Recent years have seen significant studies into applying machine learning techniques for stock price prediction. However, most existing work in this field focuses on examining historical stock price data for forecasti...
详细信息
Increasing demand for spectrum causes the emergence of technologies like Cognitive Radio (CR). The resources like bandwidth and energy are primarily shared by the primary and secondary users in the CR network. The uti...
详细信息
The design simulation and manufacturing of an x-band frequency uneven amplitude 90° hybrid coupler are described in this paper. This hybrid coupler is used to create a feeder network with eight output ports opera...
详细信息
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
Next-generation technologies aim to achieve highly efficient communication systems in the evolving wireless communication landscape. Among these, intelligent reflective surfaces (IRS) are expected to play a pivotal ro...
详细信息
By incorporating caching functions into Low Earth Orbit (LEO) satellites, users worldwide can benefit from caching services. However, satellite caching faces the following challenges: 1) The continuous mobility of sat...
详细信息
Due to the vast development of medical image technologies the orientation, dimension, and format of the medical images are changing drastically. The volume of these data is also changing drastically in the current sce...
详细信息
This paper discusses the design and analysis of circular shaped reconfigurable multiple-input and multiple-output (MIMO) antenna having inverted ohm-shaped slots with enhanced performance in wireless applications. Thi...
详细信息
A secure IoT system can provide end-to-end encryption, secure communication protocols, mechanisms for access control, and intrusion detection and prevention systems to protect against various cyber threats. This paper...
详细信息
暂无评论