The increasing frequency of ransomware attacks, with a reported growth rate of 59%, has exposed significant vulnerabilities in existing cybersecurity measures. Traditional defenses, such as routine data backups and en...
详细信息
Fashion complementary recommendation has always been crucial in the field of recommendation. In previous work, researchers did not pay attention to the connection and combinability between multi-dimensional image feat...
详细信息
Ensemble learning for big data has been successful in machine learning and has great advantages over other learning methods. The ensemble model based on Random Sample Partition (RSP) is a prominent method of it. Altho...
详细信息
Legal judgment prediction aims to predict the judgment result based on the case fact description. It is an important application of natural language processing within the legal field. To enhance the impartiality and c...
详细信息
Seismic deconvolution encounters problems of multiplicity and instability. The regularization technique based on various prior knowledge is used to constrain the range of solutions and improve the stability of deconvo...
详细信息
The current Internet makes forwarding decisions based on only destination addresses, leading to a prevalence of IP source address spoofing. To mitigate the risks posed by IP spoofing, Source Address Validation in Intr...
详细信息
Knowledge distillation (KD) aims to distill the knowledge from a more extensive deep neural network into a small net-work without losing validity. This paper proposes a novel approach with active exploration and passi...
详细信息
In recent years, the emergence of large-language models (LLMs) has profoundly transformed our production and lifestyle. These models have shown tremendous potential in fields, such as natural language processing, spee...
详细信息
The cloud-based devices face many threats these days due to shared resources like power. The attacker measures the power by using some remote sensors which are present in attacker tenants. These sensors get partial or...
详细信息
Autonomous vehicle platooning benefits significantly from the Consensus Speed Advisory System (CSAS), an emerging technology that recommends a consensus speed to reduce energy consumption. However, managing trust to e...
详细信息
Autonomous vehicle platooning benefits significantly from the Consensus Speed Advisory System (CSAS), an emerging technology that recommends a consensus speed to reduce energy consumption. However, managing trust to ensure system security and identify malicious nodes poses a considerable challenge in these autonomous environments. Furthermore, while CSAS optimizes the total energy consumption of the platoon, it may inadvertently result in increased energy use for specific vehicles, discouraging their continued participation and hindering an efficient formation of a platoon. This paper proposes a trust-aware and decentralized speed advisory system (TD-SAS) to address these challenges. TD-SAS employs a consortium blockchain for managing trust nodes, providing non-repudiation and tamper resistance for reputation data. Capitalizing on this platform, we use a multi-weight subjective logic model for precise reputation value calculation. Additionally, we present a trust-aware consensus speed recommendation scheme capable of adapting its recommendations to vehicular reputation variations. To mitigate the potential disincentives for vehicles experiencing increased energy consumption, we incorporate an incentive mechanism to encourage their re-engagement with TD-SAS. Comprehensive security analysis and extensive simulation experiments confirm the robustness and effectiveness of TD-SAS, emphasizing its potential for enhancing the energy efficiency and security of autonomous vehicle platoons. IEEE
暂无评论