• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索
高影响力成果及被引频次趋势图 关键词云图及合作者关系图

您的检索:

学者姓名:公备

精炼检索结果:

来源

应用 展开

合作者

应用 展开

语言

应用

清除所有精炼条件

排序方式:
默认
  • 默认
  • 标题
  • 年份
  • WOS被引数
  • 影响因子
  • 正序
  • 倒序
< 页,共 9 >
Anonymous Traceability protocol based on Group Signature for Blockchain SCIE
期刊论文 | 2022 , 127 , 160-167 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
WoS核心集被引次数: 6
摘要&关键词 引用

摘要 :

In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the users' personal information through data analysis. Among the existing privacy protection technologies, the scheme based on group signature has good anonymity, but the existing scheme exists a large number of operations that are difficult to apply to wireless terminals. In this paper, using the powerful offloading capability of edge computing, we propose a blockchain node traceable identity privacy technology scheme based on threshold group signature, and the scheme greatly reduces the computing burden of nodes while achieving node privacy protection. (C) 2021 Elsevier B.V. All rights reserved.

关键词 :

Blockchain Blockchain Signature Signature Traceability Traceability

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Gong, Bei , Cui, Chi , Hu, Mingsheng et al. Anonymous Traceability protocol based on Group Signature for Blockchain [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 160-167 .
MLA Gong, Bei et al. "Anonymous Traceability protocol based on Group Signature for Blockchain" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 160-167 .
APA Gong, Bei , Cui, Chi , Hu, Mingsheng , Guo, Chong , Li, Xiaochong , Ren, Yuheng . Anonymous Traceability protocol based on Group Signature for Blockchain . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 160-167 .
导入链接 NoteExpress RIS BibTex
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things SCIE
期刊论文 | 2022 , 127 , 23-30 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
WoS核心集被引次数: 26
摘要&关键词 引用

摘要 :

The encryption and signature schemes based on traditional public key are no longer applicable for devices with limited hardware and software resources in the Internet of Things (IoT), since those schemes consume too much hardware and software. To ensure the security and efficiency of data transmission, we construct a secure and lightweight certificateless hybrid signcryption scheme for Compared with the existing schemes, this scheme only needs one bilinear calculation for one communication, which is computationally efficient for protecting the secure communication between nodes with limited resources in IoT. To meet the security requirements of the complex IoT, based on difficult problem assumption of bilinear pairings, this scheme can simultaneously meet security requirements of the IoT such as confidentiality, unforgability, semipublic verification, forward security known session-specific temporary information security. In addition, we prove the security and correctness of this scheme in Random Oracle Model (ROM). (C) 2021 Elsevier B.V. All rights reserved.

关键词 :

Certificateless hybrid signcryption Certificateless hybrid signcryption Internet of Things Internet of Things Random oracle mode Random oracle mode

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Gong, Bei , Wu, Yong , Wang, Qian et al. A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 23-30 .
MLA Gong, Bei et al. "A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 23-30 .
APA Gong, Bei , Wu, Yong , Wang, Qian , Ren, Yu-heng , Guo, Chong . A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 23-30 .
导入链接 NoteExpress RIS BibTex
新型智慧城市中的可信任机理研究
期刊论文 | 2021 , (04) , 60-63 | 华东科技
摘要&关键词 引用

摘要 :

<正>新型智慧城市作为我国城市现代化和信息化的最新产物,具有很高的科学价值和经济价值。为构建人机物有机融合的新型智慧城市,需要可信智能系统服务的支撑,但城市环境的复杂多变,导致了人机物可信管控困难,对精准决策、数据共享及隐私保护带来了严峻挑战。面对复杂多变的城市环境,为保障新型智慧城市中由内而外的安全可信,可信任技术成为新型智慧城市快速发展和成功应用中必不可少的一环。

关键词 :

