期刊文献+
共找到30,370篇文章
< 1 2 250 >
每页显示 20 50 100
LUAR:Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems
1
作者 Fei Tang Ping Wang +3 位作者 Jiang Yu Huihui Zhu Mengxue Qin Ling Yang 《Computers, Materials & Continua》 2026年第3期1628-1646,共19页
Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a piv... Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a pivotal role in maintaining security.However,existing key revocation mechanisms face two major challenges:(1)High overhead due to ciphertext and key updates,primarily stemming from the reliance on revocation lists during attribute revocation,which increases computation and communication costs.(2)Limited universality,as many attribute revocation mechanisms are tailored to specific ABE constructions,restricting their broader applicability.To address these challenges,we propose LUAR(Lightweight and Universal Attribute Revocation),a novel revocation mechanism that leverages Intel Software Guard Extensions(SGX)while minimizing its inherent limitations.Given SGX’s constrained memory(≈90 MB in a personal computer)and susceptibility to side-channel attacks,we carefully manage its usage to reduce reliance while mitigating potential collusion risks between cloud service providers and users.To evaluate LUAR’s lightweight and universality,we integrate it with the classic BSW07 scheme,which can be seamlessly replaced with other ABE constructions.Experimental results demonstrate that LUAR enables secure attribute revocation with low computation and communication overhead.The processing time within the SGX environment remains stable at approximately 55 ms,regardless of the complexity of access policies,ensuring no additional storage or computational burden on SGX.Compared to the Hardware-based Revocable Attribute-Based Encryption(HR-ABE)scheme(IEEE S&P 2024),LUAR incurs a slightly higher computational cost within SGX;however,the overall time from initiating a data request to obtaining plaintext is shorter.As access policies grow more complex,LUAR’s advantages become increasingly evident,showcasing its superior efficiency and broader applicability. 展开更多
关键词 attribute-based encryption attribute revocation LIGHTWEIGHT UNIVERSALITY
在线阅读 下载PDF
Multi-dimensional optimization of polymer-involved Li^(+)solvation enabling stable polymer plastic crystal electrolyte for long-cycle lithium metal batteries
2
作者 Lianzhan Huang Yuanlong Wu +6 位作者 Piao Luo Kexin Su Xin Song Mingdong Liu Minjian Li Huiyu Song Zhiming Cui 《Journal of Energy Chemistry》 2026年第1期656-665,I0015,共11页
Succinonitrile(SN)-based polymer plastic crystal electrolytes(PPCEs)are regarded as promising candidates for lithium metal batteries but suffer from serious side reactions with Li metal.Herein,we propose a multi-dimen... Succinonitrile(SN)-based polymer plastic crystal electrolytes(PPCEs)are regarded as promising candidates for lithium metal batteries but suffer from serious side reactions with Li metal.Herein,we propose a multi-dimensional optimization strategy to alleviate the side reactions between SN and Li metal,and develop a highly stable poly-vinylethylene carbonate-based PPCE(PPCE-VEC).Moreover,we identify the intrinsic factors of multi-dimensional polymer structures on the electrolyte stability by three typical classes of polyesters.The PPCE-VEC constructed by in situ polymerization exhibits much better stability than poly-vinylene carbonate-based PPCE(PPCE-VCA)and poly-trifluoroethyl acrylate-based PPCE(PPCE-TFA),which is verified by its fewer SN-decomposition species in X-ray photoelectron spectroscopy(XPS)and outstanding full cell performance.The PPCE-VEC-enabled LiNi_(0.6)Co_(0.2)Mn_(0.2)O_(2)full cell achieve 73.7%capacity retention after 1400 cycles,which outperforms PPCE-VCA-and PPCE-TFA-enabled full cells(61.9%and 46.9%).Spectral analysis and theoretical calculation reveal that the high solvation ability of the carbonyl site,flexible polymer chain,and homogeneous electrolyte phase of PPCE-VEC are favorable to maximizing competition coordination with Li^(+)to weaken the Li^(+)–SN binding and shape an anion-rich solvation structure.This optimized polymer-involved Li^(+)solvation enhances SN stability and facilitates the formation of B/F enriched solid-electrolyte interphase(SEI),thus significantly improving PPCE stability. 展开更多
关键词 SUCCINONITRILE Li metal Polymer plastic crystal electrolytes multi-dimensional polymer structures
在线阅读 下载PDF
Composite anti-disturbance predictive control of unmanned systems with time-delay using multi-dimensional Taylor network 被引量:1
3
作者 Chenlong LI Wenshuo LI Zejun ZHANG 《Chinese Journal of Aeronautics》 2025年第7期589-600,共12页
