the transition processes of GCPS running states under the influence of CFCC staged failures are ***,the mathematical model of the adaptive early warning method is ***,the mathematical model of the adaptive early warning method is mapped as an adaptive control process with tolerating staged failures damage,and the solving process is presented to infer the CFCC and its next evolution trend.A decision-making idea for the optimal active defense scheme is proposed considering the costs and gains of various defense ***,to verify the effectiveness of the adaptive early warning method,the warning and defense processes of a typical CFCC are simulated in a GCPS experimental system based on CEPRI-36 BUS.
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu...
详细信息
Epilepsy is a chronic disease with high prevalence and high disease burden. Electroencephalogram (EEG) is one of the most important tools for diagnosing epilepsy. Detection of epileptic spikes from EEG can effectively...
详细信息
暂无评论