期刊文献+
共找到1,587篇文章
< 1 2 80 >
每页显示 20 50 100
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
1
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
在线阅读 下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
2
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
3
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
4
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
在线阅读 下载PDF
A Blockchain-Based Credible and Secure Education Experience Data Management Scheme Supporting for Searchable Encryption 被引量:6
5
作者 Zihan Li Zhaofeng Ma 《China Communications》 SCIE CSCD 2021年第6期172-183,共12页
With the in-depth application of new technologies such as big data in education fields,the storage and sharing model of student education records data still faces many challenges in terms of privacy protection and eff... With the in-depth application of new technologies such as big data in education fields,the storage and sharing model of student education records data still faces many challenges in terms of privacy protection and efficient transmission.In this paper,we propose a data security storage and sharing scheme based on consortium blockchain,which is a credible search scheme without verification.In our scheme,the implementation of data security storage is using the blockchain and storage server together.In detail,the smart contract provides protection for data keywords,the storage server stores data after data masking,and the blockchain ensures the traceability of query transactions.The need for precise privacy data is achieved by constructing a dictionary.Cryptographic techniques such as AES and RSA are used for encrypted storage of data,keywords,and digital signatures.Security analysis and performance evaluation shows that the availability,high efficiency,and privacy-preserving can be achieved.Meanwhile,this scheme has better robustness compared to other educational records data sharing models. 展开更多
关键词 blockchain big data data transmission smart contract searchable encryption
在线阅读 下载PDF
Sensitive Resource and Traffic Density Risk Analysis of Marine Spill Accidents Using Automated Identification System Big Data 被引量:1
6
作者 Eunlak Kim Hyungmin Cho +3 位作者 Namgyun Kim Eunjin Kim Jewan Ryu Heekyung Park 《Journal of Marine Science and Application》 CSCD 2020年第2期173-181,共9页
This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South K... This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South Korea,detailed procedures of the methodology were proposed and its scalability was confirmed.To analyze the risk from a more detailed and microscopic viewpoint,vessel routes as hazard sources were delineated on the basis of automated identification system(AIS)big data.The outliers and errors of AIS big data were removed using the density-based spatial clustering of applications with noise algorithm,and a marine traffic density map was evaluated by combining all of the gridded routes.Vulnerability of marine environment was identified on the basis of the sensitive resource map constructed by the Korea Coast Guard in a similar manner to the National Oceanic and Atmospheric Administration environmental sensitivity index approach.In this study,aquaculture sites,water intake facilities of power plants,and beach/resort areas were selected as representative indicators for each category.The vulnerability values of neighboring cells decreased according to the Euclidean distance from the resource cells.Two resulting maps were aggregated to construct a final sensitive resource and traffic density(SRTD)risk analysis map of the Busan–Ulsan sea areas.We confirmed the effectiveness of SRTD risk analysis by comparing it with the actual marine spill accident records.Results show that all of the marine spill accidents in 2018 occurred within 2 km of high-risk cells(level 6 and above).Thus,if accident management and monitoring capabilities are concentrated on high-risk cells,which account for only 6.45%of the total study area,then it is expected that it will be possible to cope with most marine spill accidents effectively. 展开更多
关键词 SRTD risk analysis AIS big data sensitive resource Marine spill accidents Marine traffic Traffic density Marine oil spill
在线阅读 下载PDF
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
7
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
