Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    A New Four-Dimensional Discrete Chaotic System Is Used for S-Box Masking

    FPGA-based S-box chaotic masking needs to call the multiplier IP core during multiplication, which will take up a lot of resources. Therefore, this paper proposes a new four-dimensional discrete chaotic system...

    Zi**g Jiang, Wenjie Dong, Qun Ding in Advances in Intelligent Information Hiding… (2023)

  2. No Access

    Chapter and Conference Paper

    Power Network Scheduling Strategy Based on Federated Learning Algorithm in Edge Computing Environment

    Distributed new energy consumption scenarios, such as photovoltaic, energy storage, charging stake, etc., are facing the needs of processing massive real-time data, large-scale distributed new energy and acces...

    **aowei Xu, Han Ding, Jiayu Wang, Liang Hua in Big Data and Security (2023)

  3. No Access

    Chapter and Conference Paper

    Acceleration Intention Recognition of Pure Electric Vehicle Based on SVM and Optimization Algorithm

    The recognition of vehicle acceleration intention is beneficial to improve vehicle driving performance and reduce energy consumption. Support vector machine (SVM) has been widely used in the field of vehicle a...

    Zi-Hao Long, Ding Chen, Guang-Ji Song in Advances in Intelligent Information Hiding… (2023)

  4. No Access

    Chapter and Conference Paper

    Quantitative Analysis of Coordination Between Inter-City Rail Transit and Urban Planning Based on Fractal Theory

    Inter-city rail transit largely guides and influences the construction of urban agglomerations. In order to better realize the coordinated development of regional integration, this paper takes fractal geometry...

    **an-Yu Yang, Ding Chen, **n Song in Advances in Intelligent Information Hiding… (2023)

  5. No Access

    Chapter and Conference Paper

    A Method of Constructing Fine-Grained Pose Evaluation Model

    In the field of computer vision, human pose estimation (HPE) is an important direction. However, in some fields that require professional actions or motions, researchers will deal with poses with high diversit...

    Zhen Song, Longfei Zhang, Haoyu Li in Advances in Intelligent Information Hiding… (2023)

  6. No Access

    Chapter and Conference Paper

    Combined Synchronization for Fractional-Order Chaotic Systems with Time Delay

    Stability is the core problem of chaotic system synchronization control. There are far fewer tools to judge the stability of fractional delay nonlinear systems than integer-order nonlinear systems. The classic...

    Wenhao Yan, Wenjie Dong, Zi**g Jiang in Advances in Intelligent Information Hiding… (2023)

  7. No Access

    Chapter and Conference Paper

    Modeling and Simulation of Continuous Dam** Control Shock Absorber

    Continuous dam** control (CDC) shock absorber is a typical representative of stepless valve control. To solve the problem of the determination of the design parameters in the CDC shock absorber, a hydraulic ...

    Fei-Fan Zhang, Ding Chen, **g Sheng in Advances in Intelligent Information Hiding… (2023)

  8. No Access

    Chapter and Conference Paper

    A Super-Nash Equilibrium Defense Solution for Client-Side Cache Poisoning Attacks

    A new class of DNS poisoning attacks targeting client-side DNS caches has recently emerged. This attack works with external attackers to poison users’ DNS cache through a spy program installed on the client si...

    Qingzhao An, Shujie Yang, Tengchao Ma in Emerging Networking Architecture and Techn… (2023)

  9. No Access

    Chapter and Conference Paper

    ECDSA Certificate Enrollment and Authentication for SCEP Protocol in Smart Grid PKI

    With the development of technology, cryptography needs to be improved to remain with the same strength of security, so as for meters for smart grid. The cipher suites used in smart grid meters defined in DLMS/...

    Ding-Wen Hsu, Hsuan-Tung Chen, Hung-Min Sun in Advances in Intelligent Information Hiding… (2023)

  10. No Access

    Chapter and Conference Paper

    Digital Forensics Study on Smart Watch and Wristband: Data Sniffing, Backup and Database Analyzing

    With the technology advancing rapidly, it has become apparent that it is nearly impossible to go without a digital trace when committing a crime. Device such as **aomi wristband, keeps the record of a user’s d...