新型智慧城市 新型智慧城市 信任度量 信任度量 数据聚合 数据聚合

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 公备 , 张雷 . 新型智慧城市中的可信任机理研究 [J]. | 华东科技 , 2021 , (04) : 60-63 .
MLA 公备 et al. "新型智慧城市中的可信任机理研究" . | 华东科技 04 (2021) : 60-63 .
APA 公备 , 张雷 . 新型智慧城市中的可信任机理研究 . | 华东科技 , 2021 , (04) , 60-63 .
导入链接 NoteExpress RIS BibTex
STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n SCIE
期刊论文 | 2021 , 10 (2) , 321-331 | EVOLUTION EQUATIONS AND CONTROL THEORY
摘要&关键词 引用

摘要 :

In this article, we consider the transmission wave/plate equation with variable coefficients on R-n(n >= 3). By virtue of the Morawetz multipliers in non Euclidean geometries and compactness-uniqueness arguments, we obtain some stability result of the transmission wave/plate system under suitable geometric conditions.

关键词 :

stabilization stabilization variable coefficients variable coefficients wave/plate equation wave/plate equation Riemannian geometry Riemannian geometry

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Gong, Bei , Ning, Zhen-Hu , Yang, Fengyan . STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n [J]. | EVOLUTION EQUATIONS AND CONTROL THEORY , 2021 , 10 (2) : 321-331 .
MLA Gong, Bei et al. "STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n" . | EVOLUTION EQUATIONS AND CONTROL THEORY 10 . 2 (2021) : 321-331 .
APA Gong, Bei , Ning, Zhen-Hu , Yang, Fengyan . STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n . | EVOLUTION EQUATIONS AND CONTROL THEORY , 2021 , 10 (2) , 321-331 .
导入链接 NoteExpress RIS BibTex
Trusted data collection for Internet of Things EI
期刊论文 | 2021 , 33 (10) | Concurrency Computation
摘要&关键词 引用

摘要 :

Trusted date collection is the precondition of the security of Internet of Things (IOT). Recently, compressed sensing technology, which can enable the reduction of the energy consumption and time delay of data collection, has been extensively studied in IOT; However, the security of compressed sensing technology in IOT has not been sufficiently considered. Since compressed sensing depends the cooperation between IOT nodes and then sensing data is transparent for all IOT nodes, which is subjected to malicious nodes attack. Therefore, we propose a trusted data collection scheme based on compressed sensing oriented to the IOT. When data collection is tampered with, the scheme can detect malicious nodes. Experiments demonstrate that the proposed scheme can ensure data security with a low energy consumption. © 2021 John Wiley & Sons, Ltd.

关键词 :

Compressed sensing Compressed sensing Data acquisition Data acquisition Energy utilization Energy utilization Internet of things Internet of things Trusted computing Trusted computing

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Ning, Zhenhu , Gong, Bei , Xu, Meng et al. Trusted data collection for Internet of Things [J]. | Concurrency Computation , 2021 , 33 (10) .
MLA Ning, Zhenhu et al. "Trusted data collection for Internet of Things" . | Concurrency Computation 33 . 10 (2021) .
APA Ning, Zhenhu , Gong, Bei , Xu, Meng , Zhou, Caiqiu . Trusted data collection for Internet of Things . | Concurrency Computation , 2021 , 33 (10) .
导入链接 NoteExpress RIS BibTex
基于卷积神经网络的加密流量实时分类方法及装置 incoPat
专利 | 2021-01-21 | CN202110081372.1
摘要&关键词 引用

摘要 :

本发明提供一种基于卷积神经网络的加密流量实时分类方法及装置,该方法包括:在每一条加密流量中采样预设数量的数据包;将采样得到的数据包作为字节流,任意相连两个字节作为一个字节对,并确定所有字节对的频率特征;将所有字节对的频率特征,输入预训练的卷积神经网络模型,输出每一条加密流量的数据流类型。该方法对加密流量的原始字节信息采用基于频率特征的表示,而非原始字节直接构造输入特征,从而使卷积神经网络的学习效果加强,分类准确度更高。此外,采样的数据包数量可以根据实际流量捕获情况调整,而不需要重新设计网络模型的结构,具有更好的适用性。由于采用了字节对的频率特征,从而分类所需数据包少,有利于数据分类的实时性。

