To solve the problem that the massive amount of information and real-time processing in the IoT system puts pressure on the computing resources of the whole system, the industry often adopts the computation offloading...
详细信息
Subspace clustering has shown great potential in discovering the hidden low-dimensional subspace structures in high-dimensional data. However, most existing methods still face the problem of noise distortion and overl...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t...
详细信息
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by these personalised *** address the matter,this article develops a personalised data publishing method for multiple *** to the requirements of individuals,the new method partitions SAs values into two categories:private values and public values,and breaks the association between them for privacy *** the private values,this paper takes the process of anonymisation,while the public values are released without this *** algorithm is designed to achieve the privacy mode,where the selectivity is determined by the sensitive value frequency and undesirable *** experimental results show that the proposed method can provide more information utility when compared with previous *** theoretic analyses and experiments also indicate that the privacy can be guaranteed even though the public values are known to an *** overgeneralisation and privacy breach caused by the personalised requirement can be avoided by the new method.
This letter presents an optimization design method for broadband Doherty power amplifier (DPA) using an irregular output combining network (OCN). First, the postmatching network and the output matching networks are co...
详细信息
This paper presents a photonic scheme for generating multi-format, multi-band, and reconfigurable microwave photonic signals through cascaded external modulation. The proposed system utilize dual-parallel Mach–Zehnde...
详细信息
The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirem...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirement of their *** this paper,in order to tackle the challenge,we jointly optimize the offloading delay and energy consumption of mobile terminals(MTs)to realize the delay-energy tradeoff in an IRS-assisted MEC network,in which non-orthogonal multiple access(NOMA)and multiantenna are applied to improve spectral *** achieve the optimal delay-energy tradeoff,an offloading cost minimization model is proposed,in which the edge computing resource allocation,signal detecting vector,uplink transmission power,and IRS phase shift coefficient are needed to be jointly *** optimization of the model is a multi-level fractional problem in complex fields with some coupled high dimension *** solve the intractable problem,we decouple the original problem into a computing subproblem and a wireless transmission subproblem based on the uncoupled relationship between different variable *** computing subproblem is proved convex and the closed-form solution is obtained for the edge computing resource ***,the wireless transmission subproblem is solved iteratively through decoupling the residual *** each iteration,the closed-form solution of residual variables is obtained through different successive convex approximation(SCA)*** verify the proposed algorithm can converge to an optimum with polynomial *** results indicate the proposed method achieves average saved costs of 65.64%,11.24%,and 9.49%over three benchmark methods respectively.
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)***-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting *** paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and *** results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
暂无评论