期刊文献+
共找到629篇文章
< 1 2 32 >
每页显示 20 50 100
Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks 被引量:10
1
作者 Haiyan Zhao Jing Yan +1 位作者 Xiaoyuan Luo Xinping Guan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1511-1527,共17页
Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security atta... Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks.This paper is concerned with a privacy-preserving asynchronous localization issue for USNs.Particularly,a hybrid network architecture that includes surface buoys,anchor nodes,active sensor nodes and ordinary sensor nodes is constructed.Then,an asynchronous localization protocol is provided,through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes.It is worth mentioning that,the proposed localization algorithms reveal disguised positions to the network,while they do not adopt any homomorphic encryption technique.More importantly,they can eliminate the effect of asynchronous clock,i.e.,clock skew and offset.The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented.Finally,simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information,while the location accuracy can be significantly enhanced as compared with the other works. 展开更多
关键词 asynchronous clock LOCALIZATION privacy preservation underwater sensor networks(USNs)
在线阅读 下载PDF
Resource saving based dwell time allocation and detection threshold optimization in an asynchronous distributed phased array radar network 被引量:2
2
作者 Haowei ZHANG Weijian LIU Xiao YANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第11期311-327,共17页
The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed dete... The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed detections.A Joint Dwell Time Allocation and Detection Threshold Optimization(JDTADTO)strategy is proposed for resource saving in this case.The Predicted Conditional Cramér-Rao Lower Bound(PC-CRLB)with Bayesian Detector and Amplitude Information(BD-AI)is derived and adopted as the tracking performance metric.The optimization model is formulated as minimizing the difference between the PC-CRLBs and the tracking precision thresholds under the constraints of upper and lower bounds of dwell time and false alarm ratio.It is shown that the objective function is nonconvex due to the Information Reduction Factor(IRF)brought by the MOU.A cyclic minimizer-based solution is proposed for problem solving.Simulation results confirm the flexibility and robustness of the JDTADTO strategy in both sufficient and insufficient resource scenarios.The results also reveal the effectiveness of the proposed strategy compared with the strategies adopting the BD without detection threshold optimization and amplitude information. 展开更多
关键词 asynchronous data fusion Bayesian detector Phased Array Radar network(PARN) Predicted Conditional CramE´R-Rao Lower Bound(PC-CRLB) Resource management
原文传递
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks 被引量:1
3
作者 Wei Zhou Xing Jiang +4 位作者 Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng 《Digital Communications and Networks》 CSCD 2024年第5期1405-1414,共10页
