Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has been known about the underlying relationships and how they reflect(or affect) user behaviors. To fill this gap, we characterize the app recommendation relationships in the i OS app store from the perspective of the complex network. We collect a dataset containing over 1.3 million apps and 50 million app recommendations. This dataset enables us to construct a complex network that captures app recommendation relationships. Through this, we explore the recommendation relationships between mobile apps and how these relationships reflect or affect user behavior patterns. The insights gained from our research can be valuable for understanding typical user behaviors and identifying potential policy-violating apps.
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
The article investigates the issue of fixed-time control with adaptive output feedback for a twin-roll inclined casting system (TRICS) with disturbance. First, by using the mean value theorem, the nonaffine functions ...
详细信息
Recent mainstream image captioning methods usually adopt two-stage captioners, i.e., calculating the object features of the given image by a pre-trained detector and then feeding them into a language model to generate...
详细信息
Federated Learning (FL) is a distributed privacy-protecting machine learning paradigm that enables collaborative training among multiple parties without the need to share raw data. This mode of training renders FL par...
详细信息
Due to limited memory and computing resources, the application of deep neural networks on embedded and mobile devices is still a great challenge. To tackle this problem, this paper proposes a lightweight super-resolut...
详细信息
In the education sector, an increasing amount of research is beginning to explore the application of blockchain technology to credit banks. This paper proposes a consortium blockchain consensus mechanism tailored for ...
详细信息
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexit...
详细信息
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexity of IoT systems,the stability and security issues of IoT systems have become increasingly ***,it is crucial to detect anomalies in the collected IoT time series from various ***,deep learning models have been leveraged for IoT anomaly ***,owing to the challenges associated with data labeling,most IoT anomaly detection methods resort to unsupervised learning ***,the absence of accurate abnormal information in unsupervised learning methods limits their *** address these problems,we propose AS-GCN-MTM,an adaptive structural Graph Convolutional Networks(GCN)-based framework using a mean-teacher mechanism(AS-GCN-MTM)for anomaly *** performs better than unsupervised methods using only a small amount of labeled *** Teachers is an effective semi-supervised learning method that utilizes unlabeled data for training to improve the generalization ability and performance of the ***,the dependencies between data are often unknown in time series *** solve this problem,we designed a graph structure adaptive learning layer based on neural networks,which can automatically learn the graph structure from time series *** not only better captures the relationships between nodes but also enhances the model’s performance by augmenting key *** have demonstrated that our method improves the baseline model with the highest F1 value by 10.4%,36.1%,and 5.6%,respectively,on three real datasets with a 10%data labeling rate.
The exponential growth of IoT devices has led to the proposal of edge computing for data processing. The decentralized nature of edge computing servers and IoT devices makes blockchain ideal for connecting IoT users a...
详细信息
暂无评论