Traffic encryption is widely used to protect communication privacy but is increasingly exploited by attackers to conceal malicious activities. Existing malicious encrypted traffic detection methods rely on large amoun...
详细信息
The use of a single image restoration framework to achieve multi-task image restoration has garnered significant attention from researchers. However, several practical challenges remain, including meeting the specific...
详细信息
This paper proposes a visual image encryption algorithm based on 2D compressive sensing and variable threshold secret sharing, aiming to achieve efficient, secure, and flexible image encryption and decryption. Firstly...
详细信息
Space-Air-Ground integrated Vehicular Network(SAGVN)aims to achieve ubiquitous connectivity and provide abundant computational resources to enhance the performance and efficiency of the vehicular ***,there are still c...
详细信息
Space-Air-Ground integrated Vehicular Network(SAGVN)aims to achieve ubiquitous connectivity and provide abundant computational resources to enhance the performance and efficiency of the vehicular ***,there are still challenges to overcome,including the scheduling of multilayered computational resources and the scarcity of spectrum *** address these problems,we propose a joint Task Offloading(TO)and Resource Allocation(RA)strategy in SAGVN(namely JTRSS).This strategy establishes an SAGVN model that incorporates air and space networks to expand the options for vehicular TO,and enhances the edge-computing resources of the system by deploying edge *** minimize the system average cost,we use the JTRSS algorithm to decompose the original problem into a number of subproblems.A maximum rate matching algorithm is used to address the channel allocation and the Lagrangian multiplier method is employed for computational *** acquire the optimal TO decision,a differential fusion cuckoo search algorithm is *** simulation results demonstrate the significant superiority of the JTRSS algorithm in optimizing the system average cost.
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) fully discrete scheme with unconditional energy stability. Spatially the FEM is adopted, using a triangular mesh discretization strategy that can be adapted to complex regions. Temporally, the EIEQ approach is considered, which not only linearizes the nonlinear potential but also gives a new variable that we combine with the nonlocal splitting method to achieve the fully decoupled computation. The strategy can successfully transform the Allen-Cahn system into some completely independent algebraic equations and linear elliptic equations with constant coefficients, we only need to solve these simple equations at each time step. Moreover, we conducted some numerical experiments to demonstrate the effectiveness of the strategy.
Secure Aggregation (SA), in the Federated Learning (FL) setting, enables distributed clients to collaboratively learn a shared global model while keeping their raw data and local gradients private. However, when SA is...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
The number of Internet of Things (IoT) devices has increased rapidly in recent years, but lack effective methods to integrate their computational power. In this article, we propose NC-Load, which couples IoT devices i...
详细信息
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,wher...
详细信息
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog *** UE can select one of the fog nodes to offload its task,and each fog node may serve multiple *** tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul *** order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all *** min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a *** MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM *** addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the *** this model,a similar min-max latency optimization problem is formulated and tackled by the inexact *** results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart contracts with cryptographic capabilities. These APIs have been utilized in over 13.8% of Ethereum transactions, motivating de...
详细信息
暂无评论