Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o...
详细信息
With the rapid development of high-speed mobile network technology and high-precision positioning technology,the trajectory information of mobile users has received extensive attention from academia and industry in th...
详细信息
With the rapid development of high-speed mobile network technology and high-precision positioning technology,the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social *** can mine users’trajectories in Location-based Social Networks to obtain sensitive information,such as friendship groups,activity patterns,and consumption ***,mobile users’privacy and security issues have received growing attention in Location-based Social *** is crucial to strike a balance between privacy protection and data *** paper proposes a differential privacy trajectory protection method based on latent interest community detection(DPTP-LICD),ensuring strict privacy protection standards and user data ***,based on the historical trajectory information of users,spatiotemporal constraint information is extracted to construct a potential community strength model for mobile ***,the latent interest community obtained from the analysis is used to identify preferred hot spots on the user’s trajectory,and their priorities are assigned based on a popularity model.A reasonable privacy budget is allocated to prevent excessive noise from being added and rendering the protected trajectory data ***,to prevent privacy leakage,we add Laplace and exponential noise in generating preferred hot spots and recommending user interest *** and effectiveness analysis shows that our mechanism provides effective points of interest recommendations and protects users’privacy from disclosure.
Analysis and reaction to natural disasters have made extensive use of deep learning methods using semantic segmentation networks. These implementations’ foundation is based on convolutional neural networks (CNNs), wh...
详细信息
Cardiomegaly, the enlargement of the heart, poses a significant challenge in the field of healthcare. Outdated diagnostic methods often lead to delayed detection and intervention. This project presents an innovative s...
详细信息
With intelligent terminal devices’widespread adoption and global positioning systems’advancement,Location-based Social Networking Services(LbSNs)have gained considerable *** recommendation mechanism,which revolves a...
详细信息
With intelligent terminal devices’widespread adoption and global positioning systems’advancement,Location-based Social Networking Services(LbSNs)have gained considerable *** recommendation mechanism,which revolves around identifying similar users,holds significant importance in *** order to enhance user experience,LbSNs heavily rely on accurate *** mining and analyzing users who exhibit similar behavioral patterns to the target user,LbSNs can offer personalized services that cater to individual ***,trajectory data,a form encompassing various sensitive attributes,pose privacy *** disclosure of users’precise trajectory information can have severe consequences,potentially impacting their daily ***,this paper proposes the Similar User Discovery Method based on Semantic Privacy(SUDM-SP)for trajectory *** approach involves employing a model that generates noise trajectories,maximizing expected noise to preserve the privacy of the original *** users are then identified based on the published noise trajectory ***-SP consists of two key ***,a puppet noise location,exhibiting the highest semantic expectation with the original location,is generated to derive noisesuppressed trajectory ***,a mechanism based on semantic and geographical distance is employed to cluster highly similar users into communities,facilitating the discovery of noise trajectory similarity among *** trials conducted using real datasets,the effectiveness of SUDM-SP,as a recommendation service ensuring user privacy protection is substantiated.
Early and accurate detection of breast cancer, particularly Invasive Ductal Carcinoma (IDC), is critical for improving patient outcomes. Traditional diagnostic methods like histopathology and mammography have limitati...
详细信息
Cloud detection (CD) in remote sensing images is commonly used in satellite imaging and laser communication. UNet-based methods with multi-level feature caching and interaction learning, are popular for superior CD pe...
详细信息
The paper presents a combinatorial algorithm to find the straight skeleton of the inner isothetic cover of a digital object imposed on a uniform background grid. The isothetic polygon (orthogonal polygon) tightly insc...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely hi...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely high,so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition *** proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum ***,we use the information gain and Fisher Score to sort the features extracted from ***,we employ a multi-objective ranking method to evaluate these features and assign different importance to *** with high rankings have a large probability of being ***,we propose a repair strategy to address the problem of duplicate solutions in multi-objective feature selection,which can improve the diversity of solutions and avoid falling into local *** random forest and K-nearest neighbor classifiers,four English speech emotion datasets are employed to test the proposed algorithm(MBEO)as well as other multi-objective emotion identification *** results illustrate that it performs well in inverted generational distance,hypervolume,Pareto solutions,and execution time,and MBEO is appropriate for high-dimensional English SER.
暂无评论