期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
1
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
2
作者 Linlin Yuan Tiantian Zhang +2 位作者 Yuling Chen Yuxiang Yang Huang Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1561-1579,共19页
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff... The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss. 展开更多
关键词 Blockchain big data K-ANONYMITY 2-means clustering greedy algorithm mean-center method
在线阅读 下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
3
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
在线阅读 下载PDF
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
4
作者 Congcong Wang Chen Wang +1 位作者 Wenying Zheng Wei Gu 《Computers, Materials & Continua》 SCIE EI 2025年第1期799-816,共18页
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use... As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis. 展开更多
关键词 Smart grid data security privacy protection artificial intelligence data aggregation
在线阅读 下载PDF
Automation and parallelization scheme to accelerate pulsar observation data processing
5
作者 Xingnan Zhang Minghui Li 《Astronomical Techniques and Instruments》 2025年第4期226-238,共13页
Previous studies aiming to accelerate data processing have focused on enhancement algorithms,using the graphics processing unit(GPU)to speed up programs,and thread-level parallelism.These methods overlook maximizing t... Previous studies aiming to accelerate data processing have focused on enhancement algorithms,using the graphics processing unit(GPU)to speed up programs,and thread-level parallelism.These methods overlook maximizing the utilization of existing central processing unit(CPU)resources and reducing human and computational time costs via process automation.Accordingly,this paper proposes a scheme,called SSM,that combines“Srun job submission mode”,“Sbatch job submission mode”,and“Monitor function”.The SSM scheme includes three main modules:data management,command management,and resource management.Its core innovations are command splitting and parallel execution.The results show that this method effectively improves CPU utilization and reduces the time required for data processing.In terms of CPU utilization,the average value of this scheme is 89%.In contrast,the average CPU utilizations of“Srun job submission mode”and“Sbatch job submission mode”are significantly lower,at 43%and 52%,respectively.In terms of the data-processing time,SSM testing on the Five-hundred-meter Aperture Spherical radio Telescope(FAST)data requires only 5.5 h,compared with 8 h in the“Srun job submission mode”and 14 h in the“Sbatch job submission mode”.In addition,tests on the FAST and Parkes datasets demonstrate the universality of the SSM scheme,which can process data from different telescopes.The compatibility of the SSM scheme for pulsar searches is verified using 2 days of observational data from the globular cluster M2,with the scheme successfully discovering all published pulsars in M2. 展开更多
关键词 Astronomical data Parallel processing PulsaR Exploration and Search TOolkit(PRESTO) CPU FAST Parkes
在线阅读 下载PDF
DKP-ADS:Domain knowledge prompt combined with multi-task learning for assessment of foliar disease severity in staple crops
6
作者 Yujiao Dan Xingcai Wu +5 位作者 Ya Yu Ziang Zou R.D.S.M Gunarathna Peijia Yu Yuanyuan Xiao Qi Wang 《The Crop Journal》 2025年第6期1939-1954,共16页
Staple crops are the cornerstone of the food supply but are frequently threatened by plant diseases.Effective disease management,including disease identification and severity assessment,helps to better address these c... Staple crops are the cornerstone of the food supply but are frequently threatened by plant diseases.Effective disease management,including disease identification and severity assessment,helps to better address these challenges.Currently,methods for disease severity assessment typically rely on calculating the area proportion of disease segmentation regions or using classification networks for severity assessment.However,these methods require large amounts of labeled data and fail to quantify lesion proportions when using classification networks,leading to inaccurate evaluations.To address these issues,we propose an automated framework for disease severity assessment that combines multi-task learning and knowledge-driven large-model segmentation techniques.This framework includes an image information processor,a lesion and leaf segmentation module,and a disease severity assessment module.First,the image information processor utilizes a multi-task learning strategy to analyze input images comprehensively,ensuring a deep understanding of disease characteristics.Second,the lesion and leaf segmentation module employ prompt-driven large-model technology to accurately segment diseased areas and entire leaves,providing detailed visual analysis.Finally,the disease severity assessment module objectively evaluates the severity of the disease based on professional grading standards by calculating lesion area proportions.Additionally,we have developed a comprehensive database of diseased leaf images from major crops,including several task-specific datasets.Experimental results demonstrate that our framework can accurately identify and assess the types and severity of crop diseases,even without extensive labeled data.Codes and data are available at http://dkp-ads.samlab.cn/. 展开更多