In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of QoS can be defined as,for example,average latency,packet loss ratio,and throughput.The SDN controller can use network statistics and a Deep Reinforcement Learning(DRL)method to resolve this challenge.In this paper,we formulate dynamic routing in an SDN as a Markov decision process and propose a DRL algorithm called the Asynchronous Advantage Actor-Critic QoS-aware Routing Optimization Mechanism(AQROM)to determine routing strategies that balance the traffic loads in the network.AQROM can improve the QoS of the network and reduce the training time via dynamic routing strategy updates;that is,the reward function can be dynamically and promptly altered based on the optimization objective regardless of the network topology and traffic pattern.AQROM can be considered as one-step optimization and a black-box routing mechanism in high-dimensional input and output sets for both discrete and continuous states,and actions with respect to the operations in the SDN.Extensive simulations were conducted using OMNeT++and the results demonstrated that AQROM 1)achieved much faster and stable convergence than the Deep Deterministic Policy Gradient(DDPG)and Advantage Actor-Critic(A2C),2)incurred a lower packet loss ratio and latency than Open Shortest Path First(OSPF),DDPG,and A2C,and 3)resulted in higher and more stable throughput than OSPF,DDPG,and A2C. 展开更多
关键词 Software-defined networks asynchronous advantage actor-critic QoS-aware routing optimization mechanism
在线阅读 下载PDF
REA-MAC:A low latency routing-enhanced asynchronous duty-cycle MAC protocol for wireless sensor networks
4
作者 唐宏伟 曹建农 +1 位作者 孙彩霞 卢凯 《Journal of Central South University》 SCIE EI CAS 2013年第3期678-687,共10页
Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during th... Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during the operational cycle,which results in the packet delivery latency increased significantly on the multiple hops path.To reduce the packet delivery latency on multi-hop path and energy waste of the sender's idle listening,a new low latency routing-enhanced asynchronous duty-cycle MAC protocol was presented,called REA-MAC.In REA-MAC,each sensor node decided when it waked up to send the beacon based on cross-layer routing information.Furthermore,the sender adaptively waked up based on the relationship between the transmission request time and the wakeup time of its next hop node.The simulation results show that REA-MAC reduces delivery latency by 60% compared to RI-MAC and reduces 8.77% power consumption on average.Under heavy traffic,REA-MAC's throughput is 1.48 times of RI-MAC's. 展开更多
关键词 wireless sensor networks asynchronOUS duty-cycle media access control protocol idle listening low latency
在线阅读 下载PDF
Inference of interactions between players based on asynchronously updated evolutionary game data
5
作者 曾红丽 景浡 +1 位作者 王于豪 秦绍萌 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期142-149,共8页
The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the ... The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the game.The strategies of each player are updated asynchronously during the game.Two inference methods of the interactions between players are derived with naive mean-field(n MF)approximation and maximum log-likelihood estimation(MLE),respectively.Two methods are tested numerically also for fully connected asymmetric Sherrington-Kirkpatrick models,varying the data length,asymmetric degree,payoff,and system noise(coupling strength).We find that the mean square error of reconstruction for the MLE method is inversely proportional to the data length and typically half(benefit from the extra information of update times)of that by n MF.Both methods are robust to the asymmetric degree but work better for large payoffs.Compared with MLE,n MF is more sensitive to the strength of couplings and prefers weak couplings. 展开更多
