期刊文献+
共找到5,207篇文章
< 1 2 250 >
每页显示 20 50 100
Laboratory or Department?Exploration and Creation in Computer Science and Technology
1
作者 Ann Copestake 《计算机教育》 2024年第3期13-16,共4页
In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in it... In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem. 展开更多
关键词 Laboratory or department University of Cambridge Boundaries Exploration and creativity
在线阅读 下载PDF
Editorial: Moving Forward to Respond to Rapid Changes of Computer Science and Technology
2
作者 Guo-Jie Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第1期1-1,共1页
Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating s... Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating scholarly and technical papers under a rigorous review process. 展开更多
关键词 EDITORIAL Moving Forward to Respond to Rapid Changes of Computer Science and Technology
原文传递
Exploration on the Construction of an Intelligent Educational Evaluation System Integrating the CIPP Model and Artificial Intelligence Technology from the Perspective of New Engineering
3
作者 Shun Yu Shasha Chen Yuxiu Li 《Journal of Contemporary Educational Research》 2025年第6期94-99,共6页
This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrat... This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrating the CIPP model with AI technology,a novel intelligent educational evaluation system was designed.Through experimental validation and case studies,the system demonstrated significant effectiveness in improving teaching quality,facilitating personalized student development,and optimizing educational resource allocation.Additionally,the study predicts potential changes this system could bring to the education industry and proposes relevant policy recommendations.Although the current research has limitations,with technological advancements in the future,this system is expected to provide stronger support for innovations in engineering education models. 展开更多
关键词 New engineering disciplines CIPP model Artificial intelligence Intelligent educational evaluation system Educational innovation
在线阅读 下载PDF
Detection of Rice Bacterial Leaf Blight Using Hyperspectral Technology and Continuous Wavelet Analysis
4
作者 Kaihao Shi Lin Yuan +5 位作者 Qimeng Yu Zhongting Shen Yingtan Yu Chenwei Nie Xingjian Zhou Jingcheng Zhang 《Phyton-International Journal of Experimental Botany》 2025年第7期2033-2054,共22页
Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-ban... Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-band spectra,hyperspectral technology has become a crucial tool to monitor crop diseases using remote sensing.However,existing continuous wavelet analysis(CWA)methods suffer from feature redundancy issues,while the continuous wavelet projection algorithm(CWPA),an optimization approach for feature selection,has not been fully validated to monitor plant diseases.This study utilized rice bacterial leaf blight(BLB)as an example by evaluating the performance of four wavelet basis functions-Gaussian2,Mexican hat,Meyer,andMorlet-within theCWAandCWPAframeworks.Additionally,the classification models were constructed using the k-nearest neighbors(KNN),randomforest(RF),and Naïve Bayes(NB)algorithms.The results showed the following:(1)Compared to traditional CWA,CWPA significantly reduced the number of required features.Under the CWPA framework,almost all the model combinations achieved maximum classification accuracy with only one feature.In contrast,the CWA framework required three to seven features.(2)Thechoice of wavelet basis functions markedly affected the performance of themodel.Of the four functions tested,the Meyer wavelet demonstrated the best overall performance in both the CWPA and CWA frameworks.(3)Under theCWPAframework,theMeyer-KNNandMeyer-NBcombinations achieved the highest overall accuracy of 93.75%using just one feature.In contrast,under the CWA framework,the CWA-RF combination achieved comparable accuracy(93.75%)but required six features.This study verified the technical advantages of CWPA for monitoring crop diseases,identified an optimal wavelet basis function selection scheme,and provided reliable technical support to precisely monitor BLB in rice(Oryza sativa).Moreover,the proposed methodological framework offers a scalable approach for the early diagnosis and assessment of plant stress,which can contribute to improved accuracy and timeliness when plant stress is monitored. 展开更多
关键词 HYPERSPECTRAL continuous wavelet analysis continuous wavelet projection algorithm wavelet basis function disease monitoring
在线阅读 下载PDF
Rockfall kinematics and restitution coefficients via inertial navigation technology
5
作者 XIE Hui LIANG Feng +3 位作者 SHI Wenbing LU Yancheng CONG Junyu LUO Yixin 《Journal of Mountain Science》 2025年第11期4093-4112,共20页
Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters ... Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters of rockfall movement is critical for understanding motion patterns and effectively preventing and controlling rockfall hazards.In this study,a monitoring system consisting of selfdeveloped inertial navigation equipment,high-speed cameras,and an unmanned aerial vehicle was used to conduct onsite motion tests involving four differently shaped rock specimens on three types of slopes(bedrock,detritus,and clast bedding).The selfdeveloped inertial navigation system integrated a highdynamic-range accelerometer(±400 g)and a shockresistant gyroscope(±4000°/s),capable of robustly collecting data during the test.The data collected from these tests were processed to extract key kinematic parameters such as velocity,trajectory,restitution coefficients,and friction coefficients.The test results demonstrated that the inertial navigation system accurately recorded the acceleration and angular velocity of the rocks during motion,with these measurements closely aligning with the field data.The normal and tangential restitution coefficients were found to be influenced primarily by the slope material and impact angle,with higher normal restitution coefficients observed for low-angle impacts.The normal restitution coefficients ranged from 0.35 to 0.86,whereas the tangential restitution coefficients ranged from 0.46 to 0.91,depending on the slope materials.Additionally,the sliding friction coefficient was calculated to be between 0.66 and 0.78,whereas the rolling friction coefficient for the slab-shaped specimen was determined to be 0.53.These findings provide valuable data for improving the accuracy of rockfall trajectory predictions and the design of protective structures. 展开更多
关键词 ROCKFALL Inertial navigation technology Field tests Rockfall kinematic parameters Restitution coefficients
原文传递
Analysis on the University-enterprise Collaborative Training Path for Engineering Doctor from the Perspective of Deep Integration—Innovative Synergies in Talent and Technology Development
6
作者 Peirong Guo Mingjian Song +1 位作者 Chunwei Tian Qi Zhu 《计算机教育》 2025年第3期138-144,共7页
With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a d... With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a direct impact on the progress of national technological innovation and the upgrading of industrial structure.Currently,there are still some issues in the university-enterprise collaboration for engineering doctor training in China,such as unclear cooperation mechanisms and responsibility divisions,insufficient corporate participation and enthusiasm,and imperfect evaluation and feedback mechanisms.This paper aims to explore the university-enterprise collaborative training path of engineering doctors from the perspective of deep integration,analyzing multiple dimensions including training objectives,curriculum design,practical sessions,mentor teams,and evaluation systems,in order to provide reference for the reform and practice of engineering doctor training in China. 展开更多
关键词 Engineering doctor Deep integration University-enterprise collaborative training
在线阅读 下载PDF
Speech Emotion Recognition Based on the Adaptive Acoustic Enhancement and Refined Attention Mechanism
7
作者 Jun Li Chunyan Liang +1 位作者 Zhiguo Liu Fengpei Ge 《Computers, Materials & Continua》 2026年第3期2015-2039,共25页
To enhance speech emotion recognition capability,this study constructs a speech emotion recognition model integrating the adaptive acoustic mixup(AAM)and improved coordinate and shuffle attention(ICASA)methods.The AAM... To enhance speech emotion recognition capability,this study constructs a speech emotion recognition model integrating the adaptive acoustic mixup(AAM)and improved coordinate and shuffle attention(ICASA)methods.The AAM method optimizes data augmentation by combining a sample selection strategy and dynamic interpolation coefficients,thus enabling information fusion of speech data with different emotions at the acoustic level.The ICASA method enhances feature extraction capability through dynamic fusion of the improved coordinate attention(ICA)and shuffle attention(SA)techniques.The ICA technique reduces computational overhead by employing depth-separable convolution and an h-swish activation function and captures long-range dependencies of multi-scale time-frequency features using the attention weights.The SA technique promotes feature interaction through channel shuffling,which helps the model learn richer and more discriminative emotional features.Experimental results demonstrate that,compared to the baseline model,the proposed model improves the weighted accuracy by 5.42%and 4.54%,and the unweighted accuracy by 3.37%and 3.85%on the IEMOCAP and RAVDESS datasets,respectively.These improvements were confirmed to be statistically significant by independent samples t-tests,further supporting the practical reliability and applicability of the proposed model in real-world emotion-aware speech systems. 展开更多
关键词 Speech emotion recognition adaptive acoustic mixup enhancement improved coordinate attention shuffle attention attention mechanism deep learning
在线阅读 下载PDF
Keyword Spotting Based on Dual-Branch Broadcast Residual and Time-Frequency Coordinate Attention
8
作者 Zeyu Wang Jian-Hong Wang Kuo-Chun Hsu 《Computers, Materials & Continua》 2026年第4期333-352,共20页
