您的检索:
学者姓名:蔡永泉
精炼检索结果:
年份
成果类型
收录类型
来源
综合
曾用名
合作者
语言
清除所有精炼条件
摘要 :
一种基于MEC的局部多车统一决策方法属于交通领域。所述的决策规划算法是运行在MEC上的,过高精度定位器、V2X通信、激光雷达、毫米波雷达以及摄像机等多种方法,获取到群组内的所有车辆的坐标位置、车辆的长宽、速度大小、以及车身倾斜程度等信息。将这些信息由中心车辆通过V2X通信传送给MEC服务器并由运行的遗传算法进行决策处理。然后,MEC服务器通过V2X将决策的结果发送给中心车辆,中心车辆再将各自的决策结果发给相应的车辆。本发明是一种更加智能、便捷且成本较低决策方法, 可以通过统一的综合规划一定范围内的所有车辆的决策,使得整个群组的决策达到最优,避免了各自规划导致的效率下降,有利于大规模地推广使用。
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 卢晓威 , 王健 , 邹炳宇 et al. 一种基于MEC的局部多车统一决策方法 : CN202010232742.2[P]. | 2020-03-28 . |
MLA | 卢晓威 et al. "一种基于MEC的局部多车统一决策方法" : CN202010232742.2. | 2020-03-28 . |
APA | 卢晓威 , 王健 , 邹炳宇 , 蔡永泉 . 一种基于MEC的局部多车统一决策方法 : CN202010232742.2. | 2020-03-28 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text steganography has a great challenge of security, robustness and size of stego text. In current studies, an improved, lightweight, secure, robust and size efficient technique is proposed for text steganography that also enhances the performance of existing approaches. To achieve the objectives, algorithm applies a conditional bit-complement function on binary value of confidential information. Moreover, start and end bits are also inserted during embedding secret information in cover text and confirms the integrity and confidentiality of secret data. Experimental results revealed that projected approach is more robust and secure without any stego key overhead. Furthermore, it has successfully achieved a size efficient stego text. Therefore, the secret information exhibits harder to track © 2019 IEEE.
关键词 :
Steganography Steganography Cryptography Cryptography
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar et al. A secure and size efficient approach to enhance the performance of text steganographic algorithm [C] . 2019 : 402-407 . |
MLA | Azeem, Muhammad et al. "A secure and size efficient approach to enhance the performance of text steganographic algorithm" . (2019) : 402-407 . |
APA | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar , Shaukat, Zeeshan , Ditta, Allah . A secure and size efficient approach to enhance the performance of text steganographic algorithm . (2019) : 402-407 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.
关键词 :
Access control Access control Cost benefit analysis Cost benefit analysis Cryptography Cryptography
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Ye, Tao , Cai, Yongquan , Zhao, Xu et al. An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems [J]. | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) : 41-49 . |
MLA | Ye, Tao et al. "An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems" . | International Journal of Wireless and Mobile Computing 16 . 1 (2019) : 41-49 . |
APA | Ye, Tao , Cai, Yongquan , Zhao, Xu , Yang, Yongli , Wang, Wei , Zhu, Yi . An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems . | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) , 41-49 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
As an essential component of cloud computing, cloud storage provides flexible data storage services for individuals and organizations. By storing multiple replicas of data in servers, cloud storage providers (CSPs) can improve availability and stability of the cloud storage service. To ensure that all data replicas of a cloud user are intact and completely stored in the CSP, many multi-replica cloud auditing schemes have been proposed. However, such schemes are predominantly based on the public key infrastructure (PKI), which incurs complex certificate management. In addition, existing schemes do not consider support for sector-level dynamic auditing. In this paper, we propose a fine-grained dynamic multi-replica data auditing scheme that has the following features: (1) it uses ID-based cryptography to eliminate the cost of certificate management, (2) it supports efficient sector-level dynamic operations on cloud user data, and (3) it optimizes the challenge algorithm to reduce the computational cost of the third party auditor (TPA). We show that the proposed scheme is provably secure based on a random oracle model. The performance analysis and experiments show the efficiency of the proposed scheme.