关键词 network reconstruction prisoner's dilemma game asynchronously update
原文传递
Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
6
作者 黄征 龚征 李强 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期112-116,共5页
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ... This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 展开更多
关键词 secret share secure multi-party computation asynchronous network
原文传递
Joint optimization via deep reinforcement learning for secure-driven NOMA-UAV networks
7
作者 Danhao DENG Chaowei WANG +1 位作者 Lexi XU Fan JIANG 《Chinese Journal of Aeronautics》 2025年第10期134-143,共10页
Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challe... Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challenges due to the shared wireless spectrum and Line-of-Sight(LoS)channel.This paper formulates a joint UAV trajectory design and power allocation problem with the aid of the ground jammer to maximize the sum secrecy rate.First,the joint optimization problem is modeled as a Markov Decision Process(MDP).Then,the Deep Reinforcement Learning(DRL)method is utilized to search the optimal policy from the continuous action space.In order to accelerate the sample accumulation,the Asynchronous Advantage Actor-Critic(A3C)scheme with multiple workers is proposed,which reformulates the action and reward to acquire complete update duration.Simulation results demonstrate that the A3C-based scheme outperforms the baseline schemes in term of the secrecy rate and stability. 展开更多
关键词 asynchronous advantage actor-critic(A3C) NOMA-UAV networks Power allocation Secure transmission UAV trajectory design
原文传递
基于残差内积驱动的异步电机多故障检测方法
8
作者 许伯强 熊鹏 +1 位作者 孙丽玲 尹彦博 《电工技术学报》 北大核心 2026年第6期1976-1985,共10页
针对电机各类序列数据中的故障特征难以直接辨识和依赖人工经验的问题,该文提出了一种残差内积驱动的序列故障检测模型(RID-FDM),可在仅使用健康数据训练的条件下,实现轴承局部损伤、定子匝间短路及转子断条三类典型故障的高灵敏度检测... 针对电机各类序列数据中的故障特征难以直接辨识和依赖人工经验的问题,该文提出了一种残差内积驱动的序列故障检测模型(RID-FDM),可在仅使用健康数据训练的条件下,实现轴承局部损伤、定子匝间短路及转子断条三类典型故障的高灵敏度检测。该模型通过序列窗口化将长时序数据分割为局部片段,利用片段残差生成器提取输入与输出间的残差特征,并设计全局残差内积损失迫使健康数据的残差内积序列趋近于零。故障发生时,残差内积序列的均值、方差等统计指标因输入分布偏移而显著偏离,触发阈值报警机制。实验表明,RID-FDM对三类电机故障的检测准确率均超过90%,优于传统主成分分析、自编码器等方法。该研究完全由数据驱动,为少样本、高实时性要求的工业故障检测提供了新的解决方案。 展开更多
关键词 异步电机 故障检测 神经网络 无监督学习 零样本检测
在线阅读 下载PDF
多模态残差注意力网络异步电动机故障诊断
9
作者 古玉锋 燕钢强 +1 位作者 黎程山 苟瑞龙 《振动.测试与诊断》 北大核心 2026年第1期123-131,220,共10页
针对在线故障诊断中多源信息利用不足与模型识别精度不高的问题,提出了一种主成分分析(principal component analysis,简称PCA)与残差注意力网络相结合的多传感器融合故障诊断方法(multi-sensor feature fusion residual attention netw... 针对在线故障诊断中多源信息利用不足与模型识别精度不高的问题,提出了一种主成分分析(principal component analysis,简称PCA)与残差注意力网络相结合的多传感器融合故障诊断方法(multi-sensor feature fusion residual attention network,简称MSF-ResAttNet),以实现三相异步交流电动机的高精度诊断。首先,采集电动机在不同运行状态下的振动、电压及电流等多源信号;其次,利用PCA对同源传感器数据进行数据层融合,增强多源信息的关联性与稳定性;然后,将数据层融合后的特征输入结合多分支残差结构与通道-空间双重注意力机制(convolutional block attention module,简称CBAM)注意力模块的深度神经网络,实现对关键特征通道和空间位置的自适应提取与强化;最后,在电动机故障诊断实验平台上与卷积神经网络(convolutional neural network,简称CNN)、残差神经网络(residual neural network,简称ResNet)、早期融合卷积神经网络(early fusion convolutional neural network,简称EF-CNN)及多传感器融合卷积神经网络(multi-sensor feature fusion convolutional neural network,简称MSF-CNN)进行对比,并在公开数据集KAIST上进行迁移测试。结果表明,MSF-ResAttNet在实验平台的诊断准确率为99.57%,在公开数据集KAIST测试的诊断准确率为98.86%,与其他方法相比均具有一定的优势,提升了电动机故障诊断的精度,具有较强的泛化能力。 展开更多
