Pairwise similarity has been widely used for image classification by propagating the class information from labeled images to unlabeled images and predicting the classes of unlabeled images accordingly. Although widel...
详细信息
In the era of big data,there is an urgent need to establish data trading markets for effectively releasing the tremendous value of the drastically explosive *** security and data pricing,however,are still widely regar...
详细信息
In the era of big data,there is an urgent need to establish data trading markets for effectively releasing the tremendous value of the drastically explosive *** security and data pricing,however,are still widely regarded as major challenges in this respect,which motivate this research on the novel multi-blockchain based framework for data trading markets and their associated pricing *** this context,data recording and trading are conducted separately within two separate blockchains:the data blockchain(DChain) and the value blockchain(VChain).This enables the establishment of two-layer data trading markets to manage initial data trading in the primary market and subsequent data resales in the secondary ***,pricing mechanisms are then proposed to protect these markets against strategic trading behaviors and balance the payoffs of both suppliers and ***,in regular data trading on VChain-S2D,two auction models are employed according to the demand scale,for dealing with users’ strategic *** incentive-compatible Vickrey-Clarke-Groves(VCG)model is deployed to the low-demand trading scenario,while the nearly incentive-compatible monopolistic price(MP) model is utilized for the high-demand trading *** temporary data trading on VChain-D2S,a reverse auction mechanism namely two-stage obscure selection(TSOS) is designed to regulate both suppliers’ quoting and users’ valuation ***,experiments are carried out to demonstrate the strength of this research in enhancing data security and trading efficiency.
Camouflaged object detection (COD) remains a challenging task in computer vision. Existing methods often resort to additional branches for edge supervision, incurring substantial computational costs. To address this, ...
详细信息
With the rapid development of cloud computing and control theory,a new paradigm of networked controlsystems named cloud controlsystems has been proposed to satisfy the requirements of large-scale and complex *** is ...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
With the rapid development of cloud computing and control theory,a new paradigm of networked controlsystems named cloud controlsystems has been proposed to satisfy the requirements of large-scale and complex *** is critical to manage large-scale tasks with personalized needs on the large number of heterogeneous ***,current TCP/IPbased addressing approach does not consider the runtime constraints of tasks,resulting highly concurrent service search,and communication between tasks will become the system *** this paper,we propose a task property encoding method which takes multi-dimensional properties into *** on the proposed encoding method,we design a uniform addressing method for tasks in the ***,we experimentally demonstrate the effectiveness of task property encoding,and the unified addressing method for tasks is more effective than other methods in the case of high task concurrency.
To improve the operation efficiency and real-time scheduling capability of existing industrial control network systems, based on the existing industrial real-time Ethernet communication protocol technology, an industr...
详细信息
In the human pose estimation task, on the one hand, 3-D pose always has difficulty in dividing different 2-D poses if the view is limited;on the other hand, it is hard to reduce the lifting ambiguity because of the la...
详细信息
The paper considers a mathematical model for managing a scientific digital ecosystem exemplified by the agriculture case;the model enables assessing the impact science exerts on the regions' socioeconomic position...
详细信息
Changes in coal seam hardness cause fluctuations in the feed resistance at the drill bit during the drilling process, leading to unstable feeding speed. This paper proposes a robust dynamic output feedback controller ...
详细信息
To realize the high-precision clock synchronization of various types of control equipment in the industrial process control network, a high-precision clock synchronizing system is designed and implemented. The system ...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
暂无评论