With the existing Cognitive Radio networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusi...
详细信息
Online reviews are one of the important information resources for people. This paper focuses on a specific domain-movie review and presents a new model for predicting semantic orientation of reviews, i.e., classifying...
详细信息
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attac...
详细信息
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computerinformation system, an immune danger theory inspired model for networksecurity monitoring is ...
详细信息
The performance of transmit antenna selection is investigated. The exact closed-form expressions for the average BER and average SNR in MRT systems and EGT systems are proposed. The minimum number of increased transmi...
详细信息
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as...
详细信息
Delay/Disruption Tolerant networks (DTN) often use multi-copy routing protocols to improve the efficiency that the messages are delivered successfully, but the network load is increased by vast message copies. A new s...
详细信息
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo...
详细信息
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.
New application traffic occurring on Internet frequently challenges the traditional traffic classifiers based on machine learning. These classifiers always identify it inaccurately and assign it into one of their know...
详细信息
A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger ...
详细信息
暂无评论