With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
In this study,the effect of presentation rates on pupil dilation is investigated for target recognition in the Rapid Serial Visual Presentation(RSVP)*** this experiment,the RSVP paradigm with five different presentati...
详细信息
In this study,the effect of presentation rates on pupil dilation is investigated for target recognition in the Rapid Serial Visual Presentation(RSVP)*** this experiment,the RSVP paradigm with five different presentation rates,including 50,80,100,150,and 200 ms,is *** pupillometry data of 15 subjects are collected and *** pupillometry results reveal that the peak and average amplitudes for pupil size and velocity at the 80-ms presentation rate are considerably higher than those at other presentation *** average amplitude of pupil acceleration at the 80-ms presentation rate is significantly higher than those at the other presentation *** latencies under 50-and 80-ms presentation rates are considerably lower than those of 100-,150-,and 200-ms presentation ***,no considerable differences are observed in the peak,average amplitude,and latency of pupil size,pupil velocity,and acceleration under 100-,150-,and 200-ms presentation *** results reveal that with the increase in the presentation rate,pupil dilation first increases,then decreases,and later reaches *** 80-ms presentation rate results in the largest point of pupil *** correlation is observed between pupil dilation and recognition accuracy under the five presentation rates.
The Internet of Things (IoT) and blockchain are two emerging information technologies that will significantly impact the lives and production patterns of people. When they meet together, blockchain services can be use...
详细信息
Direct teleoperation of robots in unstructured environments by non-experts often leads to low efficiency and increased risk. To this end, this paper proposes a shared control architecture where the robot can generaliz...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ...
详细信息
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often *** is frequently assumed that vehicles can be accurately modeled during actual motion ***,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network *** into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading *** optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming *** to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and ***,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization *** results show that the algorithm proposed in this paper is able to achieve lower latency task computation ***,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).
Visual object tracking can be divided into the object classification and bounding-box regression tasks, but only one sharing correlation map leads to inaccuracy. Siamese trackers compute correlation map by cross-corre...
详细信息
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in...
详细信息
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated *** article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic *** propose a novel cryptographic approach underpinned by theoretical frameworks and practical *** to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information *** method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key *** also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and *** gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various ***,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing ***,with integrity metrics at 9.35,the protocol’s resilience is further *** metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
With the development of vehicles towards intelligence and connectivity,vehicular data is diversifying and growing dramatically.A task allocation model and algorithm for heterogeneous Intelligent Connected Vehicle(ICV)...
详细信息
With the development of vehicles towards intelligence and connectivity,vehicular data is diversifying and growing dramatically.A task allocation model and algorithm for heterogeneous Intelligent Connected Vehicle(ICV)applications are proposed for the dispersed computing network composed of heterogeneous task vehicles and Network Computing Points(NCPs).Considering the amount of task data and the idle resources of NCPs,a computing resource scheduling model for NCPs is *** the heterogeneous task execution delay threshold as a constraint,the optimization problem is described as the problem of maximizing the utilization of computing resources by *** proposed problem is proven to be NP-hard by using the method of reduction to a 0-1 knapsack problem.A many-to-many matching algorithm based on resource preferences is *** algorithm first establishes the mutual preference lists based on the adaptability of the task requirements and the resources provided by *** enables the filtering out of un-schedulable NCPs in the initial stage of matching,reducing the solution space *** solve the matching problem between ICVs and NCPs,a new manyto-many matching algorithm is proposed to obtain a unique and stable optimal matching *** simulation results demonstrate that the proposed scheme can improve the resource utilization of NCPs by an average of 9.6%compared to the reference scheme,and the total performance can be improved by up to 15.9%.
Partition testing is one of the most fundamental and popularly used software testing *** first di-vides the input domain of the program under test into a set of disjoint partitions,and then creates test cases based on...
详细信息
Partition testing is one of the most fundamental and popularly used software testing *** first di-vides the input domain of the program under test into a set of disjoint partitions,and then creates test cases based on these *** by the theory of software cybernetics,some strategies have been proposed to dynamically se-lect partitions based on the feedback information gained during *** basic intuition of these strategies is to assign higher probabilities to those partitions with higher fault-detection potentials,which are judged and updated mainly ac-cording to the previous test *** a feedback-driven mechanism can be considered as a learning process—it makes decisions based on the observations acquired in the test ***,advanced learning techniques could be leveraged to empower the smart partition selection,with the purpose of further improving the effectiveness and efficiency of partition *** this paper,we particularly leverage reinforcement learning to enhance the state-of-the-art adaptive partition testing *** algorithms,namely RLAPT_Q and RLAPT_S,have been developed to implement the proposed *** studies have been conducted to evaluate the performance of the proposed approach based on seven object programs with 26 *** experimental results show that our approach outperforms the existing partition testing techniques in terms of the fault-detection capability as well as the overall testing *** study demonstrates the applicability and effectiveness of reinforcement learning in advancing the performance of software testing.
暂无评论