With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
Modifying a code segment may give rise to a consistency issue when the code segment belongs to a clone group comprising closely similar code *** studies have demonstrated that such consistent changes can incur extra m...
详细信息
Modifying a code segment may give rise to a consistency issue when the code segment belongs to a clone group comprising closely similar code *** studies have demonstrated that such consistent changes can incur extra maintenance costs when clones are checked for consistency and introduce defects if developers forget to change clones consistently when *** address this problem,researchers have proposed an approach to predict clone consistency in advance with handcrafted attributes,notably using machine learning *** these attributes can help predict clone consistency to some extent,the capability of such an approach is generally weak and unsatisfactory in *** limitations in capability are especially severe at a project's infancy stage when there is not sufficient within-project data to model clone consistency behavior,and cross-project data have not been helpful in supporting *** this paper,we propose the Clone Hierarchical Attention Neural Network(CHANN)to represent code clones and their evolution by adopting a hierarchical perspective of code,context,and code evolution,and thus enhancing the effectiveness of clone con-sistency *** assess the effectiveness of CHANN,we conduct experiments on the dataset collected from eight open-source *** experimental results show that CHANN is highly effective in predicting clone consistency,and the precision,recall,and F-measure attained in prediction are around 82%.These findings support our hypothesis that the hierarchical neural network can help developers predict clone consistency effectively in the case of cross-project incubation when insufficient data are available at the early stage of software development.
In the industrial Internet of things(IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional...
详细信息
In the industrial Internet of things(IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional network architectures. Therefore, deploying software-defined network(SDN) in IIoT is essential to defend against various attacks. However, SDN has a drawback: there is a security problem of distributed denial-ofservice(DDoS) attacks at the control layer. This paper proposes an effective solution: DDoS detection within the domain using tri-entropy in information theory. The detected attacks are then uploaded to a smart contract in the blockchain, so that the attacks can be quickly cut off even if the same attack occurs in different domains. Experimental validation was conducted under different attack strengths and multiple identical attacks, and the results show that the method has better detection ability under different attack strengths and can quickly block the same attacks.
Semi-supervised learning (SSL) aims to reduce reliance on labeled data. Achieving high performance often requires more complex algorithms, therefore, generic SSL algorithms are less effective when it comes to image cl...
详细信息
Emotion recognition plays a crucial role in various fields and is a key task in natural language processing (NLP). The objective is to identify and interpret emotional expressions in text. However, traditional emotion...
详细信息
Emotion recognition plays a crucial role in various fields and is a key task in natural language processing (NLP). The objective is to identify and interpret emotional expressions in text. However, traditional emotion recognition approaches often struggle in few-shot cross-domain scenarios due to their limited capacity to generalize semantic features across different domains. Additionally, these methods face challenges in accurately capturing complex emotional states, particularly those that are subtle or implicit. To overcome these limitations, we introduce a novel approach called Dual-Task Contrastive Meta-Learning (DTCML). This method combines meta-learning and contrastive learning to improve emotion recognition. Meta-learning enhances the model’s ability to generalize to new emotional tasks, while instance contrastive learning further refines the model by distinguishing unique features within each category, enabling it to better differentiate complex emotional expressions. Prototype contrastive learning, in turn, helps the model address the semantic complexity of emotions across different domains, enabling the model to learn fine-grained emotions expression. By leveraging dual tasks, DTCML learns from two domains simultaneously, the model is encouraged to learn more diverse and generalizable emotions features, thereby improving its cross-domain adaptability and robustness, and enhancing its generalization ability. We evaluated the performance of DTCML across four cross-domain settings, and the results show that our method outperforms the best baseline by 5.88%, 12.04%, 8.49%, and 8.40% in terms of accuracy.
The detection of road defects is crucial for ensuring vehicular safety and facilitating the prompt repair of roadway imperfections. Existing YOLOv8-based models face the following issues: extraction capabilities and i...
详细信息
Traditional autonomous driving usually requires a large number of vehicles to upload data to a central server for training. However, collecting data from vehicles may violate personal privacy as road environmental inf...
详细信息
In order to address the issue of achieving comprehensive coverage in corridor scanning path planning for unmanned aerial vehicles (UAVs) in multi-area mapping, a Dual-Sequence Multi-Scan Corridor Planning Method (DSMC...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
With the wide application of distributed systems, complex transaction processing involving multiple nodes has become an important challenge. The difficulty lies in how to ensure the data consistency of each node and h...
详细信息
暂无评论