关键词 多传感器融合 异步电动机 故障诊断 残差神经网络 注意力机制
在线阅读 下载PDF
基于多源传感器异步融合与深度残差网络的行星减速器故障诊断研究
10
作者 袁琪 《模具制造》 2026年第2期192-194,共3页
针对传统行星减速器故障诊断方法依赖单一传感器或同步数据融合,存在信息利用不充分、时间延迟处理能力不足的问题。提出了一种基于多源传感器异步融合与深度残差网络的故障诊断方法,该方法通过构建异步融合策略有效处理不同传感器间的... 针对传统行星减速器故障诊断方法依赖单一传感器或同步数据融合,存在信息利用不充分、时间延迟处理能力不足的问题。提出了一种基于多源传感器异步融合与深度残差网络的故障诊断方法,该方法通过构建异步融合策略有效处理不同传感器间的时间差异,实现对行星减速器多种故障模式的精确识别,显著提升了故障诊断精度。 展开更多
关键词 异步融合 深度残差网络 行星减速器 故障诊断
在线阅读 下载PDF
空间信息网络分层竞争下的安全资源分配策略:一种Stackelberg匹配博弈框架
11
作者 武敏 刘阳 +1 位作者 王子玮 郑志明 《航天技术与工程学报》 2026年第2期48-60,共13页
为解决大规模空间信息网络在高动态环境下的安全传输问题,本文面向具备信号功率检测能力的非合作地面检测节点,在不同轨道层部署低轨(LEO)卫星,并构建由无人机集群组成的弹性回程链路,以支撑合作地面用户的网络接入。为降低正常通信行... 为解决大规模空间信息网络在高动态环境下的安全传输问题,本文面向具备信号功率检测能力的非合作地面检测节点,在不同轨道层部署低轨(LEO)卫星,并构建由无人机集群组成的弹性回程链路,以支撑合作地面用户的网络接入。为降低正常通信行为在网信安全中被非合作方发现的概率,该LEO网络通过动态资源调度,将通信信号隐藏于卫星系统自身的同频干扰背景之中。然而,非合作地面检测节点可依据网信态势自适应调整检测阈值,从而增强其对正常信号的识别能力。为此,本文构建了一种Stackelberg匹配博弈模型,用以刻画天基网络与地面检测节点在功率分配与检测策略上的动态交互过程。在该模型中,作为上层决策者的LEO卫星通过优化发射功率,在满足最低检测概率约束条件下最大化通信效能;作为下层响应方的非合作地面检测节点,则根据接收信号特征自适应调整检测门限,以最小化其检测误差。相较于现有研究,本文通过融合分层博弈理论、异步决策Transformer与多智能体强化学习机制,实现了天基网络、空中平台与地面节点在网信体系下的智能协同安全通信。仿真结果验证了所提分层资源竞争策略在提升通信可靠性与抗检测能力方面的有效性,为构建安全可靠、协同安全的新一代网信体系提供了理论支撑与技术路径。 展开更多
关键词 空间信息网络 低检测概率 博弈论 异步决策Transformer 多智能体强化学习
在线阅读 下载PDF
基于IDBO-LSTM神经网络的异步电机故障辨识
12
作者 梁天添 杨健雄 钱振明 《大连交通大学学报》 2026年第1期130-139,共10页
针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步... 针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步电机系统模型;其次,利用精英反向学习策略、分段线性混沌映射、动态混沌权重因子和动态权重系数等方法改进蜣螂优化算法;最后,使用改进蜣螂优化算法对LSTMNN的关键超参数进行寻优。仿真结果表明,相较于基于蜣螂优化算法和基于改进麻雀算法的LSTMNN,提出的优化LSTMNN对故障及其他变量的辨识均方根误差分别降低了51.93%、36.49%,平均绝对误差分别降低了56.83%、43.99%,平均绝对百分误差分别降低了29.91%、22.25%,表明采用改进的蜣螂优化算法对LSTMNN的关键超参数寻优,可显著提高LSTM网络对电机故障及其他变量的辨识能力。 展开更多
关键词 异步电机 故障辨识 长短期记忆神经网络 改进的蜣螂优化算法
在线阅读 下载PDF
异步拒绝服务攻击下神经网络的安全同步控制
13
作者 杨邹 施开波 +1 位作者 王俊 朱文卿 《成都大学学报(自然科学版)》 2026年第1期39-44,共6页
针对一类神经网络同步系统,当考虑神经网络不同通道受到拒绝服务(denial of service, DoS)攻击时,提出一种双通道动态事件触发机制策略.首先,考虑传感器到控制器和控制器到执行器受到不同DoS攻击的情况,并将这些攻击建模为2个独立的马... 针对一类神经网络同步系统,当考虑神经网络不同通道受到拒绝服务(denial of service, DoS)攻击时,提出一种双通道动态事件触发机制策略.首先,考虑传感器到控制器和控制器到执行器受到不同DoS攻击的情况,并将这些攻击建模为2个独立的马尔可夫(Markov)跳变过程;其次,为了应对数据传输拥塞问题,设计了双通道动态事件触发机制来提高传输效率;然后,为了满足同步要求,提出了相应的控制器设计;最后,利用线性矩阵不等式的解析方法,验证了所提理论的可行性,并通过实验结果证明了该方法的优越性. 展开更多
关键词 神经网络 Markov跳变过程 异步DoS攻击 动态事件触发机制 同步控制
在线阅读 下载PDF
基于SHAM和时-空特征模型的电机故障诊断研究
14
作者 田宇 郭晓东 +3 位作者 马文彪 崔鸣伦 吴春辉 吴春华 《组合机床与自动化加工技术》 北大核心 2026年第2期123-128,共6页
针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitatio... 针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitation(SE)网络增强通道特征相关性的优点相结合,设计了一种新型的自混合注意力机制(self-hybrid attention mechanisms,SHAM),可以有效地降低异步电机电信号的故障敏感性差异;其次,将一维卷积神经网络(1D-convolutional neural network,1D-CNN)和SHAM相结合形成卷积自混合注意力模块(C-SHAM)来提取不同视野域的空间特征和捕获信号特征长范围依赖,同时抑制不同通道下同源信号内无关分量的影响;随后,将双向长短时记忆网络(bidirectional long and short term memory networks,Bi-LSTM)和SHAM相结合提出时序自混合注意力模块(BL-SHAM),进一步实现信号时序特征的再提取和不同通道特征的自适应融合;最后,通过分类器实现电机的故障识别。实验结果表明,在异步电机实验平台上,所提出的方法能够对异步电机的故障电信号进行有效地分类,平均准确率大于98%。 展开更多
关键词 异步电动机 故障诊断 电信号 自混合注意力机制 卷积神经网络 双向长短时记忆网络
在线阅读 下载PDF
Research on robust fault-tolerant control for networked control system with packet dropout 被引量:50
15
作者 Huo Zhihong Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期76-82,共7页
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an... A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema. 展开更多
