期刊文献+
共找到45,361篇文章
< 1 2 250 >
每页显示 20 50 100
A Cross-Domain Access Control Model Based on Trust Measurement
1
作者 YANG Xiaohui WANG Hong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期21-28,共8页
Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted ... Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement, defines several concepts (user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users' uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language (XACML) model by adding inside trust manager point (ITMP) and outside trust manager point (OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control. 展开更多
关键词 access control cross-domain access extensible access control markup language (XACML) trust degree
原文传递
Access数据库技术及其运用
2
作者 朱秋海 《消费电子》 2025年第6期200-202,共3页
随着科学技术的持续进步,信息技术行业逐渐进步与发展。在数字化背景下,为提升数据存储管理的效率,减少人工失误,Access数据库技术应用的重要性日益凸显,受到社会各界广泛关注,基于此,简单分析Access数据库技术理论基础及其应用方法,并... 随着科学技术的持续进步,信息技术行业逐渐进步与发展。在数字化背景下,为提升数据存储管理的效率,减少人工失误,Access数据库技术应用的重要性日益凸显,受到社会各界广泛关注,基于此,简单分析Access数据库技术理论基础及其应用方法,并深入探究基于Access数据库的实例应用,具体涉及系统结构、员工基本情况表的思考与设计等内容,以供业内人士参考。 展开更多
关键词 access 数据库技术 应用
在线阅读 下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
3
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
在线阅读 下载PDF
乡土情怀赋能乡村振兴的我国体育教学专业学位硕士4ACCESS培养模式与实践探索 被引量:1
4
作者 张现成 陆晓祺 李卫东 《湖北师范大学学报(哲学社会科学版)》 2025年第4期61-69,88,共10页
为全面落实《新时代基础教育强师计划通知》和《关于推进体育助力乡村振兴工作的指导意见》的文件精神,本研究在厘清“乡土情怀教育、乡村高质量体育教师培育与乡村振兴”关系的基础上,创造性提出乡土情怀赋能乡村振兴的高校体育教学专... 为全面落实《新时代基础教育强师计划通知》和《关于推进体育助力乡村振兴工作的指导意见》的文件精神,本研究在厘清“乡土情怀教育、乡村高质量体育教师培育与乡村振兴”关系的基础上,创造性提出乡土情怀赋能乡村振兴的高校体育教学专业学位硕士4ACCESS培养模式,即:践行乡育“四阶”目标、植入乡土“四进”课程、深耕乡蕴“四兴”课堂、实施乡教“四序”实践、创建乡寻“四浸”文化、保障乡师“四元”支持系统。这一模式的理论创建与实践探索,对加强硕士研究生乡土情怀教育,深化体育教学专业学位硕士培养模式改革,推动体育教学专业硕士培养高质量发展及助力乡村全面振兴,具有十分重要的作用。 展开更多
关键词 乡村振兴 体育教学方向专业硕士 乡土情怀 4access培养模式
在线阅读 下载PDF
基于OBE背景的Access数据库课程实践教学探索 被引量:1
5
作者 刘雨潇 《办公自动化》 2025年第1期35-38,共4页
为强化大学生的计算机应用技能,并培养他们运用合理的方法和工具解决实际问题的能力,基于对OBE(Outcome-Based Education,即结果导向教育)理念的深刻认识,对通识教育中的必修课程——Access数据库应用进行创新性的教学改革。不仅对课程... 为强化大学生的计算机应用技能,并培养他们运用合理的方法和工具解决实际问题的能力,基于对OBE(Outcome-Based Education,即结果导向教育)理念的深刻认识,对通识教育中的必修课程——Access数据库应用进行创新性的教学改革。不仅对课程教学目标进行全新的设计,还制定学习成效的检测与评价标准,以确保教学改革的实施效果。以Access数据库应用这门课程为例,对其调研报告和课程综合作业的评价量规设计进行深入地探讨,并详细阐述这些评价量规在提升学生学习效果、检验教学成果方面所发挥的重要作用。这些评价量规不仅有助于指导学生学习,还能为教师提供有效的教学反馈。通过应用教学的实践,发现评价量规对优化课程教学和提升培养目标具有显著的指导和支持作用。简而言之,通过改革教学方式和引入评价量规,成功地提高大学生的计算机应用能力,并帮助他们更好地利用技术和工具解决实际问题。这些教学创新不仅显著提高课程的教学品质,同时也为学生的长期学术进步和职业生涯规划奠定牢固的基础。 展开更多
关键词 OBE 计算机基础课程 access 教学实践 数据库
在线阅读 下载PDF
Gauging scholars’acceptance of Open Access journals by examining the relationship between perceived quality and citation impact 被引量:1
6
作者 William H.Walters 《Journal of Data and Information Science》 2025年第1期151-166,共16页
Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)... Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)score,and SCImago Journal Rank(SJR)-and the journal ratings assigned by expert reviewers.We expect that the OA journals will have especially high citation impact relative to their perceived quality(reputation).Design/methodology/approach:Regression is used to estimate the ratings assigned by expert reviewers for the 2021 CABS(Chartered Association of Business Schools)journal assessment exercise.The independent variables are the four citation metrics,evaluated separately,and a dummy variable representing the OA/non-OA status of each journal.Findings:Regardless of the citation metric used,OA journals in business and economics have especially high citation impact relative to their perceived quality(reputation).That is,they have especially low perceived quality(reputation)relative to their citation impact.Research limitations:These results are specific to the CABS journal ratings and the four citation metrics.However,there is strong evidence that CABS is closely related to several other expert ratings,and that 5IF,CiteScore,AI,and SJR are representative of the other citation metrics that might have been chosen.Practical implications:There are at least two possible explanations for these results:(1)expert evaluators are biased against OA journals,and(2)OA journals have especially high citation impact due to their increased accessibility.Although this study does not allow us to determine which of these explanations are supported,the results suggest that authors should consider publishing in OA journals whenever overall readership and citation impact are more important than journal reputation within a particular field.Moreover,the OA coefficients provide a useful indicator of the extent to which anti-OA bias(or the citation advantage of OA journals)is diminishing over time.Originality/value:This is apparently the first study to investigate the impact of OA status on the relationships between expert journal ratings and journal citation metrics. 展开更多
