Skip to main content

and
  1. No Access

    Article

    A Secure Quantum Proxy Group Signature Scheme Based on Three-qubit Entangled States

    In this paper, a secure quantum proxy group signature (QPGS) scheme based on three-qubit entangled states is proposed. The three-qubit entangled state functions as a quantum channel, conserving entanglement re...

    Lu Lan, Rongbo Lu, Juxiu Zhong in International Journal of Theoretical Physics (2024)

  2. No Access

    Chapter and Conference Paper

    Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing

    With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things te...

    **rong Fu, Yiwen Liu, Haobo Yan, Yahui Yang, Ling Peng, Yuanquan Shi in Wireless Internet (2024)

  3. No Access

    Article

    Theories, algorithms and applications in tensor learning

    Due to the accelerated development and popularization of Internet, mobile Internet, and Internet of Things and the breakthrough of storage and communication technologies, the amount of data obtained in the fie...

    **aowu Deng, Yuanquan Shi, Dunhong Yao in Applied Intelligence (2023)

  4. No Access

    Chapter and Conference Paper

    A Study on Random Differentiation Methods for Homework Based on Fuzzy Test

    A fuzzy test-based method for random differentiation of homework is proposed to address the problems of low update frequency, serious plagiarism and weakened barriers in university coursework. In order to gene...

    Yiwen Liu, Yuanquan Shi, **aoning Peng, Chunqiao Mi in Computer Science and Education (2023)

  5. No Access

    Chapter and Conference Paper

    Edge Intelligence Based Garbage Classification Detection Method

    To address the problem that the classification and cleaning of garbage in city streets is always ineffective nowadays, the paper proposes a garbage detection method based on edge intelligence. The edge intelli...

    Ruijia Zhu, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  6. No Access

    Chapter and Conference Paper

    Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence

    The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield exca...

    Yanxia Gao, Yiwen Liu, Chunqiao Mi in Edge Computing and IoT: Systems, Managemen… (2023)

  7. No Access

    Chapter and Conference Paper

    A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence

    With the rise of data storage computing and IoT technology. The increase in data volume and user demand, the accurate delivery of data and low latency during transmission become important factors that affect t...

    Zhirong Zhu, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  8. No Access

    Chapter and Conference Paper

    Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices

    Edge networks are highly volatile and the quality of device communication and computational resources change not only over time but also according to the movement of users

    Wenkan Wen, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  9. No Access

    Article

    Unsupervised anomaly detection for network traffic using artificial immune network

    In the existing approaches of multifarious knowledge based anomaly detection for network traffic, the priori knowledge labelled by human experts has to be consecutively updated for identification of new anomal...

    Yuanquan Shi, Hong Shen in Neural Computing and Applications (2022)

  10. No Access

    Chapter and Conference Paper

    A Novel CFLRU-Based Cache Management Approach for NAND-Based SSDs

    To ensure better I/O performance of NAND-based SSD storage, a DRAM cache is commonly equipped inside SSDs to absorb overwrites or writes performed to underlying SSD cells. This paper presents a simple, effecti...

    Haodong Lin, Jun Li, Zhibing Sha, Zhigang Cai in Network and Parallel Computing (2022)

  11. No Access

    Chapter and Conference Paper

    Unsupervised Anomaly Detection for Network Flow Using Immune Network Based K-means Clustering

    To detect effectively unknown anomalous attack behaviors of network traffic, an Unsupervised Anomaly Detection approach for network flow using Immune Network based K-means clustering (UADINK) is proposed. In U...

    Yuanquan Shi, **aoning Peng, Renfa Li, Yu Zhang in Data Science (2017)

  12. No Access

    Article

    An immunity-based time series prediction approach and its application for network security situation

    To effectively improve the prediction precision of network security situation and prevent the large-scale network security attacks, an immunity-based time series prediction approach for network security situat...

    Yuanquan Shi, Renfa Li, Yu Zhang, **aoning Peng in Intelligent Service Robotics (2015)

  13. Article

    Open Access

    Chaotic Time Series Prediction Using Immune Optimization Theory

    To solve chaotic time series prediction problem, a novel Prediction approach for chaotic time series based on Immune Optimization Theory (PIOT) is proposed. In PIOT, the concepts and formal definitions of anti...

    Yuanquan Shi, **aojie Liu, Tao Li in International Journal of Computational Int… (2010)