关键词 networked control system (NCS) Fault-tolerant control (FTC) asynchronous dynamical systems (ADS) Integrity design Packet dropout Time delay
在线阅读 下载PDF
Stability of Iterative Learning Control with Data Dropouts via Asynchronous Dynamical System 被引量:15
16
作者 Xu-Hui Bu Zhong-Sheng Hou 《International Journal of Automation and computing》 EI 2011年第1期29-36,共8页
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr... In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations. 展开更多
关键词 Iterative learning control (ILC) networked control systems (NCSs) data dropouts asynchronous dynamical system robustness.
在线阅读 下载PDF
New structure of Kalman filter for radar networking 被引量:1
17
作者 HeYou DongYunlong WangGuohong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期241-244,共4页
Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Throug... Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Through discussing the sequential approach, which is the classical asynchronous multisensor data fusion algorithm, a new algorithm based on distributed computation structure is proposed. The new algorithm can meet the requirement of real-time computation of netting fusion system, and is more practical for engineering compared with the classical sequential approach. Simulation results show the validity of the presented algorithm. 展开更多
关键词 MULTI-SENSOR radar networking asynchronOUS FUSION SEQUENTIAL
在线阅读 下载PDF
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
18
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION THRESHOLD CRYPTOGRAPHY THRESHOLD DECRYPTION asynchronOUS networks
暂未订购
Asynchronism of the spreading dynamics underlying the bursty pattern 被引量:1
19
作者 Tong Wang Ming-Yang Zhou Zhong-Qian Fu 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第5期586-592,共7页
The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model ne... The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model networks.In this paper,we track and analyze the propagation paths of real spreading events on two social networks:Twitter and Brightkite.The empirical analysis reveals that the spreading probability and the spreading velocity present the explosive growth within a short period,where the spreading probability measures the transferring likelihood between two neighboring nodes,and the spreading velocity is the growth rate of the information in the whole network.Besides,we observe the asynchronism between the spreading probability and the spreading velocity.To explain the interesting and abnormal issue,we introduce the time-varying spreading probability into the susceptible-infected(SI)and linear threshold(LT)models.Both the analytic and experimental results reproduce the spreading phenomenon in real networks,which deepens our understandings of spreading problems. 展开更多
关键词 social network information diffusion spreading probability asynchronism
原文传递
Hardware-in-the-loop simulation of communication networks 被引量:3
20
作者 杨杰 李寅 《Journal of Beijing Institute of Technology》 EI CAS 2012年第3期376-381,共6页
To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits an... To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network. 展开更多
关键词 hardware-in-the-loop(HITL) simulation high level architecture(HLA) system-in-the-loop(SITL) asynchronous transfer mode(ATM) network
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部