In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and rec... In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge.To address this,we propose a novel time-frequency dual-branch parallel residual network,which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module.The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features,effectively avoiding the potential information loss caused by serial stacking,while enhancing information flow and multi-scale feature fusion.In terms of training strategy,a curriculum learning approach is introduced to progressively improve model robustness fromeasy to difficult tasks.Experimental results demonstrate that the proposed method consistently outperforms existing lightweight models under various signal-to-noise ratio(SNR)conditions,achieving superior far-field recognition performance on the Google Speech Commands V2 dataset.Notably,the model maintains stable performance even in low-SNR environments such as–10 dB,and generalizes well to unseen SNR conditions during training,validating its robustness to novel noise scenarios.Furthermore,the proposed model exhibits significantly fewer parameters,making it highly suitable for deployment on resource-limited devices.Overall,the model achieves a favorable balance between performance and parameter efficiency,demonstrating strong potential for practical applications. 展开更多
关键词 Keyword spotting convolutional neural network residual learning ATTENTION small footprint noisy far-field
在线阅读 下载PDF
ADCP-YOLO:A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops
9
作者 Changjun Zhou Dongfang Chen +1 位作者 Chenyang Shi Taiyong Li 《Computers, Materials & Continua》 2026年第3期1895-1919,共25页
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc... With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops. 展开更多
关键词 YOLO violation behavior detection AKConv CRGAM DWR Powerful-IoU
在线阅读 下载PDF
An Enhanced Feature Neural Network and Its Application in Detection of Colorectal Polyps
10
作者 LI Hailong LIU Guohua ZHAO Meng 《Journal of Donghua University(English Edition)》 2026年第1期32-40,共9页
The colorectal cancer is one of the most common and lethal cancers,and colorectal polyps,as precancerous lesions,can lead to diagnostic oversight or misdiagnosis due to their varied shapes and sizes,thereby promoting ... The colorectal cancer is one of the most common and lethal cancers,and colorectal polyps,as precancerous lesions,can lead to diagnostic oversight or misdiagnosis due to their varied shapes and sizes,thereby promoting the irreversible progression of colorectal cancer.We propose a YOLO based model and name it EF-YOLO.It incorporates transformer to extract contextual information about the colorectal polyps.Simultaneously,leveraging the morphological characteristics of colorectal polyps,we design a brand-new module,namely advanced multi-scale aggregation(AMSA),to replace the traditional multi-scale module.The backbone adopts deformable convolutional network-maxpool(DCN-MP)to enhance feature extraction while adaptively sampling points to better match the shapes of colorectal polyps.By combining coordinate attention(CA),this model maximizes the use of positional and channel information,more effectively extracting features of colorectal polyps,directing the model’s attention toward the colorectal polyp region.EF-YOLO has made advancement on the merged Kvasir-SEG and CVC-ClinicDB dataset.Compared to the original model,the mean average precision(mAP)of EF-YOLO increases and reaches 96.60%,meeting automated colorectal polyp detection requirements. 展开更多
关键词 colorectal polyp YOLO transformer deformable convolutional network-maxpool(DCN-MP) coordinate attention(CA)
在线阅读 下载PDF
FedReg^(*):Addressing Non-Independent and Identically Distributed Challenges in Federated Learning
11
作者 SHI Xiujin ZHU Xiaolong XIAO Wentao 《Journal of Donghua University(English Edition)》 2026年第1期41-49,共9页
In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a meth... In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency. 展开更多
关键词 federated learning non-independent and identically distributed(non-IID)data hybrid regularization cosine similarity
在线阅读 下载PDF
A Comprehensive Literature Review on YOLO-Based Small Object Detection:Methods,Challenges,and Future Trends
12
作者 Hui Yu Jun Liu Mingwei Lin 《Computers, Materials & Continua》 2026年第4期258-309,共52页
Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of... Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research. 展开更多
关键词 Small object detection YOLO real-time detection feature fusion deep learning
在线阅读 下载PDF
ES-YOLO:Edge and Shape Fusion-Based YOLO for Tra.c Sign Detection
13
作者 Weiguo Pan Songjie Du +2 位作者 Bingxin Xu Bin Zhang Hongzhe Liu 《Computers, Materials & Continua》 2026年第4期2127-2145,共19页
Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approa... Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approach in current practices.However,in complex and dynamic traffic scenes,particularly with smaller traffic sign objects,challenges such as missed and false detections can lead to reduced overall detection accuracy.To address this issue,this paper proposes a detection algorithm that integrates edge and shape information.Recognizing that traffic signs have specific shapes and distinct edge contours,this paper introduces an edge feature extraction branch within the backbone network,enabling adaptive fusion with features of the same hierarchical level.Additionally,a shape prior convolution module is designed to replaces the first two convolutional modules of the backbone network,aimed at enhancing the model's perception ability for specific shape objects and reducing its sensitivity to background noise.The algorithm was evaluated on the CCTSDB and TT100k datasets,and compared to YOLOv8s,the mAP50 values increased by 3.0%and 10.4%,respectively,demonstrating the effectiveness of the proposed method in improving the accuracy of traffic sign detection. 展开更多