A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source di... A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source disturbances are addressed according to their specific characteristics as follows:(A)an MTN data-driven model,which is used for uncertainty description,is designed accompanied with the mechanism model to represent the unmanned systems;(B)an adaptive MTN filter is used to remove the influence of the internal disturbance;(C)an MTN disturbance observer is constructed to estimate and compensate for the influence of the external disturbance;(D)the Extended Kalman Filter(EKF)algorithm is utilized as the learning mechanism for MTNs.Second,to address the time-delay effect,a recursiveτstep-ahead MTN predictive model is designed utilizing recursive technology,aiming to mitigate the impact of time-delay,and the EKF algorithm is employed as its learning mechanism.Then,the MTN predictive control law is designed based on the quadratic performance index.By implementing the proposed composite controller to unmanned systems,simultaneous feedforward compensation and feedback suppression to the multi-source disturbances are conducted.Finally,the convergence of the MTN and the stability of the closed-loop system are established utilizing the Lyapunov theorem.Two exemplary applications of unmanned systems involving unmanned vehicle and rigid spacecraft are presented to validate the effectiveness of the proposed approach. 展开更多
关键词 multi-dimensional Taylor network Composite anti-disturbance Predictive control Unmanned systems Multi-source disturbances TIME-DELAY
原文传递
Features of Prime Attributes in a Relation Scheme
4
作者 XU Yulu LIU Guohua +4 位作者 YU Xiaoxue LIU Changqi ZHU Dongyan ZHANG Limeng HE Songda 《Journal of Donghua University(English Edition)》 2025年第6期689-698,共10页
Normal forms have a significant role in the theory of relational database normalization.The definitions of normal forms are established through the functional dependency(FD)relationship between a prime or nonprime att... Normal forms have a significant role in the theory of relational database normalization.The definitions of normal forms are established through the functional dependency(FD)relationship between a prime or nonprime attribute and a key.However,determining whether an attribute is a prime attribute is a nondeterministic polynomial-time complete(NP-complete)problem,making it intractable to determine if a relation scheme is in a specific normal form.While the prime attribute problem is generally NP-complete,there are cases where identifying prime attributes is not challenging.In a relation scheme R(U,F),we partition U into four distinct subsets based on where attributes in U appear in F:U_(1)(attributes only appearing on the left-hand side of FDs),U_(2)(attributes only appearing on the right-hand side of FDs),U_(3)(attributes appearing on both sides of FDs),and U_(4)(attributes not present in F).Next,we demonstrate the necessary and sufficient conditions for a key to be the unique key of a relation scheme.Subsequently,we illustrate the features of prime attributes in U_(3) and generalize the features of common prime attributes.The findings lay the groundwork for distinguishing between complex and simple cases in prime attribute identification,thereby deepening the understanding of this problem. 展开更多
关键词 NORMALIZATION KEY prime attribute nonprime attribute
在线阅读 下载PDF
Retraced Multi-dimensional Chinese Logic System behind Chinese Medicine
5
作者 Edwin C.L.Yu 《Chinese Medicine and Culture》 2025年第1期1-12,共12页
The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed... The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed out from such logic system. This article aims to rearticulate the underlying lucid multi-dimensional logic system, which faded in obscurity only because of time-out loss of the mid-right concept. Retracing this past tacit but important concept could uncover a multi-dimensional system over a point relating to all matters while capturing the central core of the matter. The seemingly unmanageable multidimensional logic was strengthened by verification processes which affirmed its further extensions, and made up the language of the people, the concepts of yin-yang(阴阳), and the development of extensions of Ba Gua(八卦) derivatives, which furthered the interpretation of the space-time properties and Chinese medicine. 展开更多
关键词 multi-dimensional logic system Traditional Chinese medicine YIN-YANG
暂未订购
Effective stress dissipation by multi-dimensional architecture engineering for ultrafast and ultralong sodium storage
6
作者 Man Zhang Jing Zhu +7 位作者 Qianqian Li Fenghua Zheng Sijiang Hu Youguo Huang Hongqiang Wang Xing Ou Qichang Pan Qingyu Li 《Journal of Energy Chemistry》 2025年第2期619-629,I0013,共12页
Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial... Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial for acquiring stable NiSe2-based materials for sodium-ion batteries(SIBs),Herein,a stress dissipation strategy driven by architecture engineering is proposed,which can achieve ultrafast and ultralong sodium storage properties.Different from the conventional sphere-like or rod-like architecture,the three-dimensional(3D)flower-like NiSe_(2)@C composite is delicately designed and assembled with onedimensional nanorods and carbon framework.More importantly,the fundamental mechanism of improved structure stability is unveiled by simulations and experimental results simultaneously.It demonstrates that this designed multidimensional flower-like architecture with dispersed nanorods can balance the structural mismatch,avoid concentrated local strain,and relax the internal stress,mainly induced by the unavoidable volume variation during the repeated conversion processes.Moreover,it can provide more Na^(+)-storage sites and multi-directional migration pathways,leading to a fast Na^(+)-migration channel with boosted reaction kinetic.As expected,it delivers superior rate performance(441 mA h g^(-1)at 5.0 A g^(-1))and long cycling stability(563 mA h g^(-1)at 1.0 A g^(-1)over 1000 cycles)for SIBs.This work provides useful insights for designing high-performance conversion-based anode materials for SIBs. 展开更多
关键词 Stress dissipation multi-dimensional architecture Structure engineering Conversion-based anodes Sodium-ion batteries
在线阅读 下载PDF
Research on Multi-Dimensional Collaborative Strategies in Design Management,Investment Management,and Beyond from the Perspective of Whole-Process Engineering Consulting
7
作者 Zexin Chen 《Journal of Architectural Research and Development》 2025年第5期21-28,共8页
This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses ... This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses the construction of multi-dimensional collaborative theoretical models,public space streamline organization,and other aspects,emphasizing the importance of multi-dimensional collaboration.Additionally,it highlights the role of talent cultivation and digital transformation in enhancing project efficiency. 展开更多
关键词 Whole-process engineering consulting multi-dimensional collaboration Project efficiency
在线阅读 下载PDF
A Study on Re-Identification of Natural Language Data Considering Korean Attributes
8
作者 Segyeong Bang Soeun Kim +2 位作者 Gaeun Ahn Hyemin Hong Junhyoung Oh 《Computers, Materials & Continua》 2025年第12期4629-4643,共15页
This study analyzes the risks of re-identification in Korean text data and proposes a secure,ethical approach to data anonymization.Following the‘Lee Luda’AI chatbot incident,concerns over data privacy have increase... This study analyzes the risks of re-identification in Korean text data and proposes a secure,ethical approach to data anonymization.Following the‘Lee Luda’AI chatbot incident,concerns over data privacy have increased.The Personal Information Protection Commission of Korea conducted inspections of AI services,uncovering 850 cases of personal information in user input datasets,highlighting the need for pseudonymization standards.While current anonymization techniques remove personal data like names,phone numbers,and addresses,linguistic features such as writing habits and language-specific traits can still identify individuals when combined with other data.To address this,we analyzed 50,000 Korean text samples from the X platform,focusing on language-specific features for authorship attribution.Unlike English,Korean features flexible syntax,honorifics,syllabic and grapheme patterns,and referential terms.These linguistic characteristics were used to enhance re-identification accuracy.Our experiments combined five machine learning models,six stopword processing methods,and four morphological analyzers.By using a tokenizer that captures word frequency and order,and employing the LSTM model,OKT morphological analyzer,and stopword removal,we achieved the maximum authorship attributions accuracy of 90.51%.This demonstrates the significant role of Korean linguistic features in re-identification.The findings emphasize the risk of re-identification through language data and call for a re-evaluation of anonymization methods,urging the consideration of linguistic traits in anonymization beyond simply removing personal information. 展开更多
关键词 Re-identification data anonymization authorship attributions Korean text
在线阅读 下载PDF
Overlapping community detection on attributed graphs via neutrosophic C-means
9
作者 Yuhan Jia Leyan Ouyang +1 位作者 Qiqi Wang Huijia Li 《Chinese Physics B》 2025年第12期569-580,共12页