关键词 Domain knowledge Prompt-driven Multi-task learning Staple crop Assessment of disease severity
在线阅读 下载PDF
Digital Twin-driven Inversion of Assembly Precision for Industrial Equipment:Challenges,Progress and Perspectives
7
作者 Dinghao Cheng Bingtao Hu +4 位作者 Yixiong Feng Jiangxin Yang Ruirui Zhong Tianyue Wang Jianrong Tan 《Chinese Journal of Mechanical Engineering》 2025年第6期1-24,共24页
Assembly precision greatly influences the performance of complex high-end equipment.The traditional industrial assembly process and deviation transfer are implicit and uncertain,causing problems like poor component fi... Assembly precision greatly influences the performance of complex high-end equipment.The traditional industrial assembly process and deviation transfer are implicit and uncertain,causing problems like poor component fit and hard-to-trace assembly stress concentration.Assemblers can only check whether the dimensional tolerance of the component design is exceeded step by step in combination with prior knowledge.Inversion in industrial assembly optimizes assembly and design by comparing real and theoretical results and doing inversion analysis to reduce assembly deviation.The digital twin(DT)technology visualizes and predicts the assembly process by mapping real and virtual model parameters and states simultaneously,expanding parameter range for inversion analysis and improving inversion result accuracy.Problems in improving industrial assembly precision and the significance and research status of DT-driven parametric inversion of assembly tools,processes and object precision are summarized.It analyzes vital technologies for assembly precision inversion such as multi-attribute assembly process parameter sensing,virtual modeling of high-fidelity assembly systems,twin synchronization of assembly process data models,multi-physical field simulation,and performance twin model construction of the assembly process.Combined with human-cyber-physical system,augmented reality,and generative intelligence,the outlook of DT-driven assembly precision inversion is proposed,providing support for DT's use in industrial assembly and precision improvement. 展开更多
关键词 Industrial assembly Digital twin Assembly precision INVERSION High-end equipment
在线阅读 下载PDF
Co-enhancement of doped N and oxygen vacancies on the photocatalytic performance of ceria:Mechanism and influence of crystal faces
8
作者 WANG Fan LI Jun-qi +3 位作者 MURALI Arun CHEN Chao-yi ZHANG Wei LAN Yuan-pei 《Journal of Central South University》 2025年第6期2129-2147,共19页
Nitrogen doping has significant effects on the photocatalytic performance of ceria(CeO_(2)),and the possible synergistic effect with the inevitably introduced abundant oxygen vacancies(OVs)is of great significance for... Nitrogen doping has significant effects on the photocatalytic performance of ceria(CeO_(2)),and the possible synergistic effect with the inevitably introduced abundant oxygen vacancies(OVs)is of great significance for further investigation,and the specifically exposed crystal faces of CeO_(2)may have an impact on the performance of nitrogen doped CeO_(2).Herein,nitrogen-doped CeO_(2)with different morphologies and exposed crystal faces was prepared,and its performances in the photocatalytic degradation of tetracycline(TC)or hydrogen production via water splitting were evaluated.Density functional theory(DFT)was used to simulate the band structures,density of states,and oxygen defect properties of different CeO_(2)structures.It was found that nitrogen doping and OVs synergistically promoted the catalytic activity of nitrogen-doped CeO_(2).In addition,the exposed crystal faces of CeO_(2)have significant effects on the introduction of nitrogen and the ease of OV generation,as well as the synergistic effect of nitrogen doping with OVs.Among them,the rod-like nitrogen-doped CeO_(2)with exposed(110)face(R-CeO_(2)-NH_(3))showed a photocatalytic degradation ratio of 73.59%for TC and hydrogen production of 156.89μmol/g,outperforming other prepared photocatalysts. 展开更多
关键词 nitrogen doping CeO 2 oxygen vacancies synergistic effect crystal faces PHOTOCATALYSIS
在线阅读 下载PDF
Ponzi Scheme Detection for Smart Contracts Based on Oversampling
9
作者 Yafei Liu Yuling Chen +2 位作者 Xuewei Wang Yuxiang Yang Chaoyue Tan 《Computers, Materials & Continua》 2026年第1期1065-1085,共21页
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ... As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods. 展开更多
关键词 Blockchain smart contracts Ponzi schemes class imbalance graph structure construction
在线阅读 下载PDF
A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications
10
作者 Haoran Wang Shuhong Yang +2 位作者 Kuan Shao Tao Xiao Zhenyong Zhang 《Computers, Materials & Continua》 2026年第1期1354-1371,共18页
With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan... With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail. 展开更多
关键词 Artificial Intelligence of Things(AIoT) convolutional neural network PRIVACY-PRESERVING fully homomorphic encryption
在线阅读 下载PDF
FIR-YOLACT:Fusion of ICIoU and Res2Net for YOLACT on Real-Time Vehicle Instance Segmentation 被引量:2
11
作者 Wen Dong Ziyan Liu +1 位作者 Mo Yang Ying Wu 《Computers, Materials & Continua》 SCIE EI 2023年第12期3551-3572,共22页