在线阅读 下载PDF
High Sensitivity Acquisition Algorithm for DSSS Signal with Data Modulation 被引量:3
8
作者 SHEN Yuyao WANG Yongqing +1 位作者 CHEN Jingyao WU Siliang 《China Communications》 SCIE CSCD 2015年第4期76-85,共10页
In direct sequence spread spectrum communication both for satelliteto-ground and inter-satellite links, the system constrains due to radio frequency spectral occupation, channel data throughput and link performances i... In direct sequence spread spectrum communication both for satelliteto-ground and inter-satellite links, the system constrains due to radio frequency spectral occupation, channel data throughput and link performances in terms of data channel coding which might result in a signal structure where the symbol duration is shorter than the pseudo code period. This can generate some difficulties in the DSSS signal acquisition due to the polarity inversion caused by the data modulation. To eliminate the influence due to polarity inversion, this paper proposes a novel acquisition algorithm based on the simultaneous search of the code phase, data phase and Doppler frequency. In the proposed algorithm the data phase is predicted and the correlation period for the coherent integration can be set equal to the symbol duration. Then non-coherent accumulation over different symbol is implemented in order to enhance the acquisition algorithm sensitivity; the interval of non-coherent accumulation is the least common multiple between the symbol duration and the pseudo code period. The algorithm proposed can largely minimize the SNR loss caused by data polarity inversion and enhance acquisition performance without a noticeable increase in hardware complexity. Theoretical analysis, simulation and measured results verify the validity of the algorithm. 展开更多
关键词 DSSS signal acquisition dataphase prediction data polarity inversion segment search high sensitivity
在线阅读 下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
9
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we p... Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 data sharing online socialnetworks multiparty access control attribute-based encryption attribute revocation
在线阅读 下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
10
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
在线阅读 下载PDF
Data Matrix码的AES加密与解密研究
11
作者 刘迪 周丹晨 《电子技术应用》 北大核心 2013年第11期125-128,共4页
将AES加密算法应用于Data Matrix码的加密,并在.net平台上运用C#语言开发加密Data Matrix生成系统。通过运用条码扫描枪对加密Data Matrix码进行识别,并利用AES解密程序对其所携数据解密验证,最后对该系统生成的80串比特流进行密码学随... 将AES加密算法应用于Data Matrix码的加密,并在.net平台上运用C#语言开发加密Data Matrix生成系统。通过运用条码扫描枪对加密Data Matrix码进行识别,并利用AES解密程序对其所携数据解密验证,最后对该系统生成的80串比特流进行密码学随机性测试。实验结果表明,该系统生成的加密条码在一定程度上提高了Data Matrix码的安全性,能够满足识别速度和可靠性的要求。 展开更多
关键词 data MATRIX AES 加密 随机性
在线阅读 下载PDF
Data Acquisition System for Electron Energy Loss Coincident Spectrometers 被引量:2
12
作者 张弛 虞孝麒 杨涛 《Plasma Science and Technology》 SCIE EI CAS CSCD 2005年第6期3174-3175,共2页
A Data Acquisition System (DAQ) for electron energy loss coincident spectrometers (EELCS) has been developed. The system is composed of a Multiplex Time-Digital Converter (TDC) that measures the flying time of p... A Data Acquisition System (DAQ) for electron energy loss coincident spectrometers (EELCS) has been developed. The system is composed of a Multiplex Time-Digital Converter (TDC) that measures the flying time of positive and negative ions and a one-dimension positionsensitive detector that records the energy loss of scattering electrons. The experimental data are buffered in a first-in-first-out(FIFO) memory module, then transferred from the FIFO memory to PC by the USB interface. The DAQ system can record the flying time of several ions in one collision, and allows of different data collection modes. The system has been demonstrated at the Electron Energy Loss Coincident Spectrometers at the Laboratory of Atomic and Molecular Physics, USTC. A detail description of the whole system is given and experimental results shown. 展开更多
关键词 data acquisition one-dimension position-sensitive detector multiplex time- digital converter
在线阅读 下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
13
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments encryption Haar digital wavelet transformation Henonmap reversible data embedding.