Detecting overlapping communities in attributed networks remains a significant challenge due to the complexity of jointly modeling topological structure and node attributes,the unknown number of communities,and the ne... Detecting overlapping communities in attributed networks remains a significant challenge due to the complexity of jointly modeling topological structure and node attributes,the unknown number of communities,and the need to capture nodes with multiple memberships.To address these issues,we propose a novel framework named density peaks clustering with neutrosophic C-means.First,we construct a consensus embedding by aligning structure-based and attribute-based representations using spectral decomposition and canonical correlation analysis.Then,an improved density peaks algorithm automatically estimates the number of communities and selects initial cluster centers based on a newly designed cluster strength metric.Finally,a neutrosophic C-means algorithm refines the community assignments,modeling uncertainty and overlap explicitly.Experimental results on synthetic and real-world networks demonstrate that the proposed method achieves superior performance in terms of detection accuracy,stability,and its ability to identify overlapping structures. 展开更多
关键词 attributed graphs overlapping communities neutrosophic C-means density peaks
原文传递
Practical Application of the Multi-Dimensional Interactive Teaching Model in College English
10
作者 Bo Sun 《Journal of Contemporary Educational Research》 2025年第10期106-111,共6页
The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themse... The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themselves.This paper explores practical strategies for implementing this model,focusing on four key aspects:deepening teachers’understanding of the model through continuous learning,innovating interactive methods such as questioning techniques and practical activities,leveraging modern technology to integrate resources and track learning progress,and establishing a communication platform that centers on student participation.By adopting these approaches,the model fosters a student-centered classroom environment,improves comprehensive English application skills,and optimizes overall teaching quality. 展开更多
关键词 multi-dimensional interactive teaching model Student-centered approach Teacher-student interaction
在线阅读 下载PDF
Linguistic Steganography Based on Sentence Attribute Encoding
11
作者 Lingyun Xiang Xu He +1 位作者 Xi Zhang Chengfu Ou 《Computers, Materials & Continua》 2025年第8期2375-2389,共15页
Linguistic steganography(LS)aims to embed secret information into normal natural text for covert communication.It includes modification-based(MLS)and generation-based(GLS)methods.MLS often relies on limited manual rul... Linguistic steganography(LS)aims to embed secret information into normal natural text for covert communication.It includes modification-based(MLS)and generation-based(GLS)methods.MLS often relies on limited manual rules,resulting in low embedding capacity,while GLS achieves higher embedding capacity through automatic text generation but typically ignores extraction efficiency.To address this,we propose a sentence attribute encodingbased MLS method that enhances extraction efficiency while maintaining strong performance.The proposed method designs a lightweight semantic attribute analyzer to encode sentence attributes for embedding secret information.When the attribute values of the cover sentence differ from the secret information to be embedded,a semantic attribute adjuster based on paraphrasing is used to automatically generate paraphrase sentences of the target attribute,thereby improving the problem of insufficient manual rules.During the extraction,secret information can be extracted solely by employing the semantic attribute analyzer,thereby eliminating the dependence on the paraphrasing generation model.Experimental results show that thismethod achieves an extraction speed of 1141.54 bits/sec,compared with the existing methods,it has remarkable advantages regarding extraction speed.Meanwhile,the stego text generated by thismethod respectively reaches 68.53,39.88,and 80.77 on BLEU,△PPL,and BERTScore.Compared with the existing methods,the text quality is effectively improved. 展开更多
关键词 Linguistic steganography paraphrase generation semantic attribute
在线阅读 下载PDF
Construction of the Practice System of Landscape Architecture Major Based on“Multi-dimensional Integration”
12
作者 LI Yinan DING Juan +4 位作者 ZHU Yan WU Jing ZHAO Zhiyan LI Jie XIANG Cheng 《Journal of Landscape Research》 2025年第3期89-92,共4页
