Data trading is a crucial means of unlocking the value of Internet of Things(IoT)data.However,IoT data differs from traditional material goods due to its intangible and replicable nature.This difference leads to ambig...Data trading is a crucial means of unlocking the value of Internet of Things(IoT)data.However,IoT data differs from traditional material goods due to its intangible and replicable nature.This difference leads to ambiguous data rights,confusing pricing,and challenges in matching.Additionally,centralized IoT data trading platforms pose risks such as privacy leakage.To address these issues,we propose a profit-driven distributed trading mechanism for IoT data.First,a blockchain-based trading architecture for IoT data,leveraging the transparent and tamper-proof features of blockchain technology,is proposed to establish trust between data owners and data requesters.Second,an IoT data registration method that encompasses both rights confirmation and pricing is designed.The data right confirmation method uses non-fungible token to record ownership and authenticate IoT data.For pricing,we develop an IoT data value assessment index system and introduce a pricing model based on a combination of the sparrow search algorithm and the back propagation neural network.Finally,an IoT data matching method is designed based on the Stackelberg game.This establishes a Stackelberg game model involving multiple data owners and requesters,employing a hierarchical optimization method to determine the optimal purchase strategy.The security of the mechanism is analyzed and the performance of both the pricing method and matching method is evaluated.Experiments demonstrate that both methods outperform traditional approaches in terms of error rates and profit maximization.展开更多
Drone photography is an essential building block of intelligent transportation,enabling wide-ranging monitoring,precise positioning,and rapid transmission.However,the high computational cost of transformer-based metho...Drone photography is an essential building block of intelligent transportation,enabling wide-ranging monitoring,precise positioning,and rapid transmission.However,the high computational cost of transformer-based methods in object detection tasks hinders real-time result transmission in drone target detection applications.Therefore,we propose mask adaptive transformer (MAT) tailored for such scenarios.Specifically,we introduce a structure that supports collaborative token sparsification in support windows,enhancing fault tolerance and reducing computational overhead.This structure comprises two modules:a binary mask strategy and adaptive window self-attention (A-WSA).The binary mask strategy focuses on significant objects in various complex scenes.The A-WSA mechanism is employed to self-attend for balance perfomance and computational cost to select objects and isolate all contextual leakage.Extensive experiments on the challenging CarPK and VisDrone datasets demonstrate the effectiveness and superiority of the proposed method.Specifically,it achieves a mean average precision (mAP@0.5) improvement of 1.25%over car detector based on you only look once version 5 (CD-YOLOv5) on the CarPK dataset and a 3.75%average precision(AP@0.5) improvement over cascaded zoom-in detector (CZ Det) on the VisDrone dataset.展开更多
In the metaverse,digital assets are essential to define identity,shape the virtual environment,and facilitate economic transactions.This study introduces a novel feature to the metaverse by capturing a fundamental asp...In the metaverse,digital assets are essential to define identity,shape the virtual environment,and facilitate economic transactions.This study introduces a novel feature to the metaverse by capturing a fundamental aspect of individuals–their conversations–and transforming them into digital assets.It utilizes natural language processing and machine learning methods to extract key sentences from user conversations and match them with emojis that reflect their sentiments.The selected sentence,which encapsulates the essence of the user’s statements,is then transformed into digital art through a generative visual model.This digital artwork is transformed into a non-fungible token,becoming a valuable digital asset within the blockchain ecosystem that is ideal for integration into metaverse applications.Our aim is to manage personality traits as digital assets to foster individual uniqueness,enrich user experiences,and facilitate more personalized services and interactions with both like-minded users and non-player characters,thereby enhancing the overall user journey.展开更多
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,nume...Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem.展开更多
基金supported by the National Key Research and Development Program of China(No.2022YFF0610003)the BUPT Excellent Ph.D.Students Foundation(No.CX2022218)the Fund of Central University Basic Research Projects(No.2023ZCTH11).
文摘Data trading is a crucial means of unlocking the value of Internet of Things(IoT)data.However,IoT data differs from traditional material goods due to its intangible and replicable nature.This difference leads to ambiguous data rights,confusing pricing,and challenges in matching.Additionally,centralized IoT data trading platforms pose risks such as privacy leakage.To address these issues,we propose a profit-driven distributed trading mechanism for IoT data.First,a blockchain-based trading architecture for IoT data,leveraging the transparent and tamper-proof features of blockchain technology,is proposed to establish trust between data owners and data requesters.Second,an IoT data registration method that encompasses both rights confirmation and pricing is designed.The data right confirmation method uses non-fungible token to record ownership and authenticate IoT data.For pricing,we develop an IoT data value assessment index system and introduce a pricing model based on a combination of the sparrow search algorithm and the back propagation neural network.Finally,an IoT data matching method is designed based on the Stackelberg game.This establishes a Stackelberg game model involving multiple data owners and requesters,employing a hierarchical optimization method to determine the optimal purchase strategy.The security of the mechanism is analyzed and the performance of both the pricing method and matching method is evaluated.Experiments demonstrate that both methods outperform traditional approaches in terms of error rates and profit maximization.
文摘Drone photography is an essential building block of intelligent transportation,enabling wide-ranging monitoring,precise positioning,and rapid transmission.However,the high computational cost of transformer-based methods in object detection tasks hinders real-time result transmission in drone target detection applications.Therefore,we propose mask adaptive transformer (MAT) tailored for such scenarios.Specifically,we introduce a structure that supports collaborative token sparsification in support windows,enhancing fault tolerance and reducing computational overhead.This structure comprises two modules:a binary mask strategy and adaptive window self-attention (A-WSA).The binary mask strategy focuses on significant objects in various complex scenes.The A-WSA mechanism is employed to self-attend for balance perfomance and computational cost to select objects and isolate all contextual leakage.Extensive experiments on the challenging CarPK and VisDrone datasets demonstrate the effectiveness and superiority of the proposed method.Specifically,it achieves a mean average precision (mAP@0.5) improvement of 1.25%over car detector based on you only look once version 5 (CD-YOLOv5) on the CarPK dataset and a 3.75%average precision(AP@0.5) improvement over cascaded zoom-in detector (CZ Det) on the VisDrone dataset.
文摘In the metaverse,digital assets are essential to define identity,shape the virtual environment,and facilitate economic transactions.This study introduces a novel feature to the metaverse by capturing a fundamental aspect of individuals–their conversations–and transforming them into digital assets.It utilizes natural language processing and machine learning methods to extract key sentences from user conversations and match them with emojis that reflect their sentiments.The selected sentence,which encapsulates the essence of the user’s statements,is then transformed into digital art through a generative visual model.This digital artwork is transformed into a non-fungible token,becoming a valuable digital asset within the blockchain ecosystem that is ideal for integration into metaverse applications.Our aim is to manage personality traits as digital assets to foster individual uniqueness,enrich user experiences,and facilitate more personalized services and interactions with both like-minded users and non-player characters,thereby enhancing the overall user journey.
文摘Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem.