Introduction of the study item on the channel model for FR3 bands for NR. According to the 3rd generation partnership project(3GPP) schedule, 3GPP work for the sixth generation(6G) typically starts in 2024 during Rele...
Introduction of the study item on the channel model for FR3 bands for NR. According to the 3rd generation partnership project(3GPP) schedule, 3GPP work for the sixth generation(6G) typically starts in 2024 during Release 19. This release aims to establish the technical foundations for 6G and include preliminary work on new 6G capabilities.
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights *** introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced *** the same time,a weighted tree structure is constructed to simplify the expression of access structure *** conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal *** scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
Reverse design of highly GeO2-doped silica optical fibers with broadband and flat dispersion profiles is proposed using a neural network(NN) combined with a particle swarm optimization(PSO) ***,the NN model design...
详细信息
Reverse design of highly GeO2-doped silica optical fibers with broadband and flat dispersion profiles is proposed using a neural network(NN) combined with a particle swarm optimization(PSO) ***,the NN model designed to predict optical fiber dispersion is trained with an appropriate choice of hyperparameters,achieving a root mean square error(RMSE) of 9.47×10-7on the test dataset,with a determination coefficient(R2) of ***,the NN is combined with the PSO algorithm for the inverse design of dispersion-flattened optical *** expand the search space and avoid particles becoming trapped in local optimal solutions,the PSO algorithm incorporates adaptive inertia weight updating and a simulated annealing ***,by using a suitable fitness function,the designed fibers exhibit flat group velocity dispersion(GVD) profiles at 1 400—2 400 nm,where the GVD fluctuations and minimum absolute GVD values are below 18 ps·nm-1·km-1and 7 ps·nm-1·km-1,respectively.
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl...
详细信息
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highly challenging problem. Although current research has addressed the issue of identity disclosure, there are still two challenges: First, the privacy protection for large-scale datasets is not yet comprehensive; Second, it is difficult to simultaneously protect the privacy of nodes, edges, and attributes in social networks. To address these issues, this paper proposes a(k,t)-graph anonymity algorithm based on enhanced clustering. The algorithm uses k-means++ clustering for k-anonymity and t-closeness to improve k-anonymity. We evaluate the privacy and efficiency of this method on two datasets and achieved good results. This research is of great significance for addressing the problem of privacy breaches that may arise from the publication of graph data.
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g...
详细信息
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical *** this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet ***,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot ***,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key ***,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key *** results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
In this paper,we present a new class of spatially coupled codes obtained by using both non-recursive and recursive block-oriented *** resulting codes are termed as bidirectional block Markov superposition transmission...
详细信息
In this paper,we present a new class of spatially coupled codes obtained by using both non-recursive and recursive block-oriented *** resulting codes are termed as bidirectional block Markov superposition transmission(BiBMST)***,we perform an iterative decoding threshold analysis according to protograph-based extrinsic information transfer(PEXIT)charts for the BiBMST codes over the binary erasure channels(BECs).Secondly,we derive the generator and parity-check matrices of the BiBMST ***,extensive numerical results are presented to show the advantages of the proposed BiBMST ***,our numerical results show that,under the constraint of an equal decoding latency,the BiBMST codes perform better than the recursive BMST(rBMST)***,the simulation results show that,in finite-length regime,negligible performance gain is obtained by increasing the encoding *** solve this limitation by introducing partial superposition,and the resulting codes are termed as partially-connected BiBMST(PC-BiBMST)*** results have confirmed the advantages of the PC-BiBMST codes over the original BiBMST *** also present extensive simulation results to show the performance advantages of the PC-BiBMST codes over the spatially coupled low-density parity-check(SC-LDPC)codes,spatially coupled generalized LDPC(SC-GLDPC)codes,and the original BiBMST codes in the finite-length regime.
The subspace clustering has been addressed by learning the block-diagonal self-expressive matrix. This block-diagonal structure heavily affects the accuracy of clustering but is rather challenging to obtain. A novel a...
详细信息
The subspace clustering has been addressed by learning the block-diagonal self-expressive matrix. This block-diagonal structure heavily affects the accuracy of clustering but is rather challenging to obtain. A novel and effective subspace clustering model, i.e., subspace clustering via block-diagonal decomposition(SCBD), is proposed,which can simultaneously capture the block-diagonal structure and gain the clustering result. In our model, a strict block-diagonal decomposition is introduced to directly pursue the k block-diagonal structure corresponding to k clusters. In this novel decomposition, the self-expressive matrix is decomposed into the block indicator matrix to demonstrate the cluster each sample belongs to. Based on the strict block-diagonal decomposition, the block-diagonal shift is proposed to capture the local intra-cluster structure, which shifts the samples in the same cluster to get smaller distances and results in more discriminative features for clustering. Extensive experimental results on synthetic and real databases demonstrate the superiority of SCBD over other state-of-the-art methods.
NTT network Innovation Laboratories (NIL) is committed to the practical application of IOWN (the Innovative Optical and Wireless network) with its world-leading technological capabilities. NIL also conducts research a...
详细信息
Most datacenter networks have adopted remote direct memory access (RDMA) as the basis of the transport network to their infrastructure because modern RDMA network interface cards can provide high-performance and energ...
详细信息
暂无评论