    Pu Chen, GuangJun Liang, Ziqi Ding in Advances in Artificial Intelligence and Se… (2022)

  11. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding

    With the development of online medical care, the security of patients’ private medical data in the cloud has aroused widespread concern. Currently, the security issues for medical images have been researched b...

    Ming Cheng, Yang Yang, Yingqiu Ding, Weiming Zhang in Frontiers in Cyber Security (2022)

  12. No Access

    Chapter and Conference Paper

    Design of Encryption System Based on State Machine Optimization Scheme and FPGA Implementation

    Based on the classical state machine design theory, this paper proposes an improved state machine control scheme, which combines the advantages of control management mode and flow management mode. This not onl...

    Yerui Guang, Qun Ding in Advances in Intelligent Information Hiding… (2022)

  13. No Access

    Chapter and Conference Paper

    Simulation and Analysis of Steering Mechanical Characteristics Between Tire and Soil

    This paper studies the steering mechanical characteristics between tire and soil by using finite element model. The nonlinear mechanical characteristics of tire and soil are considered in this model. The influ...

    Zi-Hao Long, Ding Chen, **g Sheng in Advances in Intelligent Information Hiding… (2022)

  14. No Access

    Chapter and Conference Paper

    Design and Fault Research of Relay Protection for Shore Power

    As an important measure to protect the port environment and reduce pollution, shore power technology plays an increasingly important role in the port power grid. The design and analysis of relay protection sys...

    Zhaorui Lv, Qingpu Meng, Fuguang Huo in Advances in Intelligent Information Hiding… (2022)

  15. No Access

    Chapter and Conference Paper

    Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network

    Mobile communication technology is an important information science and technology. With the development and wide application of mobile communication technology, the security of mobile communication has become...

    Haoran Tao, Ning Ding, Tianhui Huang, Kehan Yu, Dongsheng Qian in Mobile Internet Security (2022)

  16. No Access

    Chapter and Conference Paper

    Research on Personal Privacy Risks and Countermeasures in the Era of Big Data

    Human society has entered the era of big data, and massive amounts of data and information are exchanged between application platforms at high speed. In contrast to the development of technology, the leakage o...

    Naifu Ye, Deyu Yuan, Yuyan Meng, Meng Ding in Advances in Artificial Intelligence and Se… (2022)

  17. No Access

    Chapter and Conference Paper

    Airport Cargo Volume Forecasting Based on Equal Dimensional and New Information Grey Markov Model

    Against the background of the epidemic, international air cargo has maintained a high prosperity, and the freight revenue of domestic major airlines has also seen a substantial increase. Accurate forecast of a...

    Hang He, Haining Ding, Shuyue Liu, Yao Li in Artificial Intelligence and Security (2022)

  18. No Access

    Chapter and Conference Paper

    Anomaly Detection Model for Key Places Based on Improved YOLOv5

    In recent years, key places such as underground stations and train stations, which are crowded and highly mobile, have become key targets for abnormal behaviour such as violence by some extremists or violent e...

    Wang Yuanxin, Yuan Deyu, Yuyan Meng, Ding Meng in Artificial Intelligence and Security (2022)

  19. No Access

    Chapter and Conference Paper

    Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop

    RainDrop is a lightweight block cipher algorithm proposed in 2019. Even though RainDrop proved to be resistant to classical cipher analysis such as differential analysis and liner analysis, little effort has b...

    Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang in Frontiers in Cyber Security (2022)

  20. No Access

    Chapter and Conference Paper

    Fast Algorithm for Sequence Edit Distance Computation

    Dynamic programming plays an important role in biomedical signal processing and it can determine the similarity between two nucleotide sequences. In this paper, we propose an algorithm to improve the computati...

    Hou-Sheng Chen, Li-Ren Liu, Jian-Jiun Ding in Advances in Computer, Communication and Co… (2021)

previous disabled Page of 7