关键词 :
data integrity data integrity dynamic operation dynamic operation ID-based cryptography ID-based cryptography replicated data auditing replicated data auditing
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. et al. ID-based dynamic replicated data auditing for the cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
MLA | Yu, Haiyang et al. "ID-based dynamic replicated data auditing for the cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 31 . 11 (2019) . |
APA | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. , Yang, Zhen . ID-based dynamic replicated data auditing for the cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
本发明公开了一种恶意代码混淆特征清洗方法,属于机器学习信息安全领域。本方法包括特征选择方法和混淆特征清洗方法,提高传统恶意代码特征提取方法的有效性。相较于传统恶意代码特征提取方法,本发明能够有效延长恶意代码特征提取算法的有效时限,并提高特征提取算法的抗干扰性。本发明首先通过n‑gram特征提取方法构建特征库。由于该特征提取算法无法解决恶意代码的混淆操作,造成特征库中含有大量恶意代码的混淆特征值。通过混淆特征清洗算法,可以消除异常数据对模型识别规则的干扰。在此基础上从训练数据集规模的角度上,提出一种特征选择方法。该方法在保证模型识别精度不下降的基础上,有效降低模型最终使用的特征数目。
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 王栎汉 , 宁振虎 , 薛菲 et al. 一种恶意代码混淆特征清洗方法 : CN201810013584.4[P]. | 2018-01-08 . |
MLA | 王栎汉 et al. "一种恶意代码混淆特征清洗方法" : CN201810013584.4. | 2018-01-08 . |
APA | 王栎汉 , 宁振虎 , 薛菲 , 蔡永泉 , 梁鹏 . 一种恶意代码混淆特征清洗方法 : CN201810013584.4. | 2018-01-08 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
本发明公开了一种自动化检测恶意代码核心特征方法,属于计算机系统安全的总体设计。该方法是一种基于机器学习算法的恶意代码核心特征的方法。通过静态分析,从恶意代码实际安全意义的角度出发,提取恶意代码的图像纹理、关键API调用、关键字符串特征。通过基于归一化双特征库的随机森林树算法对提取的特征进行学习,获得恶意代码家族核心特征库。恶意代码图像特征对于恶意代码来说,具有更好的表现力。因此构建双特征子库,将恶意代码图像特征单独入库。保证每次特征融合,都能够选取到图像特征向量中的某几个特征值用于训练。这样保证了训练得到的分类器,拥有一定的准确率。
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 王栎汉 , 宁振虎 , 薛菲 et al. 一种自动化检测恶意代码核心特征方法 : CN201810013616.0[P]. | 2018-01-08 . |
MLA | 王栎汉 et al. "一种自动化检测恶意代码核心特征方法" : CN201810013616.0. | 2018-01-08 . |
APA | 王栎汉 , 宁振虎 , 薛菲 , 蔡永泉 , 梁鹏 . 一种自动化检测恶意代码核心特征方法 : CN201810013616.0. | 2018-01-08 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
关键词 :
Personal computing Personal computing Steganography Steganography
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah et al. Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters [J]. | International Journal of Information and Computer Security , 2018 , 10 (4) : 437-453 . |
MLA | Azeem, Muhammad et al. "Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters" . | International Journal of Information and Computer Security 10 . 4 (2018) : 437-453 . |
APA | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah , Rana, Khurram Gulzar , Rajpoot, Faheem Akhtar . Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters . | International Journal of Information and Computer Security , 2018 , 10 (4) , 437-453 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography is commonly used to send secret information to its destination using different techniques. In this article, our main focus is on text-based steganography. Hidden information in text files is difficult to discover as text data has low redundancy in comparison to other mediums of steganography. Hence, we use Arabic text to hide secret information using a combination of Unicode character's zero-width-character and zero-width-joiner in our proposed algorithm. The experimental results show hidden data capacity per word is significantly increased in comparison to the recently proposed algorithms. The major advantage of our proposed algorithm over previous research is the high visual similarity in both cover and stego-text that can reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
关键词 :
Information use Information use Security of data Security of data Steganography Steganography
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad et al. Information hiding: Arabic text steganography by using Unicode characters to hide secret data [J]. | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) : 61-78 . |
MLA | Ditta, Allah et al. "Information hiding: Arabic text steganography by using Unicode characters to hide secret data" . | International Journal of Electronic Security and Digital Forensics 10 . 1 (2018) : 61-78 . |
APA | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad , Rana, Khurram Gulzar , Yu, Haiyang , Memon, Muhammad Qasim . Information hiding: Arabic text steganography by using Unicode characters to hide secret data . | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) , 61-78 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
关键词 :
Ad hoc networks Ad hoc networks Authentication Authentication Cryptography Cryptography Gravitation Gravitation Network routing Network routing Network security Network security Routing protocols Routing protocols Stars Stars
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad et al. Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 16-24 . |
MLA | Rana, Khurram Gulzar et al. "Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 16-24 . |
APA | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad , Ditta, Allah , Yu, Haiyang , Khuhro, Sijjad Ali . Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 16-24 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Quantum image processing is the intersection of quantum computation and image processing. Due to it is a newly emerging thing, researchers are facing not only great opportunities but also many challenges to develop more efficient and practicable services. We provide a comprehensive survey on quantum image processing to gather the current mainstream and discuss the advances made in the area, including quantum image representations, processing algorithms, and image measurement. Moreover, some open challenges and future directions are pointed out to attract continued research efforts.
关键词 :
Measurement Measurement Quantum computation Quantum computation Quantum image compression Quantum image compression Quantum image processing Quantum image processing Quantum image representation Quantum image representation Quantum information Quantum information
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing [J]. | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) : 718-727 . |
MLA | Cai Yongquan et al. "A Survey on Quantum Image Processing" . | CHINESE JOURNAL OF ELECTRONICS 27 . 4 (2018) : 718-727 . |
APA | Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing . | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) , 718-727 . |
导入链接 | NoteExpress RIS BibTex |
导出
数据: |
选中 到 |
格式: |