In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols b...
详细信息
The NOMA technology uses the power domain non-orthogonal multiplexing method to enable multiple users to occupy the entire frequency band simultaneously to transmit signals. In order to maximize the total transmission...
详细信息
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical *** blockchain-enabled Internet of Medical Things(BIoMT)has been developed to re...
详细信息
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical *** blockchain-enabled Internet of Medical Things(BIoMT)has been developed to reform traditional centralized medical system in recent *** paper first introduces a data anonymous authentication model to protect user privacy and medical data in ***,a proxy group signature(PGS)scheme has been proposed based on lattice *** scheme can well satisfy the anonymous authentication demand for the proposed model,and provide anti-quantum attack security for BIoMT in the future general quantum computer ***,the security analysis shows this PGS scheme is secure against the dynamical-almost-full anonymous and *** efficiency comparison shows the proposed model and PGS scheme is more efficient and practical.
Optimization theory assisted algorithms have received great attention for precoding design in multiuser multiple-input multiple-output (MU-MIMO) systems. Although the resultant optimization algorithms are able to prov...
详细信息
Recommender systems (RS) play a very important role in various aspects of people’s online life. Many companies leverage RS to help users discover new and favored items. Despite their empirical success, these systems ...
详细信息
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ...
详细信息
Objectives Network traffic classification (NTC) is crucial for network management. However, the surge in Internet traffic poses scalability and privacy issues. Researchers are turning to federated learning (FL) to tac...
Objectives Network traffic classification (NTC) is crucial for network management. However, the surge in Internet traffic poses scalability and privacy issues. Researchers are turning to federated learning (FL) to tackle these issues. Despite the importance of FL, there is lack of literature that comprehensively reviews its implementation and application within NTC and its impact on Sixth-Generation Wireless (6G) networks. Current surveys cover the technical aspects of NTC without fully addressing the integration of FL and its broader implications. This study aims to review the technical implementation of FL in NTC and its application to various network-related areas, including 6G. Methods This study presents a taxonomy for FL implementation in NTC, considering aspects such as learning and aggregation approaches, topology, and client operations. It examines the limitations of these elements and their effects on performance, efficiency, scalability, and their impact on 6G. This study outlines a taxonomy for FL applications, focusing on privacy preservation, scalable classification, and shared security intelligence. Novelty The proposed taxonomy provides insights into research landscape and highlights its limitations. The analysis of the impact of FL-based NTC on 6G provides insight into its integration and implementation challenges. This study discusses open issues and advocates for future research directions in FL for NTC, including 6G. Findings The study identifies areas needing improvement such as privacy, addressing security, single-point-of-failure, hardware limitations, delays and heterogeneity concerns. The findings of this paper show that an optimal implementation approach is essential to cater for heterogeneity and real-time requirements of the network environment.
We propose a geometry constrained network, termed GC-Net, for weakly supervised object localization (WSOL). GC-Net consists of three modules: a detector, a generator and a classifier. The detector predicts the object ...
详细信息
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our first main results are average-case algorithms for these problems. For example, we develop an algorithm that takes two ...
详细信息
暂无评论