关键词 CITATIONS Impact JOURNALS Open access RANKINGS REPUTATION
在线阅读 下载PDF
基于Access数据库学生管理系统的开发与应用研究 被引量:1
7
作者 王利云 《微型计算机》 2025年第5期163-165,共3页
文章主要简单介绍学生管理系统的相关内容,阐述Access数据库的开发特色和方法,探讨基于Access数据库学生管理系统的设计与实现,旨在完善学生管理系统,充分发挥Access数据库功能,优化学生管理系统设计方案,加大学生管理系统开发力度,满... 文章主要简单介绍学生管理系统的相关内容,阐述Access数据库的开发特色和方法,探讨基于Access数据库学生管理系统的设计与实现,旨在完善学生管理系统,充分发挥Access数据库功能,优化学生管理系统设计方案,加大学生管理系统开发力度,满足学生管理系统的应用需求,保证系统设计可行性,从而加强对学生的管理,提高学生管理系统应用效果。 展开更多
关键词 access数据库 学生管理 系统开发 应用
在线阅读 下载PDF
Ultra-Dense LEO Satellite-Aircraft Access and Service Management in Civil Aviation 被引量:1
8
作者 Wang Yilei Ma Ting +3 位作者 Liu Xiaoyu Gao Zhuxuan Zhou Haibo Shen Xuemin 《China Communications》 2025年第1期277-292,共16页
With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have i... With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have increased dramatically,especially for providing airborne Internet services.However,due to dynamic service demands and onboard LEO resources over time and space,it poses huge challenges in satellite-aircraft access and service management in ultra-dense LEO satellite networks(UDLSN).In this paper,we propose a deep reinforcement learning-based approach for ultra-dense LEO satellite-aircraft access and service management.Firstly,we develop an airborne Internet architecture based on UDLSN and design a management mechanism including medium earth orbit satellites to guarantee lightweight management.Secondly,considering latency-sensitive and latency-tolerant services,we formulate the problem of satellite-aircraft access and service management for civil aviation to ensure service continuity.Finally,we propose a proximal policy optimization-based access and service management algorithm to solve the formulated problem.Simulation results demonstrate the convergence and effectiveness of the proposed algorithm with satisfying the service continuity when applying to the UDLSN. 展开更多
关键词 civil aviation deep reinforcement learning satellite-aircraft access service management ultra-dense LEO satellite network
在线阅读 下载PDF
Access to health services and factors affecting musculoskeletal disorders among outdoor pollution workers following Sustainable Development Goals:a weakness in Thailand 被引量:1
9
作者 Anamai Thetkathuek Marissa Kongsombatsuk +1 位作者 Teeranun Nakyai Chan Pattama Polyong 《Global Health Journal》 2025年第2期85-93,共9页
Background:People working outdoors in the Map Ta Phut pollution control area of Thailand require comprehen-sive health monitoring.In the past,studies have been done on the health effects of pollutants.However,there ar... Background:People working outdoors in the Map Ta Phut pollution control area of Thailand require comprehen-sive health monitoring.In the past,studies have been done on the health effects of pollutants.However,there are few studies on musculoskeletal disorders(MSDs),and Thailand is struggling to meet the Sustainable Development Goals.Methods:This cross-sectional study examines access to health services and factors affecting MSDs among outdoor pollution workers(OPWs).The sample group includes OPWs,including local fisherman,street vendors,public car drivers,and traffic police.We studied 50 people from each of these groups,for a total of 200 people.Data were analyzed with inferential statistics using Chi-square test,McNemar test,and Univariate logistic regression.Results:The OPWs reported experiencing significantly more total MSDs pain than they did in the past(P<0.05).Factors affecting current MSDs pain,including occupation and working days per week,were significant(P<0.05).The street vendor group and public car driver group had(odds ratio[OR]=2.253,95%confidence interval[CI]:1.101 to 5.019)and(OR=2.681,95%CI:1.191 to 6.032)times higher risks of MSDs pain,respectively.OPWs who work>5 days per week had a(OR=1.464,95%CI:1.093 to 2.704)times higher risk of MSDs pain.52.7%of OPWs with MSDs,pain(n=110)had received an annual health check-up.In the past year,50.9%had minor illnesses and 21.8%had severe illnesses.OPWs receiving free treatment and visiting health service stations for no cost comprised 77.3%and 51.8%,respectively.60.9%used their right to receive treatment with universal health insurance cards.Conclusions:The study indicates that occupational groups with MSDs pain problems should exercise this right,according to the worker protection law.Local health agencies should organize activities or create accessible media to promote preventive medicine services,as many OPWs believe that health services can only be accessed when illness occurs. 展开更多