Autonomous driving technology has made a lot of outstanding achievements with deep learning,and the vehicle detection and classification algorithm has become one of the critical technologies of autonomous driving syst... Autonomous driving technology has made a lot of outstanding achievements with deep learning,and the vehicle detection and classification algorithm has become one of the critical technologies of autonomous driving systems.The vehicle instance segmentation can perform instance-level semantic parsing of vehicle information,which is more accurate and reliable than object detection.However,the existing instance segmentation algorithms still have the problems of poor mask prediction accuracy and low detection speed.Therefore,this paper proposes an advanced real-time instance segmentation model named FIR-YOLACT,which fuses the ICIoU(Improved Complete Intersection over Union)and Res2Net for the YOLACT algorithm.Specifically,the ICIoU function can effectively solve the degradation problem of the original CIoU loss function,and improve the training convergence speed and detection accuracy.The Res2Net module fused with the ECA(Efficient Channel Attention)Net is added to the model’s backbone network,which improves the multi-scale detection capability and mask prediction accuracy.Furthermore,the Cluster NMS(Non-Maximum Suppression)algorithm is introduced in the model’s bounding box regression to enhance the performance of detecting similarly occluded objects.The experimental results demonstrate the superiority of FIR-YOLACT to the based methods and the effectiveness of all components.The processing speed reaches 28 FPS,which meets the demands of real-time vehicle instance segmentation. 展开更多
关键词 Instance segmentation real-time vehicle detection YOLACT Res2Net ICIoU
在线阅读 下载PDF
Detection of Safety Helmet-Wearing Based on the YOLO_CA Model 被引量:2
12
作者 Xiaoqin Wu Songrong Qian Ming Yang 《Computers, Materials & Continua》 SCIE EI 2023年第12期3349-3366,共18页
Safety helmets can reduce head injuries from object impacts and lower the probability of safety accidents,as well as being of great significance to construction safety.However,for a variety of reasons,construction wor... Safety helmets can reduce head injuries from object impacts and lower the probability of safety accidents,as well as being of great significance to construction safety.However,for a variety of reasons,construction workers nowadays may not strictly enforce the rules of wearing safety helmets.In order to strengthen the safety of construction site,the traditional practice is to manage it through methods such as regular inspections by safety officers,but the cost is high and the effect is poor.With the popularization and application of construction site video monitoring,manual video monitoring has been realized for management,but the monitors need to be on duty at all times,and thus are prone to negligence.Therefore,this study establishes a lightweight model YOLO_CA based on YOLOv5 for the automatic detection of construction workers’helmet wearing,which overcomes the shortcomings of the current manual monitoring methods that are inefficient and expensive.The coordinate attention(CA)addition to the YOLOv5 backbone strengthens detection accuracy in complex scenes by extracting critical information and suppressing non-critical information.Further parameter compression with deeply separable convolution(DWConv).In addition,to improve the feature representation speed,we swap out C3 with a Ghost module,which decreases the floating-point operations needed for feature channel fusion,and CIOU_Loss was substituted with EIOU_Loss to enhance the algorithm’s localization accuracy.Therefore,the original model needs to be improved so as to enhance the detection of safety helmets.The experimental results show that the YOLO_CA model achieves good results in all indicators compared with the mainstream model.Compared with the original model,the mAP value of the optimized model increased by 1.13%,GFLOPs cut down by 17.5%,and there is a 6.84%decrease in the total model parameters,furthermore,the weight size cuts down by 4.26%,FPS increased by 39.58%,and the detection effect and model size of this model can meet the requirements of lightweight embedding. 展开更多
关键词 Safety helmet CA YOLOv5 ghost module
在线阅读 下载PDF
Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing 被引量:2
13
作者 Xinyi Qing Baopeng Ye +3 位作者 Yuanquan Shi Tao Li Yuling Chen Lei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3607-3624,共18页
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ... Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput. 展开更多
关键词 Blockchain internet of things storage optimization transaction verification cloud computing incentive mechanism
在线阅读 下载PDF
A common rule for the intermediate state caused by DNA mismatch in single-molecule experiments 被引量:1
14
作者 Xiaoya Song Chao Yang +2 位作者 Yuyu Feng Hu Chen Yanhui Liu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第5期158-166,共9页