关键词 Traffic sign edge information shape prior feature fusion object detection
在线阅读 下载PDF
Command-agent:Reconstructing warfare simulation and command decision-making using large language models
14
作者 Mengwei Zhang Minchi Kuang +3 位作者 Heng Shi Jihong Zhu Jingyu Zhu Xiao Jiang 《Defence Technology(防务技术)》 2026年第2期294-313,共20页
War rehearsals have become increasingly important in national security due to the growing complexity of international affairs.However,traditional rehearsal methods,such as military chess simulations,are inefficient an... War rehearsals have become increasingly important in national security due to the growing complexity of international affairs.However,traditional rehearsal methods,such as military chess simulations,are inefficient and inflexible,with particularly pronounced limitations in command and decision-making.The overwhelming volume of information and high decision complexity hinder the realization of autonomous and agile command and control.To address this challenge,an intelligent warfare simulation framework named Command-Agent is proposed,which deeply integrates large language models(LLMs)with digital twin battlefields.By constructing a highly realistic battlefield environment through real-time simulation and multi-source data fusion,the natural language interaction capabilities of LLMs are leveraged to lower the command threshold and to enable autonomous command through the Observe-Orient-Decide-Act(OODA)feedback loop.Within the Command-Agent framework,a multimodel collaborative architecture is further adopted to decouple the decision-generation and command-execution functions of LLMs.By combining specialized models such as Deep Seek-R1 and MCTool,the limitations of single-model capabilities are overcome.MCTool is a lightweight execution model fine-tuned for military Function Calling tasks.The framework also introduces a Vector Knowledge Base to mitigate hallucinations commonly exhibited by LLMs.Experimental results demonstrate that Command-Agent not only enables natural language-driven simulation and control but also deeply understands commander intent.Leveraging the multi-model collaborative architecture,during red-blue UAV confrontations involving 2 to 8 UAVs,the integrated score is improved by an average of 41.8%compared to the single-agent system(MCTool),accompanied by a 161.8%optimization in the battle loss ratio.Furthermore,when compared with multi-agent systems lacking the knowledge base,the inclusion of the Vector Knowledge Base further improves overall performance by 16.8%.In comparison with the general model(Qwen2.5-7B),the fine-tuned MCTool leads by 5%in execution efficiency.Therefore,the proposed Command-Agent introduces a novel perspective to the military command system and offers a feasible solution for intelligent battlefield decision-making. 展开更多
关键词 Digital twin battlefield Large language models Multi-agent system Military command
在线阅读 下载PDF
Toward Secure and Auditable Data Sharing:A Cross-Chain CP-ABE Framework
15
作者 Ye Tian Zhuokun Fan Yifeng Zhang 《Computers, Materials & Continua》 2026年第4期1509-1529,共21页
Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy a... Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys. 展开更多
关键词 Data sharing blockchain attribute-based encryption dynamic permissions
在线阅读 下载PDF
LUAR:Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems
16
作者 Fei Tang Ping Wang +3 位作者 Jiang Yu Huihui Zhu Mengxue Qin Ling Yang 《Computers, Materials & Continua》 2026年第3期1628-1646,共19页
Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a piv... Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a pivotal role in maintaining security.However,existing key revocation mechanisms face two major challenges:(1)High overhead due to ciphertext and key updates,primarily stemming from the reliance on revocation lists during attribute revocation,which increases computation and communication costs.(2)Limited universality,as many attribute revocation mechanisms are tailored to specific ABE constructions,restricting their broader applicability.To address these challenges,we propose LUAR(Lightweight and Universal Attribute Revocation),a novel revocation mechanism that leverages Intel Software Guard Extensions(SGX)while minimizing its inherent limitations.Given SGX’s constrained memory(≈90 MB in a personal computer)and susceptibility to side-channel attacks,we carefully manage its usage to reduce reliance while mitigating potential collusion risks between cloud service providers and users.To evaluate LUAR’s lightweight and universality,we integrate it with the classic BSW07 scheme,which can be seamlessly replaced with other ABE constructions.Experimental results demonstrate that LUAR enables secure attribute revocation with low computation and communication overhead.The processing time within the SGX environment remains stable at approximately 55 ms,regardless of the complexity of access policies,ensuring no additional storage or computational burden on SGX.Compared to the Hardware-based Revocable Attribute-Based Encryption(HR-ABE)scheme(IEEE S&P 2024),LUAR incurs a slightly higher computational cost within SGX;however,the overall time from initiating a data request to obtaining plaintext is shorter.As access policies grow more complex,LUAR’s advantages become increasingly evident,showcasing its superior efficiency and broader applicability. 展开更多
