-
Article
Secure control and filtering for industrial metaverse
元宇宙可被视为一个社会化和虚拟化的网络空间, 与现实世界**行但互动. 得益于云计算和数字孪生的快速发展, 元宇宙**在将带有传统控制和滤波范式的工业自动化系统转变为信息物理社会融合系统. 在此情况下, 未来的工业自动化系统可能是在一定时间和空间范围内具有**大计算能力的现实世界系统与虚拟孪生系统的集成. 在该领域中, 元宇宙重点涉及信息传输管理、 用户的行为识别以及控制、 滤波和决策, 且性能和成本将是系统在网络空间和...
-
Chapter and Conference Paper
A Formal Model to Prove Instantiation Termination for E-matching-Based Axiomatisations
SMT-based program analysis and verification often involve reasoning about program features that have been specified using quantifiers; incorporating quantifiers into SMT-based reasoning is, however, known to b...
-
Article
Open AccessAccess control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...
-
Article
Open AccessFSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings
With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...
-
Article
Open AccessMemory sharing for handling memory overload on physical machines in cloud data centers
Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...
-
Article
Open AccessCollaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds
Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...
-
Article
Intelligent analysis for software data: research and applications
-
Article
Open AccessClustering Algorithm of Density Difference Optimized by Mixed Teaching and Learning
Density peak clustering (DPC) algorithm is to find clustering centers by calculating the local density and distance of data points based on the distance between data points and the cutoff distance (dc) set manual...
-
Chapter and Conference Paper
Effects of Recipient Information and Urgency Cues on Phishing Detection
Phishing causes significant economic damage and erodes consumer trust in business communication. To better filter phishing emails, researchers have paid a substantial amount of attention to the characteristics...
-
Chapter and Conference Paper
Managing Information in the Case of Opinion Spamming
The rapid innovation of information and communication technology (ICT) within the last decades has come along with the development of new opportunities and challenges, new business models, new systems, etc. Co...
-
Chapter and Conference Paper
Multi-source Manifold Outlier Detection
Outlier detection is an important task in data mining, with many practical applications ranging from fraud detection to public health. However, with the emergence of more and more multi-source data in many rea...
-
Chapter and Conference Paper
Spindle: A Write-Optimized NVM Cache for Journaling File System
Journaling techniques are widely employed in modern file systems to guarantee crash consistency. However, journaling usually leads to system performance decrease due to the frequent storage accesses it entails...
-
Chapter and Conference Paper
Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning
In this work, we mainly study the mechanism of learning the steganographic algorithm as well as combining the learning process with adversarial learning to learn a good steganographic algorithm. To handle the ...
-
Chapter and Conference Paper
Parallel Strongly Connected Components Detection with Multi-partition on GPUs
The graph computing is often used to analyze complex relationships in the interconnected world, and the strongly connected components (SCC) detection in digraphs is a basic problem in graph computing. As graph...
-
Chapter and Conference Paper
A Fast kNN-Based Approach for Time Sensitive Anomaly Detection over Data Streams
Anomaly detection is an important data mining method aiming to discover outliers that show significant diversion from their expected behavior. A widely used criteria for determining outliers is based on the nu...
-
Chapter and Conference Paper
How Users Distinguish Trees Within a Virtual Environment
The gaming industry always faces the continual challenges of striking balance between real-time computing performance and graphics presentation quality. This is particularly apparent for a game with vast wildl...
-
Chapter and Conference Paper
End-to-End Bloody Video Recognition by Audio-Visual Feature Fusion
With the rapid development of Internet technology, the spread of bloody video has become increasingly serious, causing huge harm to society. In this paper, a bloody video recognition method based on audio-vis...
-
Chapter and Conference Paper
Self-Paced Densely Connected Convolutional Neural Network for Visual Tracking
Convolutional neural networks (CNNs) have achieved surprising results in visual tracking. To address the model drift problem, we propose a novel self-paced densely connected convolutional neural netwrok (SPDCT...
-
Chapter and Conference Paper
A Sparse Substitute for Deconvolution Layers in GANs
Generative adversarial networks are useful tools in image generation task, but training and running them are relatively slow due to the large amount parameters introduced by their generators. In this paper, S-...
-
Chapter and Conference Paper
Predicting Aesthetic Radar Map Using a Hierarchical Multi-task Network
The aesthetic quality assessment of images is a challenging work in the field of computer vision because of its complex subjective semantic information. The recent research work can utilize the deep convolutio...