Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Blockchain-Based Framework for Audio Copyright Deposition

    Based on the defects of existing audio copyright transaction processes such as complicated deposition models, long periods of rights maintenance, and ambiguous benefit distribution, this paper mainly proposes ...

    Ridong Huang, Jianmao **ao, **g Zhao, Jiangyu Wang in Mobile Internet Security (2023)

  2. No Access

    Chapter and Conference Paper

    USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation

    Fair evaluation of users is the basic guarantee for the healthy development of the service ecosystem. However, existing methods do not provide an indicator of when can get fair evaluation and how to reduce the...

    Jianmao **ao, Jia Zeng, Xu Miao, Yuanlong Cao in Machine Learning for Cyber Security (2023)

  3. No Access

    Chapter and Conference Paper

    Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP

    With the vigorous development of mobile Internet technology, real-time streaming media applications such as mobile short video and network live broadcast are becoming more and more popular. As a result, people...

    Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao in Mobile Internet Security (2022)

  4. No Access

    Chapter and Conference Paper

    Secure Cluster-Wise Time Synchronization in IEEE802.15.4e Networks

    In IEEE802.15.4e networks, all nodes need to keep high-precision synchronization, which can enable highly reliable and low-power wireless networks. Cluster-wise time synchronization is usually necessary in IEE...

    Wei Yang, Zhixiang Lai, JuanJuan Zheng in Computational Science and Its Applications… (2018)