The increasing adoption of blockchain technology has underscored the need for cross-chain systems that enable seamless communication among multiple BC networks. Achieving cross-chain interoperability, which ensures se...
详细信息
As more users seek generative AI (GAI) models to enhance work efficiency, GAI and Model-as-a-Service will drive transformative changes and upgrades across all industries. However, when users utilize GAI models provide...
详细信息
The manual process of evaluating answer scripts is strenuous. Evaluators use the answer key to assess the answers in the answer scripts. Advancements in technology and the introduction of new learning paradigms need a...
详细信息
Heterogeneous Graph Neural Networks are an efficient and powerful tool for modeling graph structure data in recommendation systems. However, existing heterogeneous graph neural networks often fail to model the depende...
详细信息
Autonomous underwater vehicles(AUVs) have attracted considerable attention due to their vast potential applications, such as offshore oil exploration, underwater rescue, military reconnaissance, and marine scientific ...
详细信息
Autonomous underwater vehicles(AUVs) have attracted considerable attention due to their vast potential applications, such as offshore oil exploration, underwater rescue, military reconnaissance, and marine scientific research.
In this article, the data-driven event-triggered control is addressed for unknown discrete-time neural networks (DTNNs) under actuator saturation and external perturbation. The research problem is raised due to the fo...
详细信息
With the evolution of next-generation communication networks, ensuring robust Core Network(CN) architecture and data security has become paramount. This paper addresses critical vulnerabilities in the architecture of ...
详细信息
With the evolution of next-generation communication networks, ensuring robust Core Network(CN) architecture and data security has become paramount. This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks. Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS) attacks, particularly in roaming scenarios where there is also a risk of private data leakage, which imposes significant operational demands. To address these issues, we introduce the Blockchain-Enhanced Core Network Architecture(BECNA) and the Secure Decentralized Identity Authentication Scheme(SDIDAS). The BECNA utilizes blockchain technology to decentralize data storage, enhancing network security, stability, and reliability by mitigating Single Points of Failure(SPoF). The SDIDAS utilizes Decentralized Identity(DID) technology to secure user identity data and streamline authentication in roaming scenarios, significantly reducing the risk of data breaches during cross-network transmissions. Our framework employs Ethereum, free5GC, Wireshark, and UERANSIM tools to create a robust, tamper-evident system model. A comprehensive security analysis confirms substantial improvements in user privacy and network security. Simulation results indicate that our approach enhances communication CNs security and reliability, while also ensuring data security.
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,...
详细信息
The accurate positioning of the specular point of the spaceborne global navigation satellite system reflectometry (GNSS-R) receiver is a key step in using GNSS-R technology for geophysical parameter retrieval. As GNSS...
详细信息
The rapid spread of misinformation in the digital age highlights the need for effective fake news classification systems. This research evaluates classification methods using multiple datasets, which present distinct ...
详细信息
暂无评论