Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye...
详细信息
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-layer aggregation federated learning architecture,which lack the consideration of cross-domain and asynchronous robustness of federated learning,and rarely integrate verification mechanisms from the perspective of *** address the above challenges,we propose a Blockchain and Signcryption enabled Asynchronous Federated Learning(BSAFL)framework based on dual aggregation for cross-domain *** particular,we first design two types of signcryption schemes to secure the interaction and access control of collaborative learning between ***,we construct a differential privacy approach that adaptively adjusts privacy budgets to ensure data privacy and local models'availability of intra-domain ***,we propose an asynchronous aggregation solution that incorporates consensus verification and elastic participation using ***,security analysis demonstrates the security and privacy effectiveness of BSAFL,and the evaluation on real datasets further validates the high model accuracy and performance of BSAFL.
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g...
详细信息
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical *** this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet ***,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot ***,we propose a new scheduling scheme based on the graded keysecurity requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key ***,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key *** results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
Abnormal-trajectory detection can be used to detect fraudulent behavior of taxi drivers transporting passengers. Aiming at the problem that existing methods do not fully consider abnormal fragments of trajectories, th...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights *** introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced *** the same time,a weighted tree structure is constructed to simplify the expression of access structure *** conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal *** scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
Image steganography involves the concealment of confidential information within images, rendering it undetectable to unauthorized observers, and subsequently retrieving the hidden information following secure transmis...
详细信息
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple...
详细信息
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer...
详细信息
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th...
详细信息
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address this issue,this study proposes an innovative framework for correcting and predicting shipborne wind *** integrating a main network with a momentum updating network,the proposed framework effectively extracts features from the time and frequency domains,thereby allowing for precise adjustments and predictions of shipborne wind speed *** using real sensor data collected at the Qingdao Oceanographic Institute demonstrates that the proposed method outperforms existing approaches in single-and multi-step predictions compared to existing methods,achieving higher accuracy in wind speed *** proposed innovative approach offers a promising direction for future validation in more realistic maritime onboard scenarios.
Recently,segmentation-based scene text detection has drawn a wide research interest due to its flexibility in describing scene text instance of arbitrary shapes such as curved ***,existing methods usually need complex...
详细信息
Recently,segmentation-based scene text detection has drawn a wide research interest due to its flexibility in describing scene text instance of arbitrary shapes such as curved ***,existing methods usually need complex post-processing stages to process ambiguous labels,i.e.,the labels of the pixels near the text boundary,which may belong to the text or *** this paper,we present a framework for segmentation-based scene text detection by learning from ambiguous *** use the label distribution learning method to process the label ambiguity of text annotation,which achieves a good performance without using additional post-processing *** on benchmark datasets demonstrate that our method produces better results than state-of-the-art methods for segmentation-based scene text detection.
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangea...
详细信息
暂无评论