Defective structures,such as DNA mismatches,occur in DNA with a high frequency in some biological processes.They are difficult to identify and have recently become the focus of singlemolecule investigations.Three sing... Defective structures,such as DNA mismatches,occur in DNA with a high frequency in some biological processes.They are difficult to identify and have recently become the focus of singlemolecule investigations.Three single-molecule experiments were successively conducted to detect the effects of DNA mismatch on the stability of DNA hairpins.However,there was no consensus regarding the results of the intermediate state caused by DNA mismatch.Based on the extended ox-DNA model,DNA mismatch was introduced to the stem of DNA hairpins with different stem lengths(12-20 bps)and 4T in hairpin loops.The intermediate state and its dependence on the position of the DNA mismatch in the stem from the hairpin loop were systematically studied.The results indicated that DNA mismatch definitely reduced the critical forces of DNA hairpins.At the same time,a common rule about the dependence of the intermediate state on the position of DNA mismatch was generalized in a phase diagram constructed in a phase space of a scaled position of DNA mismatch.Three segments on its diagonal line corresponded to the ranges of the scaled position of DNA mismatch[0,0.55),[0.55,0.85),and[0.85,1],respectively.In the[0.55,0.85)range,the extension probability distribution of DNA hairpins had unfolded,intermediate,and folded states.In contrast,in the other ranges[0,0.55)and[0.85,1],the extension probability distributions had unfolded and folded states.The scaled positions of DNA mismatch for the DNA hairpins used in the three single-molecule experiments(0.65,0.4736,and 0.5)fell in the ranges[0.55,0.85)and[0,0.55).Obviously,the common rule generalized in the phase diagram not only clarifies the nonconsensus between the three single-molecule experiments but also highlights the design of single-molecule experiments in the future. 展开更多
关键词 DNA mismatch intermediate state DNA hairpin Bell’s Model extended Ox-DNA model single-molecule experiment
原文传递
CoRE:Constrained Robustness Evaluation of Machine Learning-Based Stability Assessment for Power Systems 被引量:1
15
作者 Zhenyong Zhang David K.Y.Yau 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期557-559,共3页
Dear Editor,Machine learning(ML) approaches have been widely employed to enable real-time ML-based stability assessment(MLSA) of largescale automated electricity grids. However, the vulnerability of MLSA to malicious ... Dear Editor,Machine learning(ML) approaches have been widely employed to enable real-time ML-based stability assessment(MLSA) of largescale automated electricity grids. However, the vulnerability of MLSA to malicious cyber-attacks may lead to wrong decisions in operating the physical grid if its resilience properties are not well understood before deployment. Unlike adversarial ML in prior domains such as image processing, specific constraints of power systems that the attacker must obey in constructing adversarial samples require new research on MLSA vulnerability analysis for power systems. 展开更多
关键词 enable CONSTRAINTS Power
在线阅读 下载PDF
Diffusion of nanochannel-confined knot along a tensioned polymer
16
作者 Guobing Cai Yong Li +2 位作者 Yuyu Feng Zhouhui Deng Yanhui Liu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2024年第4期158-166,共9页
The knots frequently occur in biopolymer and their diffusion plays an active role in the gene regulation.In this work,Langevin dynamics simulations were carried out to detect the diffusion behaviours of a knot along a... The knots frequently occur in biopolymer and their diffusion plays an active role in the gene regulation.In this work,Langevin dynamics simulations were carried out to detect the diffusion behaviours of a knot along a tensioned polymer in different spatial constraints.The polymer accommodating a knot was tethered to two macrospheres to block the unravelling of the knot.As a result,the curves for the diffusion coefficients of the knot with different bending stiffness as a function of the tension in different spatial constraints were obtained.In the space without constraints or with weak constraints,the corresponding curves for the knot with relatively large bending stiffness exhibited two turnover behaviours.On the contrary,for the knot with relatively small bending stiffness,the diffusion coefficients were monotonically reduced with increasing tension.However,in a space with strong constraints,all the curves showed one turnover behaviour regardless of the bending stiffness.The turnover behaviours divided the curves into different regimes,and the dominant diffusion mechanisms in the regimes,namely,knot-region breathing,self-reptation,and internal friction,were clearly identified.The effective friction coefficientsξof the knots with 3_(1),4_(1),5_(1) and 5_(2) types as a function of the knot size N at a fixed tension were well fitted by the relationξ∝N.The effective friction coefficients of the knots at relatively large tension f>3 sharply increased with the knot complexity,which is not dependent on the spatial constraints.By contrast,the values of these coefficients at relatively small tension f≤3 were remarkably dependent on the spatial constraints.Our work not only provides valuable simulation results to assist the understanding of the diffusion of DNA knot,but also highlights the single-molecule design for the manipulation of DNA knots in future. 展开更多
关键词 KNOT langevin dynamics simulations diffusion coefficient self-reptation knot-region breathing internal friction
