The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
The future storage systems are expected to contain a wide variety of storage media and layers due to the rapid development of NVM(non-volatile memory)*** NVM-based read caches,many kinds of NVM devices cannot stand fr...
详细信息
The future storage systems are expected to contain a wide variety of storage media and layers due to the rapid development of NVM(non-volatile memory)*** NVM-based read caches,many kinds of NVM devices cannot stand frequent data updates due to limited write endurance or high energy consumption of ***,traditional cache algorithms have to update cached blocks frequently because it is difficult for them to predict long-term popularity according to such limited information about data blocks,such as only a single value or a queue that reflects frequency or *** this paper,we propose a new MacroTrend(macroscopic trend)prediction method to discover long-term hot blocks through blocks'macro trends illustrated by their access count *** then a new cache replacement algorithm is designed based on the MacroTrend prediction to greatly reduce the write amount while improving the hit *** conduct extensive experiments driven by a series of real-world traces and find that compared with LRU,MacroTrend can reduce the write amounts of NVM cache devices significantly with similar hit ratios,leading to longer NVM lifetime or less energy consumption.
We investigated 1-μm multimode fiber laser based on carbon nanotubes,where multiple typical pulse states were observed,including Q-switched,Q-switched mode-locked,and spatiotemporal mode-locked ***,stable spatiotempo...
详细信息
We investigated 1-μm multimode fiber laser based on carbon nanotubes,where multiple typical pulse states were observed,including Q-switched,Q-switched mode-locked,and spatiotemporal mode-locked ***,stable spatiotemporal mode-locking was realized with a low threshold,where the pulse duration was 37 ps and the wavelength was centred at 1060.5 ***,both the high signal to noise and long-term operation stability proved the reliability of the mode-locked ***,the evolution of the spatiotemporal mode-locked pulses in the cavity was also simulated and *** work exhibits the flexible outputs of spatiotemporal phenomena in multimode lasers based on nanomaterials,providing more possibilities for the development of high-dimensional nonlinear dynamics.
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ...
详细信息
In light of issues such as unnoticeable texture features and limited resolution of infrared image objects, a lightweight multi-scale feature fusion method for UAV infrared object recognition is presented to enhance th...
详细信息
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m...
详细信息
Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and s...
详细信息
Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and scale and thus cannot fully exploit and utilise sentiment feature information,making their performance less than *** resolve the problem,the authors propose a new method,GP‐FMLNet,that integrates both glyph and phonetic information and design a novel feature matrix learning process for phonetic features with which to model words that have the same pinyin information but different glyph *** method solves the problem of misspelling words influencing sentiment polarity prediction ***,the authors iteratively mine character,glyph,and pinyin features from the input comments ***,the authors use soft attention and matrix compound modules to model the phonetic features,which empowers their model to keep on zeroing in on the dynamic‐setting words in various positions and to dispense with the impacts of the deceptive‐setting ***-periments on six public datasets prove that the proposed model fully utilises the glyph and phonetic information and improves on the performance of existing Chinese senti-ment analysis algorithms.
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples ...
详细信息
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples was examined,and the crystal structure was refined using the Rietveld method.A scanning electron microscope was used to analyze the microstructure of ***-principles calculations confirm that the indirect bandgap of Ca_(2)InTaO_(6)is 3.786 eV,The luminous properties and energy transfer mechanism of Ca_(2)InTaO_(6):xDy^(3+)were studied using photoluminescence ***^(4)F_(9/2)→^(6)H_(13/2)transition of Dy^(3+)ions is responsible for the greatest emission peak,which was measured at 575 *** to research,the lifespan falls as the concentration of Dy^(3+)doping amount rises because of frequent interaction and ene rgy transfer between Dy^(3+)*** correlated color temperature of the WLEDs packaged with Ca_(2)InTaO_(6):0.08Dy^(3+)is 4677 K and CIE 1931 chromaticity coordinates are(0.3578,0.3831).Meantime,the phosphor also shows outstanding te mperature stability property,which maintains 83.8%of its initial emission intensity at 450 K(activation energy of 0.1467 eV).The W-LEDs retain their performance for 100 min when powered at 3.4 V voltage and 600 mA current,demonstrating the packed W-LEDs'sustaine d operation at high temperatures.
Cross-network node classification aims to train a classifier for an unlabeled target network using a source network with rich labels. In applications, the degree of nodes mostly conforms to the long-tail distribution,...
详细信息
Cross-network node classification aims to train a classifier for an unlabeled target network using a source network with rich labels. In applications, the degree of nodes mostly conforms to the long-tail distribution, i.e., most nodes in the network are tail nodes with sparse neighborhoods. The established methods focus on either the discrepancy cross network or the long tail in a single network. As for the cross-network node classification under long tail, the coexistence of sparsity of tail nodes and the discrepancy cross-network challenges existing methods for long tail or methods for the cross-network node classification. To this end, a multicomponent similarity graphs for cross-network node classification (MS-CNC) is proposed in this article. Specifically, in order to address the sparsity of the tail nodes, multiple component similarity graphs, including attribute and structure similarity graphs, are constructed for each network to enrich the neighborhoods of the tail nodes and alleviate the long-tail phenomenon. Then, multiple representations are learned from the multiple similarity graphs separately. Based on the multicomponent representations, a two-level adversarial model is designed to address the distribution difference across networks. One level is used to learn the invariant representations cross network in view of structure and attribute components separately, and the other level is used to learn the invariant representations in view of the fused structure and attribute graphs. Extensive experimental results show that the MS-CNC outperforms the state-of-the-art methods. Impact Statement-Node classification is an important task in graph mining. With the unavailability of labels, some researchers propose cross-network node classification, using one labeled network to assist the node classification of another unlabeled network. However, the long-tail of nodes leads to unsatisfactory performance and challenges the recent cross-network node classification m
Aimedat the problem of dynamic causal discovery in the era of artificial intelligence, this article combines partial rank correlation coefficients and streaming features in the field of Bayesian network structure lear...
详细信息
暂无评论