Showing 5,661 - 5,680 results of 9,720 for search '"Securities ', query time: 0.22s Refine Results
  1. 5661

    Survey of research on multimodal semantic communication by Zhijin QIN, Tantan ZHAO, Fan LI, Xiaoming TAO

    Published 2023-05-01
    “…With the cross-integration of artificial intelligence and communications, technologies for processing multimodal data such as text, image, audio, and video are booming, the shared dimension of modal semantics is deeply excavated, and the characteristics of multimodal semantic information such as high abstraction, intelligence and simplicity are being fully utilized, which brings new ideas and means to semantic communications.First, the fundamental theories and classifications of semantic communication were introduced, and the research status of single-modal semantic communication was reviewed for text, image, audio, and video respectively.Then, the research status of multimodal semantic communication was reviewed, and multimodal data fusion technology and secure semantic communication were introduced.Finally, the challenges faced by multimodal semantic communication were summarized.…”
    Get full text
    Article
  2. 5662

    Intelligent machine-type communication and network for 6G system by Xu CHEN, Zhiqing WEI, Zhiyong FENG, Miao PAN

    Published 2020-03-01
    “…With the rapid development of smart city,smart manufacturing and other industries,machine-type communication has gained much attention of academia and industry.The extent of function integration and intelligence of machine-type communication network has become increasingly high,which imposes more stringent requirements on network delay,reliability,number of connected devices,peak rate,security and scalability.Based on analyzing the change of performance requirements,key technology and corresponding network architecture of machine-type communication network in 4G,5G to future 6G system,the intelligent sensing-communication-computation integrated network architecture was proposed for 6G machine-type communication network.…”
    Get full text
    Article
  3. 5663

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  4. 5664

    Review on cross-chain technology research of blockchains by Chuannian SHEN

    Published 2022-12-01
    “…With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains inevitably forms the value island effect of the blockchain.Cross-chain technology is an important technical means to realize industrial collaboration and value circulation between different blockchains and improve their interoperability and scalability.Firstly, the basic concept of cross-chain was introduced.And then, the technical difficulties of cross-chain, the technical characteristics of the main mechanism of cross-chain, and the security of cross-chain were analyzed in detail.Finally, the challenges faced by the current cross-chain technology were introduced, and the future development of cross-chain technology was prospected.…”
    Get full text
    Article
  5. 5665

    Dual-proxy key-based threshold signature scheme for ship ad-hoc network by Ming XU, Xuru LI, Chaobin LIU, Yao MA

    Published 2018-07-01
    “…In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold proxy signature scheme and the properties of bilinear pairings.The proposed scheme used the dual-proxy key and the threshold signature mechanism to enable the ship nodes calculate the message signature in polynomial time.Moreover,the security of the scheme was also proved under the random oracle model.The performance analysis results show that the proposed scheme can meet the requirement of strong proxy signature under the premise of guaranteeing correctness,and has lower computational cost and communication cost.…”
    Get full text
    Article
  6. 5666

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  7. 5667

    Les effets de la précarité du travail sur la santé : le droit du travail peut-il s’en saisir ? by Loïc Lerouge

    Published 2009-05-01
    “…In addition to this suffering, this phenomenon has a cost not only for the victims, but also for social security and the company. As well, labour law must be able to take the labour market reconfiguration into account in order to improve working conditions. …”
    Get full text
    Article
  8. 5668

    Housing for the elderly and digital technologies. Perspectives, processes and future scenarios by Anna Mangiatordi

    Published 2020-12-01
    “…Starting from the study of ‘smart homes’ prototype models, the contribution proposes a critical reflection on processes, products and services that could be implemented in future housing for the elderly, facilitating new forms of well-being, security and social inclusion. Compared to ongoing experimental researches, new possible dynamics of innovation in processes and products are delineated, hypothesizing the application of smart systems to real living environments for the elderly.…”
    Get full text
    Article
  9. 5669

    Projevy odporu proti nastupující kolektivizaci na Novobydžovsku by Jiří Urban

    Published 2012-01-01
    “…The author also puts forward a detailed analysis of the State Security (StB) provocation action, for which the setting up of informers among anti-communist leaning members of the population became a primary task. …”
    Get full text
    Article
  10. 5670

