Identity based signcryption key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity ba...
详细信息
Identity based signcryption key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity based signcryption KEM to multiple recipients (mIDSC-KEM), and define security models for this new primitive. We illustrate by proposing an efficient mIDSC-KEM scheme. Our scheme is proved secure in the random oracle model under the Gap bilinear Diffie-Hellman (Gap-BDH) and the Computational Diffie-Hellman (CDH) assumption.
To achieve progressive and accurate decision-making for long-term time series data while meeting the needs of privacy-friendly and early, this paper proposes a universal framework for sequential progressive decision-m...
详细信息
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla...
详细信息
The international student website is the window of the school's external publicity. Through the website, international students can understand the school in a wider range and in all aspects. The website is often a...
详细信息
In the new power system scenario, Power IoT terminals have new characteristics such as diverse hardware heterogeneity and complex subject ownership, which make it technically difficult to achieve secure access authent...
详细信息
How to schedule public resources to maximize the coverage of crowds has always been a hot topic. There are mainly two types of research. One is the scheduling of static resources, whose coverage efficiency is lower be...
详细信息
Compared with terrestrial reconfigurable intelligent surface (RIS), aerial RIS provides improved transmission performance owing to its high adaptability in three-dimensional space and the existence of established line...
详细信息
ISBN:
(数字)9798350303582
ISBN:
(纸本)9798350303599
Compared with terrestrial reconfigurable intelligent surface (RIS), aerial RIS provides improved transmission performance owing to its high adaptability in three-dimensional space and the existence of established line-of-sight links. In this paper, we study an aerial RIS-aided over-the-air federated learning (AirFL) system and propose an effective resource allocation scheme to maximize the energy efficiency (EE) of the AirFL system, where the transmit power of the Internet-of-Things devices, the receive scalar at the base station (BS), and the phase shifts of the RIS are jointly optimized. Since the formulated EE maximization problem consists of coupled variables, it is essentially non-convex. The original problem is then transformed into several sub-problems, which are addressed by adopting Dinkelbach's method, successive convex approximation and difference-of-convex programming approach. Finally, simulation results demonstrate that the proposed scheme is superior in terms of the EE performance for RIS-aided AirFL system compared with the existing scheme.
In this paper, we investigate a task offloading and resource allocation strategy concerning multi-access edge computing (MEC) servers and multi-vehicles in the Internet of Vehicles (IoV). Aiming at dealing with resour...
详细信息
This paper solves the challenge that the target is submerged in the background in the border security scenario, and proposes the enhancement of YOLOv5 algorithm. EfficientViT replaces the DarkNet backbone, leveraging ...
详细信息
Arbitrary-shaped text detection is a challenging task where a text instance representation should be well designed to cover diverse text geometry variances. Most of current methods represent text instances as image ma...
详细信息
暂无评论