Security and Trust Management
17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings
Chapter and Conference Paper
Raft’s good performance in the CFT system makes it a mainstream implementation solution for the consistency of the private chain system. However, we found in practice that Raft’s performance degradation is ver...
Chapter and Conference Paper
Crowdsourcing enables the harnessing of crowd wisdom for data collection. While being widely successful, almost all existing crowdsourcing platforms store and process plaintext data only. Such a practice would...
Chapter and Conference Paper
Code comments can improve the readability of program and help the programmer to efficiently promote the maintenance of the software. Therefore, the code comment generation task has important research significa...
Chapter and Conference Paper
Nowadays, neural networks have been widely used in many machine learning tasks. In practice, one might not have enough expertise to fine-tune a neural network model; therefore, it becomes increasingly popular ...
Chapter and Conference Paper
Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum ...
Chapter and Conference Paper
In recent years, the emergence of a large number of venture firms has brought great profits to venture capital firms. However, it is not easy to identify venture firms with investment prospects. Therefore, bas...
Chapter and Conference Paper
In this paper, we propose a resource allocation approach for V2X networks based on distributed reinforcement learning with local collaboration. We construct a local collaborative mechanism for sharing informat...
Chapter and Conference Paper
Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversa...
Chapter and Conference Paper
Credit allows a lender to loan out surplus capital to a borrower. In the traditional economy, credit bears the risk that the borrower may default on its debt, the lender hence requires upfront collateral from ...
Chapter and Conference Paper
Smart grids leverage data from smart meters to improve operations management and to achieve cost reductions. The fine-grained meter data also enable pricing schemes that simultaneously benefit electricity reta...
Chapter and Conference Paper
Attacks on sensor measurements can take the system to an unwanted state. The disadvantage of using a system model-based approach for attack detection is that it could not isolate which sensor was under attack....
Chapter and Conference Paper
With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming more and more important. The attackers can invade the norma...
Book and Conference Proceedings
17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings
Chapter and Conference Paper
With the advancement of the trusted execution environment (TEE) technologies, hardware-supported secure computing becomes increasingly popular due to its efficiency. During the protocol execution, typically, the ...
Book and Conference Proceedings
17th China Annual Conference, CNCERT 2020, Bei**g, China, August 12, 2020, Revised Selected Papers
Chapter and Conference Paper
This paper analyzes the business value and application prospect of data-center-platform as a big data service platform. Based on the existing technology, it describes the organizational structure and data mana...
Chapter and Conference Paper
The wide spread and sharing of considerable information promotes the development of many industries such as the health care and so on. However, data owners should pay attention to the problem of privacy preser...
Chapter and Conference Paper
Artificial potential field (APF), a concept from physic field, has been successfully adopted for path planning of unmanned aerial vehicle (UAV). The cooperation between the expulsion against obstacle and the g...
Chapter and Conference Paper
Occlusion is one of the most complicated and difficult problem to deal with in light field depth estimation. Previous methods usually use edge detection of central view as the basis for subsequent depth estima...
Chapter and Conference Paper
Cargo distribution is one of most critical issues for steel logistics industry, whose core task is to determine cargo loading plan for each truck. Due to cargos far outnumber available transport capacity in st...