-
Chapter and Conference Paper
An Efficient Scheme for Fault-Tolerant Web Page Access in Wireless Mobile Environment Based on Mobile Agents
Web Page access in mobile wireless environments suffers more challenges for the limited memory of mobile devices and the unreliable wireless network environments. It requires some facilities in the wireless en...
-
Chapter and Conference Paper
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks
In recent years, cache attacks against micro architectures have posed a daunting threat to modern processors such as x86 and ARM. Of the attacks, flush-based cache attacks have attracted increasing attention f...
-
Chapter and Conference Paper
Improve Image Classification by Convolutional Network on Cambricon
Cambricon provides us with a complete intelligent application system, how to use this system for deep learning algorithms development is a challenging issue. In this paper, we exploit, evaluate and validate th...
-
Chapter and Conference Paper
Identification, Extraction and Three-Dimensional Building Model Reconstruction Though Faster R-CNN of Architectural Plans
High-precision three-dimensional model is a high value information nowadays. Especially the 3D model of inner space of buildings can be used widely. However, it is not quite easy to acquire it. Building Inform...
-
Chapter and Conference Paper
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
The security of the Deepfake video has become the focus of social concern. This kind of fake video not only infringes copyright and privacy but also poses potential risks to politics, journalism, social trust,...
-
Chapter and Conference Paper
Heterogeneous Deniable Authenticated Encryption Protocol
Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the ...
-
Chapter and Conference Paper
The Dimension of Mobile Phone Fluency: A Focus Group Interview
The user experience of mobile phone products has been widely concerned, while the fluency of mobile phone will also affect the user experience. However, the factors that affect the fluency of mobile phone have...
-
Chapter and Conference Paper
Fully Discover the Balance of Lightning Network Payment Channels
The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...
-
Chapter and Conference Paper
Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS
In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...
-
Article
Open AccessCollaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds
Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...
-
Article
Open AccessMemory sharing for handling memory overload on physical machines in cloud data centers
Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...
-
Article
Open AccessFSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings
With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...
-
Article
Open AccessAccess control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...