To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important...
详细信息
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important communication scenarios in a wireless *** this paper,we consider the effects of the Rician fading channel on the performance of cooperative device-to-device(D2D)communication with *** better performance,we maximize and examine the system’s minimal rate of D2D *** to the interference in D2D communication,the problem of maximizing the minimum rate becomes non-convex and difficult to *** solve this problem,a learning-to-optimize-based algorithm is proposed to find the optimal power *** conventional branch and bound(BB)algorithm are used to learn the optimal pruning policy with supervised *** learning is used to train the multiple *** address the imbalanced problem,we used the supervised undersampling *** are made with the conventional BB algorithm and the heuristic *** outcome of the simulation demonstrates a notable performance improvement in power *** proposed algorithm has significantly low computational complexity and runs faster as compared to the conventional BB algorithm and a heuristic algorithm.
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not...
详细信息
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well *** instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious ***,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity ***,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs *** this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled *** security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium b
There are many opportunities and advantages that cloud computing adoption can bring to the healthcare field, as experts believe that it can help improve the level of healthcare services significantly and contribute to...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this pa...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this paper proposes a network attack-defense game model(ADGM).Firstly,based on the assumption of incomplete information between the two sides of the game,the ADGM model is established,and methods of payoff quantification,equilibrium solution,and determination of strategy confrontation results are ***,drawing on infectious disease dynamics,the network attack-defense situation is defined based on the density of nodes in various security states,and the transition paths of network node security states are ***,the network zero-day virus attack-defense behaviors are analyzed,and comparative experiments on the attack-defense evolution trends under the scenarios of different strategy combinations,interference methods,and initial numbers are conducted using the NetLogo simulation *** experimental results indicate that this model can effectively analyze the evolution of the macro-level network attack-defense situation from the micro-level attack-defense *** instance,in the strategy selection experiment,when the attack success rate decreases from 0.49 to 0.29,the network destruction rate drops by 11.3%,in the active defense experiment,when the interference coefficient is reduced from 1 to 0.7,the network destruction rate decreases by 7%,and in the initial node number experiment,when the number of initially infected nodes increases from 10 to 30,the network destruction rate rises by 3%.
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
作者:
Xie, YumiaoWei, LeSchool of Software Engineering
Chengdu University of Information Technology Chengdu China School of Software Engineering
Chengdu University of Information Technology Sichuan Manufacturing Information Industry Collaborative Innovation Center Automatic Software Generation & Intelligence Service Key Laboratory of Sichuan Province Chengdu China
Aiming at the problems of insufficient feature discrimination, difficulty in parameter adjustment, and lack of time dependence capture ability in the existing credit risk prediction models of listed companies, this pa...
详细信息
As big data and artificial intelligence continue to gain importance, the reliable quality of datasets has be-come a crucial factor in algorithm performance and result reliability. However, many datasets lack standardi...
详细信息
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
Emotions are intrinsic to human nature, playing a vital role in human cognition. Emotions are closely intertwined with rational decision-making, perception, human interaction, and human intelligence. EEG has emerged a...
详细信息
Fatigue driving is one of the main causes of traffic accidents. Effective fatigue driving detection technology can reduce traffic accidents caused by fatigue driving. Traditional fatigue driving detection methods usua...
详细信息
暂无评论