    LoRaWAN technologies for enabling new generation Internet of things by Chaojie GU, Rui TAN

    Published 2021-06-01
    “…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
    Get full text
    Article
  11. 5671

    How to Design a Study and Write a Grant in Radiology? by Pankaj Gupta, Manphool Singhal

    Published 2025-01-01
    “…Thus, it is essential for academic radiologists pursuing research in radiology to be able to write successful grants and secure funds. In this review article, we discuss the strategies to design a study and write successful grants.…”
    Get full text
    Article
  12. 5672

    Multi-authority attribute-based encryption with efficient revocation by Kai ZHANG, Jian-feng MA, Hui LI, Jun-wei ZHANG, Tao ZHANG

    Published 2017-03-01
    “…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
    Get full text
    Article
  13. 5673

    Origins of COVID-19: A Comprehensive Analysis of Zoonotic Drift Patterns and Gain-of-Function Research by Sanjay Pooran

    Published 2024-12-01
    “…The pandemic’s global socio-political implications highlight the urgency for international cooperation and transparency to mitigate future health and security challenges.…”
    Get full text
    Article
  14. 5674

    Research progress of mimic multi-execution scheduling algorithm by Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG

    Published 2021-05-01
    “…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
    Get full text
    Article
  15. 5675

    A novel perturbation attack on SVM by greedy algorithm by Yaguan QIAN, Xiaohui GUAN, Shuhui WU, NBensheng YU, Dongxiao REN

    Published 2019-01-01
    “…With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. …”
    Get full text
    Article
  16. 5676

    Defense of hidden backdoor technology for Web by Liyue CHEN, Xin SUN, Tiansheng CHENG, Chunming WU, Shuangxi CHEN

    Published 2020-05-01
    “…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
    Get full text
    Article
  17. 5677

    Method of ciphertext retrieval in mobile edge computing based on block segmentation by Na WANG, Kun ZHENG, Junsong FU, Jian LI

    Published 2020-07-01
    “…Aiming at the efficiency of cloud computing ciphertext retrieval scheme,a method of ciphertext retrieval in mobile edge computing based on block segmentations was proposed.Firstly,the edge server was introduced to calculate the document similarity score,thereby the computational cost of cloud server was reduced and the processing efficiency of cloud server was improved.Secondly,most keywords that are not related to the query were filtered out by a method of block segmentations based on the MRSE scheme,thereby the efficiency of calculating the document similarity score was improved.Theoretical analysis and experimental results show that the solution is safe under the known background threat model.Compared with the existing scheme,the proposed scheme has the same security and higher retrieval efficiency.…”
    Get full text
    Article
  18. 5678

    Survey on public key encryption with equality test by Yuanhao WANG, Hongbo LI, Yuzhao CUI, Qingwen GUO, Qiong HUANG

    Published 2018-11-01
    “…As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly) different public keys contain the same message without decrypting the ciphertexts.Definitions,security models and six types of authorization modes of PKEET are introduced and summarized.Besides,the relationship between PKEET and public key encryption with keyword search (PKES) is discussed.Several typical public-key,identity-based and attribute-based encryption with equality test schemes proposed recently are analyzed and compared.Furthermore,some application scenarios and research directions are discussed.…”
    Get full text
    Article
  19. 5679

    Coronavirus Crisis and Housing Policy Challenges by Holger Cischinsky, Philipp Deschermeier, Max-Christopher Krapp, Martin Vaché

    Published 2020-07-01
    “…However, it has become apparent that further temporary regulations are needed within the scope of social security of housing. In the course of the recession, pronounced price declines on the housing markets are to be expected due to the great relevance of demandside developments. …”
    Get full text
    Article
  20. 5680

    Self-Protection Technology for Application-Aware Network Management System by Fei Wang

    Published 2015-05-01
    “…At present,increasing devoid of fast and effective monitoring means has taken place,especially on construction of application aware-oriented security system for network management,which could find and deal with problems of NMSS platform before repercussions from user application-aware,thus to improve capabilities of self-protection management and support. …”
    Get full text
    Article