中国科技期刊卓越行动计划推介:《高置信计算》Volume 5 Issue 1

B站影视 欧美电影 2025-04-06 09:24 3

摘要:Duaa Alqattan*, Varun Ojha, Fawzy Habib, Ayman Noor, Graham Morgan, Rajiv Ranjan

本期目录

Research Articles

01

Modular neural Network for Edge-based detection of early-stage IoT botnet

【作者】

Duaa Alqattan*, Varun Ojha, Fawzy Habib, Ayman Noor, Graham Morgan, Rajiv Ranjan

【DOI】

【关键词】

Modular neural network;IoT botnet;Edge computing;Botnet detection

【全文链接】

02

Optimal filter assignment policy against link flooding attack

【作者】

Rajorshi Biswas*, Jie Wu, Wei Chang, Pouya Ostovari

【DOI】

【关键词】

Botnet;DDoS defense;Quality-of-service;Filter router;Link flooding attack;Network security

【全文链接】

03

Federated data acquisition market: Architecture and a mean-field based data pricing strategy

【作者】

Jiejun Hu-Bolz*, Martin Reed, Kai Zhang, Zelei Liu, Juncheng Hu

【DOI】

【关键词】

Federated data acquisition market;Pricing strategy;Data trading

【全文链接】

04

Using virtual reality to enhance attention for autistic spectrum disorder with eye tracking

【作者】

Rehma Razzak,Yi (Joy) Li, Jing (Selena) He, Sungchul Jung, Chao Mei, Yan Huang*

【DOI】

【关键词】

Virtual reality;Attention training;Autistic spectrum disorders;Human–computer interaction

【全文链接】

05

Data distribution inference attack in federated learning via reinforcement learning support

【作者】

Dongxiao Yu,Hengming Zhang,Yan Huang,Zhenzhen Xie*

【DOI】

【关键词】

Sharing model parameters;Data distribution attacks;Federated learning;Reinforcement learning

【全文链接】

06

Balanced ID-OOD tradeoff transfer makes query based detectors good few shot learners

【作者】

Yuantao Yin ∗ , Ping Yin, Xue Xiao, Liang Yan, Siqing Sun, Xiaobo An

【DOI】

【关键词】

Few shot learning;Object detection;Transfer learning

【全文链接】

07

Cloud data security with deep maxout assisted data sanitization and restoration process

【作者】

Shrikant D. Dhamdhere*,M. Sivakkumar, V. Subramanian

【DOI】

【关键词】

Adopted data sanitization;Cloud data security;Restoration;Improved deep maxout;Optimal key generation

【全文链接】

08

EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device

【作者】

Wenyue Wang,Biwei Yan,Baobao Chai,Ruiyao Shen,Anming Dong*,Jiguo Yu

【DOI】

【关键词】

IoT;Blockchain;ECC;Identity authentication;Security

【全文链接】

09

BAFL-SVM: A blockchain-assisted federated learning-driven SVM framework for Smart agriculture

【作者】

Ruiyao Shen,Hongliang Zhang,Baobao Chai, Wenyue Wang,Guijuan Wang*,Biwei Yan,Jiguo Yu

【DOI】

【关键词】

Smart agriculture;Blockchain;Federated learning;Privacy protection

【全文链接】

10

A lightweight practical consensus mechanism for Supply chain blockchain

【作者】

Mohammad Saidur Rahman,Ibrahim Khalil,Mohammed Atiquzzaman*,Abdelaziz Bouras

【DOI】

【关键词】

Supply chain;Blockchain;Consensus;Reputation;Reputation-based consensus;Multisignature; RAFT;Schnorr multisignature

【全文链接】

11

Three-dimensional dynamic gesture recognition method based on convolutional neural network

【作者】

Ji Xi,Weiqi Zhang*,Zhe Xu,Saide Zhu, Linlin Tang,Li Zhao

【DOI】

【关键词】

Dynamic gesture recognition;ResNeXt architecture;Three-dimensional convolution;Lightweight convolution;Attention mechanism module

【全文链接】

12

An insider threat detection method based on improved Test-Time Training model

【作者】

Xiaoling Tao*, Jianxiang Liu, Yuelin Yu,Haijing Zhang,Ying Huang

【DOI】

【关键词】

Insider threats;Test-Time training;Residual network;Efficient channel attention mechanism

【全文链接】

Review Articles

13

Kubernetes application performance benchmarking on heterogeneous CPU architecture: An experimental review

【作者】

Jannatun Noor, MD Badsha Faysal, MD Sheikh Amin, Bushra Tabassum, Tamim Raiyan Khan, Tanvir Rahman*

【DOI】

【关键词】

Kubernetes;K8s;K3s;Serverless computing;Container as a Service (CaaS);Container orchestration;Docker;CPU architecture;x86;ARM

【全文链接】

来源:科创中国一点号

相关推荐