原文传递
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
17
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
在线阅读 下载PDF
Enhancement of low-temperature toughness of Fe-Mn-C-Al alloy by rare earth Ce-modified inclusions
18
作者 Guang-kai Yang Chang-ling Zhuang +2 位作者 Yi-zhuang Li Chen Hu Shao-bo Li 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2024年第1期157-173,共17页
Fe-Mn-C-Al alloys have been recognized as promising materials for certain low-temperature applications due to their exceptional mechanical properties and cost-effectiveness.However,their limited low-temperature toughn... Fe-Mn-C-Al alloys have been recognized as promising materials for certain low-temperature applications due to their exceptional mechanical properties and cost-effectiveness.However,their limited low-temperature toughness restricts their large-scale applications in specific scenarios.The influence of trace amounts of rare earth cerium(Ce)on the low-temperature toughness of Fe-18Mn-0.6C-1.8Al alloys was investigated.The addition of Ce effectively alters the inclu-sions in the alloy,transforming large-sized irregular inclusions into fine ellipsoidal rare earth inclusions.This leads to a significant reduction in both the proportion and average size of the inclusions,resulting in their effective dispersion throughout the matrix and improved cryogenic performance.The presence of Ce-containing inclusions within the matrix reduces stress concentration,thereby inhibiting microcrack formation and improving impact absorption energy.Specifi-cally,the addition of rare earth Ce alters the fracture behavior of the material at room temperature and low temperature,changing from brittle cleavage fracture to a more ductile failure mode.The impact toughness of the Fe-Mn-C-Al alloy is significantly improved by the addition of 0.0048 wt.%Ce,particularly at-196℃where the impact toughness reaches 103.6 J/cm^(2),representing an impressive improvement of 87.3%. 展开更多
关键词 Fe-Mn-C-Al alloy Rare earth Low-temperature toughness Inclusion Fracture
原文传递
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
19
作者 Renwan Bi Mingfeng Zhao +2 位作者 Zuobin Ying Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2024年第2期380-388,共9页
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders... With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders lack a balance between data benefits and privacy threats,leading to conservative data uploads and low revenue or excessive uploads and privacy breaches.To solve this problem,a Dynamic Privacy Measurement and Protection(DPMP)framework is proposed based on differential privacy and reinforcement learning.Firstly,a DPM model is designed to quantify the amount of data privacy,and a calculation method for personalized privacy threshold of different users is also designed.Furthermore,a Dynamic Private sensing data Selection(DPS)algorithm is proposed to help sensing users maximize data benefits within their privacy thresholds.Finally,theoretical analysis and ample experiment results show that DPMP framework is effective and efficient to achieve a balance between data benefits and sensing user privacy protection,in particular,the proposed DPMP framework has 63%and 23%higher training efficiency and data benefits,respectively,compared to the Monte Carlo algorithm. 展开更多
关键词 Mobile edge crowdsensing Dynamic privacy measurement Personalized privacy threshold Privacy protection Reinforcement learning
在线阅读 下载PDF
Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing
20
作者 Yonghao Zhang Yongtang Wu +2 位作者 Tao Li Hui Zhou Yuling Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期345-361,共17页
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the data.However,certain data is quite sensitive,and sharing it directly may violate privacy.Vertica... The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the data.However,certain data is quite sensitive,and sharing it directly may violate privacy.Vertical Federated Learning(VFL)is a secure distributed machine learning framework that completes joint model training by passing encryptedmodel parameters rather than raw data,so there is no data privacy leakage during the training process.Therefore,the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy.Typically,the VFL requires a third party for key distribution and decryption of training results.In this article,we employ the consortium blockchain instead of the traditional third party and design a VFL architecture based on the consortium blockchain for data sharing in MEC.More specifically,we propose a V-Raft consensus algorithm based on Verifiable Random Functions(VRFs),which is a variant of the Raft.The VRaft is able to elect leader quickly and stably to assist data demander and owner to complete data sharing by VFL.Moreover,we apply secret sharing todistribute the private key to avoid the situationwhere the training result cannot be decrypted if the leader crashes.Finally,we analyzed the performance of the V-Raft and carried out simulation experiments,and the results show that compared with Raft,the V-Raft has higher efficiency and better scalability. 展开更多
关键词 Mobile edge computing vertical federated learning consortium blockchain consensus algorithm
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部