期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
BUES: A Blockchain-Based Upgraded Email System
1
作者 Dawei Xu Fudong Wu +3 位作者 Liehuang Zhu Ruiguang Li Jiaqi Gao Yijie She 《China Communications》 SCIE CSCD 2022年第10期250-264,共15页
This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the securi... This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the security and stability of the system. The email content is extracted and stored in the blockchain network to achieve regulatory traceability between the email service provider and the higher-level organization. In turn, A Blockchain-based Upgraded Email System(BUES) is proposed. The defects of the existing traditional email system are addressed. Firstly, the threat model of the traditional email system is analyzed, and solutions are proposed for various threats. Then a system architecture consisting of the blockchain network, email servers, and users are constructed. The implementation of BUES is carried out, and the related experimental process and algorithm steps are given. After the experimental analysis, it is shown that BUES can ensure the security, reliability, efficiency, and traceability of email transmission. 展开更多
关键词 blockchain email service chaincode hyperledger fabric
在线阅读 下载PDF
Road Distance Computation Using Homomorphic Encryption in Road Networks
2
作者 Haining Yu Lailai Yin +3 位作者 Hongli Zhang Dongyang Zhan Jiaxing Qu Guangyao Zhang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3445-3458,共14页
Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services.The shortest road distance computation has been considered as one of the m... Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services.The shortest road distance computation has been considered as one of the most fundamental operations of road networks computation.To alleviate privacy concerns about location privacy leaks during road distance computation,it is desirable to have a secure and efficient road distance computation approach.In this paper,we propose two secure road distance computation approaches,which can compute road distance over encrypted data efficiently.An approximate road distance computation approach is designed by using Partially Homomorphic Encryption and road network set embedding.An exact road distance computation is built by using Somewhat Homomorphic Encryption and road network hypercube embedding.We implement our two road distance computation approaches,and evaluate them on the real cityscale road network.Evaluation results show that our approaches are accurate and efficient. 展开更多
关键词 Road network road distance homomorphic encryption
在线阅读 下载PDF
A Markovian-Bernoulli watermark for platoon replay attack detection
3
作者 Jinhu Lü Nan SUN +2 位作者 Wei WANG Hao WU Kexin LIU 《Science China(Technological Sciences)》 2025年第5期175-184,共10页
This study addresses the challenge of detecting replay attacks within the stable states in vehicular platoons.In accordance with the zonotopic set-membership filtering algorithm,the detection of attacks is conducted b... This study addresses the challenge of detecting replay attacks within the stable states in vehicular platoons.In accordance with the zonotopic set-membership filtering algorithm,the detection of attacks is conducted by evaluating the presence of an intersection between the prediction set and the measurement set.In the stable state of the vehicle platoon,replay attacks may potentially bypass attack detectors based on the set-membership filtering algorithm.To address the replay attack false negative issue,a watermark design scheme based on Markovian-Bernoulli processes is proposed,and the impacts of this watermark design on system performance and attack detection capability are discussed.By addressing pertinent optimization problems,effective parameters selection for the watermark is achieved,striking a balance between security and control performance.The effectiveness of this method is validated through numerical simulations. 展开更多
关键词 zonotopic set-membership filtering Markovian-Bernoulli watermark platoon replay attack
原文传递
Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM 被引量:7
4
作者 Lei Zhang Chenbo Xu +3 位作者 Yihua Gao Yi Han Xiaojiang Du Zhihong Tian 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第6期712-720,共9页
In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be obtained.Due to the above characteristics,data mining and deep lea... In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be obtained.Due to the above characteristics,data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games.As one of the world’s most famous e-sports events,Dota2 has a large audience base and a good game system.A victory in a game is often associated with a hero’s match,and players are often unable to pick the best lineup to compete.To solve this problem,in this paper,we present an improved bidirectional Long Short-Term Memory(LSTM)neural network model for Dota2 lineup recommendations.The model uses the Continuous Bag Of Words(CBOW)model in the Word2 vec model to generate hero vectors.The CBOW model can predict the context of a word in a sentence.Accordingly,a word is transformed into a hero,a sentence into a lineup,and a word vector into a hero vector,the model applied in this article recommends the last hero according to the first four heroes selected first,thereby solving a series of recommendation problems. 展开更多
关键词 Word2vec mutiplayer online battle arena games Continuous Bag Of Words(CBOW)model Long Short-Term Memory(LSTM)
原文传递
The Impact of Policy on the Clustering of the Blockchain Industry Evidence from GMM Estimates
5
作者 Xiaolei Xu Zhen Wu +2 位作者 Xiaotuo Qiao Yuxi Zhang Haifeng Guo 《国际计算机前沿大会会议论文集》 2022年第2期465-474,共10页
Although local governments in China are encouraging the development of blockchain technology,the regional clustering of the blockchain industry still shows obvious differentiation.We use blockchain industry-related da... Although local governments in China are encouraging the development of blockchain technology,the regional clustering of the blockchain industry still shows obvious differentiation.We use blockchain industry-related data during the period 2012–2019 to calculate the blockchain industrial clustering of each province in China.We find that the clustering state of the blockchain industry is quite different from the state of other industries and the situation of economic development in the same region.In less-developed regions,the blockchain industry is more prominent,which may benefit from local government management.We conduct an empirical analysis on the relationship between blockchain industrial clustering and regional government management using the generalized method of moments(GMM)of a dynamic panel.The results show that government management has a positive promoting effect on local blockchain industrial clustering as a whole,among which the promotion from economy,technology,infrastructure and policy is more significant. 展开更多
关键词 Blockchain industrial clustering Government management GMM method
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部