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 张建标 , 赵宝霖 , 公备 . 基于卷积神经网络的加密流量实时分类方法及装置 : CN202110081372.1[P]. | 2021-01-21 .
MLA 张建标 et al. "基于卷积神经网络的加密流量实时分类方法及装置" : CN202110081372.1. | 2021-01-21 .
APA 张建标 , 赵宝霖 , 公备 . 基于卷积神经网络的加密流量实时分类方法及装置 : CN202110081372.1. | 2021-01-21 .
导入链接 NoteExpress RIS BibTex
一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法 incoPat
专利 | 2021-02-09 | CN202110182166.X
摘要&关键词 引用

摘要 :

本发明公开了一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法,构建恶意代码生成模型。采用群智能算法计算恶意代码的可接受最佳初始样本比例。生成各家族恶意代码,构建相对均衡的恶意代码数据集。本发明利用群智能算法获得各恶意代码家族的可接受最佳样本比例,同时引入cGAN对恶意代码不同家族的数据分布进行学习并进行样本生成,最后对不平衡数据集进行处理,构建各类样本相对均衡的恶意代码数据集,使不同种类的恶意代码在选取时达到一个理想的比例,使正负样本在训练过程中具有相同的地位,更有效的解决了数据不均衡的问题。

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 梁军淼 , 宁振虎 , 曹东芝 et al. 一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法 : CN202110182166.X[P]. | 2021-02-09 .
MLA 梁军淼 et al. "一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法" : CN202110182166.X. | 2021-02-09 .
APA 梁军淼 , 宁振虎 , 曹东芝 , 公备 . 一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法 : CN202110182166.X. | 2021-02-09 .
导入链接 NoteExpress RIS BibTex
A trusted behaviour measurement scheme based on feedback and control in trusted network EI
期刊论文 | 2021 , 20 (2) , 99-106 | International Journal of Wireless and Mobile Computing
摘要&关键词 引用

摘要 :

To solve the real-time trusted measurement of user behaviour in trusted networks, a new combination of dynamic and static, subjective and objective behaviour trusted measurement scheme is presented. The scheme analyses the credibility of the real-time user state and the direct trusted measurement value of the user behaviour, and finally controls the user behaviour by the feedback measurement of the user behaviour. The research results show that when the ratio of untrusted nodes is 15%, 30% and 50%, the trusted detection rate of this paper can reach more than 92%, and the untrusted node in trusted network can be identified with the increase of time. Compared with traditional measurement scheme, the scheme can be more accurate and reasonable to calculate the credibility of user behaviour, and can reflect the changes of the credibility of users’ actual behaviour at all times, and ultimately implement the feedback control on user behaviour. Copyright © 2021 Inderscience Enterprises Ltd.

关键词 :

Behavioral research Behavioral research Feedback Feedback

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Zhuang, Junxi , Zhao, Xu , Gong, Bei et al. A trusted behaviour measurement scheme based on feedback and control in trusted network [J]. | International Journal of Wireless and Mobile Computing , 2021 , 20 (2) : 99-106 .
MLA Zhuang, Junxi et al. "A trusted behaviour measurement scheme based on feedback and control in trusted network" . | International Journal of Wireless and Mobile Computing 20 . 2 (2021) : 99-106 .
APA Zhuang, Junxi , Zhao, Xu , Gong, Bei , Zhan, Jing . A trusted behaviour measurement scheme based on feedback and control in trusted network . | International Journal of Wireless and Mobile Computing , 2021 , 20 (2) , 99-106 .
导入链接 NoteExpress RIS BibTex
Construction of Trusted Routing Based on Trust Computation EI
期刊论文 | 2021 , 2021 | Wireless Communications and Mobile Computing
摘要&关键词 引用

