With the rise of multi-modal large language models, accurately extracting and understanding textual information from video content-referred to as video-based optical character recognition (Video OCR)-has become a cruc...
详细信息
In multi-institutional patient data sharing scenarios, maintaining fine-grained access control while safeguarding privacy and adapting to real-world environments is crucial. Traditional attribute-based encryption (ABE...
详细信息
Automation is one of the key drivers in today's global economy. It ensures the conduction of a manifold of standardized processes which helps tackle the decreasing amount of skilled workers in certain areas as wel...
详细信息
The deviation in wall thickness caused by core shift during the investment casting process significantly impacts the strength and service life of hollow turbine *** address this issue,a core shift limitation method is...
详细信息
The deviation in wall thickness caused by core shift during the investment casting process significantly impacts the strength and service life of hollow turbine *** address this issue,a core shift limitation method is developed in this ***,a shift model is established based on computational fluid dynamics and motion simulation to predict the movement of the ceramic core in investment casting ***,utilizing this model,an optimization method for fixturing layout inside the refractory ceramic shell is devised for the ceramic *** casting experiment demonstrates that by utilizing the optimized fixture layout,not only can core shift during the investment casting pouring process be effectively controlled,but also the maximum wall thickness error of the blade can be reduced by 42.02%.In addition,the core shift prediction is also validated,with a prediction error of less than 26.9%.
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use...
详细信息
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the user accessing the cloud services. The conventional cryptographic algorithms used to provide security mechanisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks. Therefore,developing new solutions based on different mechanisms from traditional cryptography methods is required to protect data and users' privacy from attacks. Different from the conventional cryptography method, we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper. We use visual cryptography to encrypt and decrypt the secret images. The mutual authentication is based on two secret images and *** user requests the ticket from the authentication server(AS) to obtain the permission for accessing the cloud services. Three shared secret keys are used for encrypting and decrypting the authentication process. We analyze the protocol using the Barrows-Abadi-Needham(BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks. Also, it can provide a secure mutual authentication mechanism.
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important...
详细信息
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important communication scenarios in a wireless *** this paper,we consider the effects of the Rician fading channel on the performance of cooperative device-to-device(D2D)communication with *** better performance,we maximize and examine the system’s minimal rate of D2D *** to the interference in D2D communication,the problem of maximizing the minimum rate becomes non-convex and difficult to *** solve this problem,a learning-to-optimize-based algorithm is proposed to find the optimal power *** conventional branch and bound(BB)algorithm are used to learn the optimal pruning policy with supervised *** learning is used to train the multiple *** address the imbalanced problem,we used the supervised undersampling *** are made with the conventional BB algorithm and the heuristic *** outcome of the simulation demonstrates a notable performance improvement in power *** proposed algorithm has significantly low computational complexity and runs faster as compared to the conventional BB algorithm and a heuristic algorithm.
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not...
详细信息
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well *** instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious ***,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity ***,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs *** this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled *** security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium b
There are many opportunities and advantages that cloud computing adoption can bring to the healthcare field, as experts believe that it can help improve the level of healthcare services significantly and contribute to...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this pa...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this paper proposes a network attack-defense game model(ADGM).Firstly,based on the assumption of incomplete information between the two sides of the game,the ADGM model is established,and methods of payoff quantification,equilibrium solution,and determination of strategy confrontation results are ***,drawing on infectious disease dynamics,the network attack-defense situation is defined based on the density of nodes in various security states,and the transition paths of network node security states are ***,the network zero-day virus attack-defense behaviors are analyzed,and comparative experiments on the attack-defense evolution trends under the scenarios of different strategy combinations,interference methods,and initial numbers are conducted using the NetLogo simulation *** experimental results indicate that this model can effectively analyze the evolution of the macro-level network attack-defense situation from the micro-level attack-defense *** instance,in the strategy selection experiment,when the attack success rate decreases from 0.49 to 0.29,the network destruction rate drops by 11.3%,in the active defense experiment,when the interference coefficient is reduced from 1 to 0.7,the network destruction rate decreases by 7%,and in the initial node number experiment,when the number of initially infected nodes increases from 10 to 30,the network destruction rate rises by 3%.
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
暂无评论