关键词 Musculoskeletal disorders Outdoor pollution workers access to health services Sustainable development goals
暂未订购
A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
10
作者 Jiyu Zhang Kehe Wu +4 位作者 Ruomeng Yan Zheng Tian Yizhen Sun Yuxi Wu Yaogong Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期1211-1232,共22页
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig... Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions. 展开更多
关键词 access control renewable energy systems(RES) ciphertext-policy attribute-based encryption(CP-ABE) security
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
11
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
Dual-Task Contrastive Meta-Learning for Few-Shot Cross-Domain Emotion Recognition
12
作者 Yujiao Tang Yadong Wu +2 位作者 Yuanmei He Jilin Liu Weihan Zhang 《Computers, Materials & Continua》 2025年第2期2331-2352,共22页
Emotion recognition plays a crucial role in various fields and is a key task in natural language processing (NLP). The objective is to identify and interpret emotional expressions in text. However, traditional emotion... Emotion recognition plays a crucial role in various fields and is a key task in natural language processing (NLP). The objective is to identify and interpret emotional expressions in text. However, traditional emotion recognition approaches often struggle in few-shot cross-domain scenarios due to their limited capacity to generalize semantic features across different domains. Additionally, these methods face challenges in accurately capturing complex emotional states, particularly those that are subtle or implicit. To overcome these limitations, we introduce a novel approach called Dual-Task Contrastive Meta-Learning (DTCML). This method combines meta-learning and contrastive learning to improve emotion recognition. Meta-learning enhances the model’s ability to generalize to new emotional tasks, while instance contrastive learning further refines the model by distinguishing unique features within each category, enabling it to better differentiate complex emotional expressions. Prototype contrastive learning, in turn, helps the model address the semantic complexity of emotions across different domains, enabling the model to learn fine-grained emotions expression. By leveraging dual tasks, DTCML learns from two domains simultaneously, the model is encouraged to learn more diverse and generalizable emotions features, thereby improving its cross-domain adaptability and robustness, and enhancing its generalization ability. We evaluated the performance of DTCML across four cross-domain settings, and the results show that our method outperforms the best baseline by 5.88%, 12.04%, 8.49%, and 8.40% in terms of accuracy. 展开更多
关键词 Contrastive learning emotion recognition cross-domain learning DUAL-TASK META-LEARNING
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
13
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
信息技术支撑下的Access数据库课程混合式教学模式研究
14
作者 蔡灵芝 《信息与电脑》 2025年第2期194-196,共3页
研究探讨了信息技术支撑下的混合式教学模式在Access数据库课程中的应用,旨在提高学生的数据库管理能力和实际操作水平。在课前阶段,教师通过在线平台提供丰富的学习资源,帮助学生自主学习基础知识;在课中阶段,教师通过实时监测学习数... 研究探讨了信息技术支撑下的混合式教学模式在Access数据库课程中的应用,旨在提高学生的数据库管理能力和实际操作水平。在课前阶段,教师通过在线平台提供丰富的学习资源,帮助学生自主学习基础知识;在课中阶段,教师通过实时监测学习数据和组织小组讨论,促进学生的协作与互动;在课后阶段,教师引导学生进行项目实践,巩固所学知识并激发创新思维。研究结果表明,混合式教学模式能够有效增强学生的学习效果,培养他们的团队合作能力和解决问题的能力,为其未来的职业发展奠定基础。 展开更多
关键词 信息技术 混合式教学 access数据库课程
在线阅读 下载PDF
CrowdRouting:Trustworthy and customized cross-domain routing based on crowdsourcing
15
作者 Jialei Zhang Zheng Yan +1 位作者 Huidong Dong Peng Zhang 《Digital Communications and Networks》 2025年第3期734-756,共23页