摘要 :

In the field of applied IoT, a large number of wireless sensor devices are tasked with data production and collection, providing IoT subjects with a large amount of basic data to support top-level IoT applications. However, there is a considerable risk of being attacked on such sensor networks that are organized in a wireless form. These relatively independent network devices have extremely limited performance and lifetime, a problem that can be supplemented in a centralized network with base stations by relying on the performance of the core nodes of the network, but in a decentralized self-organizing network, they can have a serious adverse impact on the implementation of security solutions. Considering the fundamental nature of the data generated by such end devices in IoT application services, the protection of their security is also directly related to the quality of upper layer services provided. The main research result of this paper is the design of a trust routing scheme for self-organizing networks. The scheme is based on a comprehensive evaluation of data transmission rate, transmission delay, and other factors related to the operation status of the self-organized network and improves the efficiency of the overall work of the self-organized network by reducing the performance consumption of individual nodes of the self-organized network and balancing the network load. © 2021 Bei Gong et al.

关键词 :

Internet of things Internet of things Wireless sensor networks Wireless sensor networks

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Gong, Bei , Zhu, Jingxuan , Wang, Yubo . Construction of Trusted Routing Based on Trust Computation [J]. | Wireless Communications and Mobile Computing , 2021 , 2021 .
MLA Gong, Bei et al. "Construction of Trusted Routing Based on Trust Computation" . | Wireless Communications and Mobile Computing 2021 (2021) .
APA Gong, Bei , Zhu, Jingxuan , Wang, Yubo . Construction of Trusted Routing Based on Trust Computation . | Wireless Communications and Mobile Computing , 2021 , 2021 .
导入链接 NoteExpress RIS BibTex
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence EI
期刊论文 | 2021 , 114 | Journal of Systems Architecture
摘要&关键词 引用

摘要 :

Multi-agent decision making is a fundamental problem in edge intelligence. In this paper, we study this problem for IoT networks under the distributed Multi-Armed Bandits (MAB) model. Most of existing works for distributed MAB demand long-time stable networks connected by powerful devices and hence may not be suitable for mobile IoT networks with harsh IoT constraints. To meet the challenge of resource constraints in mobile IoT environment, we propose a lightweight and robust learning algorithm in a dynamic network allowing topology changes. In our model, each agent is assumed to have only limited memory and communicate with each other asynchronously. Moreover, we assume that the bandwidth for exchanging information is limited and each agent can transmit O(log2K) bits (K denotes the number of arms) per communication. Rigorous analysis shows that despite these harsh constraints, the best arm/option can be identified collaboratively by the agents and the algorithm converges efficiently. Extensive experiments illustrate that the proposed algorithm exhibits good efficiency and stability in mobile settings. © 2020

关键词 :

Decision making Decision making Internet of things Internet of things Learning algorithms Learning algorithms Multi agent systems Multi agent systems

引用:

复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。

GB/T 7714 Chen, Shuzhen , Tao, Youming , Yu, Dongxiao et al. Distributed learning dynamics of Multi-Armed Bandits for edge intelligence [J]. | Journal of Systems Architecture , 2021 , 114 .
MLA Chen, Shuzhen et al. "Distributed learning dynamics of Multi-Armed Bandits for edge intelligence" . | Journal of Systems Architecture 114 (2021) .
APA Chen, Shuzhen , Tao, Youming , Yu, Dongxiao , Li, Feng , Gong, Bei . Distributed learning dynamics of Multi-Armed Bandits for edge intelligence . | Journal of Systems Architecture , 2021 , 114 .
导入链接 NoteExpress RIS BibTex
每页显示 10| 20| 50 条结果
< 页,共 9 >

导出

数据:

选中

格式:
在线人数/总访问数:396/2884175
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司