关键词 Attribute-based encryption attribute revocation LIGHTWEIGHT UNIVERSALITY
在线阅读 下载PDF
A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix
17
作者 Hongyu Zhao Shengsheng Wang 《Computers, Materials & Continua》 2026年第1期636-660,共25页
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ... Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology. 展开更多
关键词 Image encryption spatiotemporal chaotic system chaotic fractal matrix cantor diagonal matrix
在线阅读 下载PDF
Design,Realization,and Evaluation of Faster End-to-End Data Transmission over Voice Channels
18
作者 Jian Huang Ming weiLi +2 位作者 Yulong Tian Yi Yao Hao Han 《Computers, Materials & Continua》 2026年第4期1650-1675,共26页
With the popularization of new technologies,telephone fraud has become the main means of stealing money and personal identity information.Taking inspiration from the website authentication mechanism,we propose an end-... With the popularization of new technologies,telephone fraud has become the main means of stealing money and personal identity information.Taking inspiration from the website authentication mechanism,we propose an end-to-end datamodem scheme that transmits the caller’s digital certificates through a voice channel for the recipient to verify the caller’s identity.Encoding useful information through voice channels is very difficult without the assistance of telecommunications providers.For example,speech activity detection may quickly classify encoded signals as nonspeech signals and reject input waveforms.To address this issue,we propose a novel modulation method based on linear frequency modulation that encodes 3 bits per symbol by varying its frequency,shape,and phase,alongside a lightweightMobileNetV3-Small-based demodulator for efficient and accurate signal decoding on resource-constrained devices.This method leverages the unique characteristics of linear frequency modulation signals,making them more easily transmitted and decoded in speech channels.To ensure reliable data delivery over unstable voice links,we further introduce a robust framing scheme with delimiter-based synchronization,a sample-level position remedying algorithm,and a feedback-driven retransmission mechanism.We have validated the feasibility and performance of our system through expanded real-world evaluations,demonstrating that it outperforms existing advanced methods in terms of robustness and data transfer rate.This technology establishes the foundational infrastructure for reliable certificate delivery over voice channels,which is crucial for achieving strong caller authentication and preventing telephone fraud at its root cause. 展开更多
关键词 Deep learning modulation CHIRP data over voice
在线阅读 下载PDF
Detecting and Mitigating Cyberattacks on Load Frequency Control with Battery Energy Storage System
19
作者 Yunhao Yu Fuhua Luo Zhenyong Zhang 《Computers, Materials & Continua》 2026年第4期1243-1261,共19页
This paper investigates the detection and mitigation of coordinated cyberattacks on Load Frequency Control(LFC)systems integrated with Battery Energy Storage Systems(BESS).As renewable energy sources gain greater pene... This paper investigates the detection and mitigation of coordinated cyberattacks on Load Frequency Control(LFC)systems integrated with Battery Energy Storage Systems(BESS).As renewable energy sources gain greater penetration,power grids are becoming increasingly vulnerable to cyber threats,potentially leading to frequency instability and widespread disruptions.We model two significant attack vectors:load-altering attacks(LAAs)and false data injection attacks(FDIAs)that corrupt frequency measurements.These are analyzed for their impact on grid frequency stability in both linear and nonlinear LFC models,incorporating generation rate constraints and nonlinear loads.A coordinated attack strategy is presented,combining LAAs and FDIAs to achieve stealthiness by concealing frequency deviations from system operators,thereby maximizing disruption while evading traditional detection.To counteract these threats,we propose an Unknown Input Observer(UIO)-based detection framework for linear and nonlinear LFCs.The UIO is designed using linear matrix inequalities(LMIs)to estimate system states while isolating unknown attack inputs,enabling attack detection through monitoring measurement residuals against a predefined threshold.For mitigation,we leverage BESS capabilities with two adaptive strategies:dynamic mitigation for dynamic LAAs,which tunes BESS parameters to enhance the system’s stability margin and accelerate convergence to equilibrium;and staticmitigation for static LAAs and FDIAs.Simulations show that the UIO achieves high detection accuracy,with residuals exceeding thresholds promptly under coordinated attacks,even in nonlinear models.Mitigation strategies reduce frequency deviations by up to 80%compared to unmitigated cases,restoring stability within seconds. 展开更多
关键词 Load frequency control CYBERSECURITY unknown input observer battery energy storage system
在线阅读 下载PDF
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
20
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部