Sequence sets with minimum total squared correlation (TSC) have important application in communications. In a multi-cell system, due to the difference in channel strength between the home cell and the neighboring cell...
详细信息
The traditional methods for analyzing environmental impact factors in urban road traffic accidents suffer from issues such as low recall, poor precision, and time-consuming processes. To address these challenges, a no...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the *** paper introduces cooperative jammi...
详细信息
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the *** paper introduces cooperative jamming to cognitive radio(CR)networks with non-orthogonal multiple access(NOMA)*** secure performance of the considered CR and NOMA(CR-NOMA)network is evaluated using two modes:non-cooperative jamming and cooperative *** particular,the secrecy outage probabilities(SOPs)of the primary user(PU)in the two modes are derived under Rician fading channels,based on which,the influences of the transmission signal-to-noise ratio(SNR)of secondary users(SUs),the number of SUs,the secrecy rate,and the power allocation coefficient on the SOPs of PU are analyzed *** analysis and simulation results show that cooperative jamming effectively prevents eavesdropping behaviour,which reduces the SOP of PU compared to non-cooperative *** also show that the transmission SNR,the number of SUs,the secrecy rate,and the power distribution coefficients greatly influence performance improvement.
With the increasing complexity of the cyber-attacks, traditional intrusion systems have become inadequate in effectively detecting and preventing network attacks. Modern machine learning techniques have the capability...
详细信息
In this paper, we focus on the edge server placement problem (ESPP). ESPP is to decide positions (edge stations) where purchased edge servers (ESs) are placed when a service provider builds or upgrades its edge comput...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
Let d be a (well-behaved) shortest-path metric defined on a path-connected subset of R2 and let D = {D1, . . ., Dn} be a set of geodesic disks with respect to the metric d. We prove that G×(D), the intersection g...
详细信息
Graph convolutional networks (GCNs) have emerged as a powerful tool for action recognition, leveraging skeletal graphs to encapsulate human motion. Despite their efficacy, a significant challenge remains the dependenc...
详细信息
A graph G is edge-k-choosable if,for any assignment of lists L(e)of at least k colors to all edges e∈E(G),there exists a proper edge coloring such that the color of e belongs to L(e)for all e∈E(G).One of Vizing’s c...
详细信息
A graph G is edge-k-choosable if,for any assignment of lists L(e)of at least k colors to all edges e∈E(G),there exists a proper edge coloring such that the color of e belongs to L(e)for all e∈E(G).One of Vizing’s classic conjectures asserts that every graph is edge-(Δ+1)-*** is known since 1999 that this conjecture is true for general graphs withΔ≤*** recently,in 2015,Bonamy confirmed the conjecture for planar graph withΔ≥8,but the conjecture is still open for planar graphs with 5≤Δ≤*** confirm the conjecture for planar graphs withΔ≥6 in which every 7-cycle(if any)induces a C_(7)(so,without chords),thereby extending a result due to Dong,Liu and Li.
暂无评论