Cross-domain routing in Integrated Heterogeneous Networks(Inte-HetNet)should ensure efficient and secure data transmission across different network domains by satisfying diverse routing requirements.However,current so... Cross-domain routing in Integrated Heterogeneous Networks(Inte-HetNet)should ensure efficient and secure data transmission across different network domains by satisfying diverse routing requirements.However,current solutions face numerous challenges in continuously ensuring trustworthy routing,fulfilling diverse requirements,achieving reasonable resource allocation,and safeguarding against malicious behaviors of network operators.We propose CrowdRouting,a novel cross-domain routing scheme based on crowdsourcing,dedicated to establishing sustained trust in cross-domain routing,comprehensively considering and fulfilling various customized routing requirements,while ensuring reasonable resource allocation and effectively curbing malicious behavior of network operators.Concretely,CrowdRouting employs blockchain technology to verify the trustworthiness of border routers in different network domains,thereby establishing sustainable and trustworthy crossdomain routing based on sustained trust in these routers.In addition,CrowdRouting ingeniously integrates a crowdsourcing mechanism into the auction for routing,achieving fair and impartial allocation of routing rights by flexibly embedding various customized routing requirements into each auction phase.Moreover,CrowdRouting leverages incentive mechanisms and routing settlement to encourage network domains to actively participate in cross-domain routing,thereby promoting optimal resource allocation and efficient utilization.Furthermore,CrowdRouting introduces a supervisory agency(e.g.,undercover agent)to effectively suppress the malicious behavior of network operators through the game and interaction between the agent and the network operators.Through comprehensive experimental evaluations and comparisons with existing works,we demonstrate that CrowdRouting excels in providing trustworthy and fine-grained customized routing services,stimulating active participation in cross-domain routing,inhibiting malicious operator behavior,and maintaining reasonable resource allocation,all of which outperform baseline schemes. 展开更多
关键词 Trustworthy routing cross-domain routing Customized routing Crowdsourcing
在线阅读 下载PDF
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT
16
作者 Fengqi Li Yingjie Zhao +3 位作者 Kaiyang Zhang Hui Xu Yanjuan Wang Deguang Wang 《Digital Communications and Networks》 2025年第4期1191-1203,共13页
To facilitate cross-domain data interaction in the Industrial Internet of Things(IIoT),establishing trust between multiple administrative domains is essential.Although blockchain technology has been proposed as a solu... To facilitate cross-domain data interaction in the Industrial Internet of Things(IIoT),establishing trust between multiple administrative domains is essential.Although blockchain technology has been proposed as a solution,current techniques still suffer from issues related to efficiency,security,and privacy.Our research aims to address these challenges by proposing a lightweight,trusted data interaction scheme based on blockchain,which reduces redundant interactions among entities.We enhance the traditional Practical Byzantine Fault Tolerance(PBFT)algorithm to support lightweight distributed consensus in large-scale IIoT scenarios.Introducing a composite digital signature algorithm and incorporating veto power minimizes resource consumption and eliminates ineffective consensus operations.The experimental results show that,compared with PBFT,our scheme reduces latency by 27.2%,thereby improving communication efficiency and resource utilization.Furthermore,we develop a lightweight authentication technique specifically for cross-domain IIoT,leveraging blockchain technology to achieve distributed collaborative authentication.The performance comparisons indicate that our method significantly outperforms traditional schemes,with an average authentication latency of approximately 151 milliseconds.Additionally,we introduce a trusted federated learning(FL)algorithm that ensures comprehensive trust assessments for devices across different domains while protecting data privacy.Extensive simulations and experiments validate the reliability of our approach. 展开更多
关键词 Blockchain Industrial internet of things Federated learning cross-domain AUTHENTICATION
在线阅读 下载PDF
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion
17
作者 Puning Zhang Lei Tan +3 位作者 Zhigang Yang Fengyi Huang Lijun Sun Haiying Peng 《Digital Communications and Networks》 2025年第2期482-492,共11页