During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for culti... During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for cultivating local talents,have pain points such as uneven quality of teachers and students and weak innovation and practice.The practice system with“multi-dimensional Integration”integrates four dimensions:interdisciplinary integration,spatial and temporal intersection,historical inheritance,and behavioral activity,deepens the disciplinary connotation,and integrates the three elements of nature,humanity,and technology,aiming to provide a new path for private colleges and universities to cultivate application-oriented and compound talents with innovative capabilities.In terms of optimizing talent cultivation and adapting to industry changes,this system provides thinking and reference for landscape architecture major,helping the major reshape its core competitiveness and promoting educational innovation and industry development. 展开更多
关键词 Landscape architecture Practice system multi-dimensional integration”model Talent cultivation Teaching reform
在线阅读 下载PDF
Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network
13
作者 Aodi Liu Xuehui Du +1 位作者 Na Wang Xiangyu Wu 《Computers, Materials & Continua》 2025年第4期1495-1513,共19页
Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribut... Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources. 展开更多
关键词 Access control ABAC model attribute mining capsule network deep learning
在线阅读 下载PDF
Reliability of multi-dimensional network systems with nodes having stochastic connection ranges
14
作者 FU Yuqiang MA Xiaoyang ZHAO Fei 《Journal of Systems Engineering and Electronics》 2025年第4期1017-1023,共7页
This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with... This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with one source element and multiple sink elements is considered first.Each element can con-nect with other elements within a stochastic connection ranges.The system is regarded as successful as long as the source ele-ment remains connected with all sink elements.An importance measure is proposed to evaluate the performance of non-source elements.Furthermore,to calculate the system reliability and the element importance measure,a multi-valued decision diagram based approach is structured and its complexity is analyzed.Finally,a numerical example about the signal transfer station system is illustrated to analyze the system reliability and the ele-ment importance measure. 展开更多
关键词 multi-dimensional network multi-valued decision diagram stochastic connection range reliability analysis impor-tance measure.
在线阅读 下载PDF
A Seismic Multi-Attribute Sandbody Identification Method Based on the LightGBMRFECV Coupling Algorithm
15
作者 Teng-fei Ren Zhi-bing Feng +6 位作者 Ying Zhang Xiang Zhang Li Jiang Yuan-li Ning Jing-yi Wang Jian Ding Zeng-shuo Qi 《Applied Geophysics》 2025年第3期757-769,895,共14页
Seismic attributes encapsulate substantial reservoir characterization information and can effectively support reservoir prediction.Given the high-dimensional nonlinear between sandbodies and seismic attributes,this st... Seismic attributes encapsulate substantial reservoir characterization information and can effectively support reservoir prediction.Given the high-dimensional nonlinear between sandbodies and seismic attributes,this study employs the RFECV method for seismic attribute selection,inputting the optimized attributes into a LightGBM model to enhance spatial delineation of sandbody identification.By constructing training datasets based on optimized seismic attributes and well logs,followed by class imbalance correction as input variables for machine learning models,with sandbody probability as the output variable,and employing grid search to optimize model parameters,a high-precision sandbody prediction model was established.Taking the 3D seismic data of Block F3 in the North Sea of Holland as an example,this method successfully depicted the three-dimensional spatial distribution of target formation sandstones.The results indicate that even under strong noise conditions,the multi-attribute sandbody identification method based on LightGBM effectively characterizes the distribution features of sandbodies.Compared to unselected attributes,the prediction results using selected attributes have higher vertical resolution and inter-well conformity,with the prediction accuracy for single wells reaching 80.77%,significantly improving the accuracy of sandbody boundary delineation. 展开更多
关键词 Sandbody identification Seismic attributes LightGBM model RFECV method
在线阅读 下载PDF
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection
16
作者 Xu Yang Hongyan Xing +2 位作者 Xinyuan Ji Xin Su Witold Pedrycz 《Digital Communications and Networks》 2025年第1期234-245,共12页