The lack of facial features caused by wearing masks degrades the performance of facial recognition systems.Traditional occluded face recognition methods cannot integrate the computational resources of the edge layer a... The lack of facial features caused by wearing masks degrades the performance of facial recognition systems.Traditional occluded face recognition methods cannot integrate the computational resources of the edge layer and the device layer.Besides,previous research fails to consider the facial characteristics including occluded and unoccluded parts.To solve the above problems,we put forward a device-edge collaborative occluded face recognition method based on cross-domain feature fusion.Specifically,the device-edge collaborative face recognition architecture gets the utmost out of maximizes device and edge resources for real-time occluded face recognition.Then,a cross-domain facial feature fusion method is presented which combines both the explicit domain and the implicit domain facial.Furthermore,a delay-optimized edge recognition task scheduling method is developed that comprehensively considers the task load,computational power,bandwidth,and delay tolerance constraints of the edge.This method can dynamically schedule face recognition tasks and minimize recognition delay while ensuring recognition accuracy.The experimental results show that the proposed method achieves an average gain of about 21%in recognition latency,while the accuracy of the face recognition task is basically the same compared to the baseline method. 展开更多
关键词 Occluded face recognition cross-domain feature fusion Device-edge collaboration
在线阅读 下载PDF
Cross-Domain Spatial-Temporal GCN Model for Micro-Expression Recognition
18
作者 Minghui Su Chenwen Ma +3 位作者 Tianhuan Huang Lei Chen Hongchao Zhou Xianye Ben 《Journal of Beijing Institute of Technology》 2025年第5期496-509,共14页
Although significant progress has been made in micro-expression recognition,effectively modeling the intricate spatial-temporal dynamics remains a persistent challenge owing to their brief duration and complex facial ... Although significant progress has been made in micro-expression recognition,effectively modeling the intricate spatial-temporal dynamics remains a persistent challenge owing to their brief duration and complex facial dynamics.Furthermore,existing methods often suffer from limited gen-eralization,as they primarily focus on single-dataset tasks with small sample sizes.To address these two issues,this paper proposes the cross-domain spatial-temporal graph convolutional network(GCN)(CDST-GCN)model,which comprises two primary components:a siamese attention spa-tial-temporal branch(SASTB)and a global-aware dynamic spatial-temporal branch(GDSTB).Specifically,SASTB utilizes a contrastive learning strategy to project macro-and micro-expressions into a shared,aligned feature space,actively addressing cross-domain discrepancies.Additionally,it integrates an attention-gated mechanism that generates adaptive adjacency matrices to flexibly model collaborative patterns among facial landmarks.While largely preserving the structural paradigm of SASTB,GDSTB enhances the feature representation by integrating global context extracted from a pretrained model.Through this dual-branch architecture,CDST-GCN success-fully models both the global and local spatial-temporal features.The experimental results on CASME II and SAMM datasets demonstrate that the proposed model achieves competitive perfor-mance.Especially in more challenging 5-class tasks,the accuracy of the model on CASME II dataset is as high as 80.5%. 展开更多
关键词 micro-expression recognition attention mechanism cross-domain dynamic spatial-tem-poral graph convolutional neural network
在线阅读 下载PDF
Preamble slice orderly queue access scheme in cell-free dense communication systems
19
作者 Jun Sun Mengzhu Guo Jian Liu 《Digital Communications and Networks》 2025年第1期126-135,共10页
High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication sys... High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances. 展开更多
关键词 Machine type communication Random access Reinforcement learning access success probability Federated learning
在线阅读 下载PDF
Security analysis and secured access design for networks of image remote sensing
20
作者 Juan Zhao Haibo Dai +3 位作者 Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li 《Digital Communications and Networks》 2025年第1期136-144,共9页
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens... The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach. 展开更多
关键词 Image remote sensing Secured access Energy efficiency Sensor transmit power Secured access design
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部