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain models.It is especially important to evaluate and determine the particularly Weather Attribute(WA)... Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain models.It is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and authenticity.In this paper,a strategy is proposed to integrate three currently competitive WA's evaluation methods.First,a conventional evaluation method based on AEF statistical indicators is selected.Subsequent evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy c-means.Different AEF attributes contribute to a more accurate AEF classification to different degrees.The resulting dynamic weighting applied to these attributes improves the classification accuracy.Each evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation score.The integration in the proposed strategy takes the form of a score accumulation.Different cumulative score levels correspond to different final WA results.Thunderstorm imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm attributes.Empirical results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA evaluation.This is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection. 展开更多
关键词 Atmospheric electric field(AEF) THUNDERSTORM attribute Fuzzy c-means IMAGING
在线阅读 下载PDF
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
17
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
Several Attacks on Attribute-Based Encryption Schemes
18
作者 Phi Thuong Le Huy Quoc Le Viet Cuong Trinh 《Computers, Materials & Continua》 2025年第6期4741-4756,共16页
Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digita... Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digital rightsmanagement.ABE schemes rely on hard cryptographic assumptions such as pairings and others(pairingfree)to ensure their security against external and internal attacks.Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent.One common internal attack is the attribute collusion attack,in which users with different attribute keys collaborate to decrypt data they could not individually access.This paper focuses on the ciphertext-policy ABE(CP-ABE),a type of ABE where ciphertexts are produced with access policies.Our firstwork is to carry out the attribute collusion attack against several existing pairingfree CP-ABE schemes.As a main contribution,we introduce a novel attack,termed the anonymous key-leakage attack,concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection.This kind of internal attack has not been defined or investigated in the literature.We then show that several prominent pairing-based CP-ABE schemes are vulnerable to this attack.We believe that this work will contribute to helping the community evaluate suitable CP-ABE schemes for secure deployment in real-life applications. 展开更多
关键词 attribute-based encryption ciphertext-policy attribute collusion attack anonymous key-leakage attack
在线阅读 下载PDF
Extracting fuzzy clusters from massive attributed graphs using Markov lumpability optimization
19
作者 Kai-Yue Jiang Li-Heng Xu +3 位作者 Shi-Pei Lin Li-Yang Zhou Hui-Jia Li Ge Gao 《Chinese Physics B》 2025年第10期609-617,共9页
Attributed graph clustering plays a vital role in uncovering hidden network structures,but it presents significant challenges.In recent years,various models have been proposed to identify meaningful clusters by integr... Attributed graph clustering plays a vital role in uncovering hidden network structures,but it presents significant challenges.In recent years,various models have been proposed to identify meaningful clusters by integrating both structural and attribute-based information.However,these models often emphasize node proximities without adequately balancing the efficiency of clustering based on both structural and attribute data.Furthermore,they tend to neglect the critical fuzzy information inherent in attributed graph clusters.To address these issues,we introduce a new framework,Markov lumpability optimization,for efficient clustering of large-scale attributed graphs.Specifically,we define a lumped Markov chain on an attribute-augmented graph and introduce a new metric,Markov lumpability,to quantify the differences between the original and lumped Markov transition probability matrices.To minimize this measure,we propose a conjugate gradient projectionbased approach that ensures the partitioning closely aligns with the intrinsic structure of fuzzy clusters through conditional optimization.Extensive experiments on both synthetic and real-world datasets demonstrate the superior performance of the proposed framework compared to existing clustering algorithms.This framework has many potential applications,including dynamic community analysis of social networks,user profiling in recommendation systems,functional module identification in biological molecular networks,and financial risk control,offering a new paradigm for mining complex patterns in high-dimensional attributed graph data. 展开更多
关键词 attributed clustering Markov chain lumped random walk fuzzy clusters OPTIMIZATION
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部