在线阅读 下载PDF
Privacy-Preserving Deep Learning on Big Data in Cloud
14
作者 Yongkai Fan Wanyu Zhang +2 位作者 Jianrong Bai Xia Lei Kuanching Li 《China Communications》 SCIE CSCD 2023年第11期176-186,共11页
In the analysis of big data,deep learn-ing is a crucial technique.Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas.Nev-ertheless,there is a ... In the analysis of big data,deep learn-ing is a crucial technique.Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas.Nev-ertheless,there is a contradiction between the open nature of the cloud and the demand that data own-ers maintain their privacy.To use cloud resources for privacy-preserving data training,a viable method must be found.A privacy-preserving deep learning model(PPDLM)is suggested in this research to ad-dress this preserving issue.To preserve data privacy,we first encrypted the data using homomorphic en-cryption(HE)approach.Moreover,the deep learn-ing algorithm’s activation function—the sigmoid func-tion—uses the least-squares method to process non-addition and non-multiplication operations that are not allowed by homomorphic.Finally,experimental re-sults show that PPDLM has a significant effect on the protection of data privacy information.Compared with Non-Privacy Preserving Deep Learning Model(NPPDLM),PPDLM has higher computational effi-ciency. 展开更多
关键词 big data cloud computing deep learning homomorphic encryption PRIVACY-PRESERVING
在线阅读 下载PDF
A Data Transmission Method Using a Cyclic Redundancy Check and Inaudible Frequencies
15
作者 Myoungbeom Chung 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期32-36,共5页
This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of ... This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%. 展开更多
关键词 Cyclic redundancy check data transmission method high frequency inaudible frequencies
在线阅读 下载PDF
Data acquisition and control system for lead-bismuth loop KYLIN-Ⅱ-M
16
作者 姚传明 黄群英 +2 位作者 朱志强 李洋 贺建 《Nuclear Science and Techniques》 SCIE CAS CSCD 2015年第1期25-32,共8页
Among different heavy liquid metals(HLMs), lead-bismuth eutectic(LBE) is considered at present as a potential candidate for the coolant of new generation fast reactors(critical and subcritical) and for liquid spallati... Among different heavy liquid metals(HLMs), lead-bismuth eutectic(LBE) is considered at present as a potential candidate for the coolant of new generation fast reactors(critical and subcritical) and for liquid spallation neutron sources and accelerator driven systems(ADS). A high temperature liquid LBE loop, KYLIN-II-M,has been built to study the characteristics of corrosion and fluidity of LBE at the Institute of Nuclear Energy Safety Technology. However, due to the sensors and execution components of the loop work at high temperatures and in severely corrosive environments, the reliability and security of the data acquisition and control system(DACS) of KYLIN-II-M face challenges during the loop operation. In order to meet the urgent needs for KYLIN-II-M's long-term stable operation, a virtualization and redundancy control system has been developed.The onsite operation result shows that the DACS is stable and reliable. In this paper, the experimental results are described in detail. 展开更多
关键词 冗余控制系统 数据采集 加速器驱动系统 回路 液体金属 液体循环
在线阅读 下载PDF
Preventing Data Leakage in a Cloud Environment
17
作者 Fuzhi Cang Mingxing Zhang +1 位作者 Yongwei Wu Weimin Zheng 《ZTE Communications》 2013年第4期27-31,共5页
Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data acc... Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models. 展开更多
关键词 cloud computing data leakage data tracking data provenance homomorphic encryption
在线阅读 下载PDF
SpaceVPX背板交换网络双冗余互连可靠性分析
18
作者 吴侃侃 周军 +3 位作者 倪涛 李林伟 张小满 汪少林 《现代电子技术》 北大核心 2025年第8期45-50,共6页
SpaceVPX标准背板控制平面、数据平面双冗余交换网络互连拓扑是实现系统高可靠数据交换的关键。根据SpaceVPX插槽、背板配置规范及可靠性模型分类,建立了一种交换网络可靠性模型,分析了整机双冗余独立备份、交换机互连备份、功能节点交... SpaceVPX标准背板控制平面、数据平面双冗余交换网络互连拓扑是实现系统高可靠数据交换的关键。根据SpaceVPX插槽、背板配置规范及可靠性模型分类,建立了一种交换网络可靠性模型,分析了整机双冗余独立备份、交换机互连备份、功能节点交叉备份、功能节点交叉与交换机互连备份、全连接备份五种拓扑形式的系统可靠性概率。不同拓扑形式的可靠性概率仿真分析结果表明,功能节点交叉备份连接方式适用于控制平面和数据平面双冗余系统。 展开更多
关键词 SpaceVPX 交换网络可靠性模型 控制平面交换 数据平面交换 冗余备份 网络拓扑结构 可靠性概率
在线阅读 下载PDF
支持模式隐藏的多关键词公钥可搜索加密方案
19
作者 聂旭云 成驰 +4 位作者 耿聪 廖泽宇 焦丽华 陈瑞东 陈大江 《通信学报》 北大核心 2025年第3期131-143,共13页
为了解决现有多用户可搜索加密方案无法隐藏访问模式和搜索模式、抵抗关键词猜测等攻击的问题,提出了一种全新的支持多用户、多关键词搜索的公钥可搜索加密方案。该方案能够在分布式系统中支持多写者/多读者功能,并利用安全比特分解(SBD... 为了解决现有多用户可搜索加密方案无法隐藏访问模式和搜索模式、抵抗关键词猜测等攻击的问题,提出了一种全新的支持多用户、多关键词搜索的公钥可搜索加密方案。该方案能够在分布式系统中支持多写者/多读者功能,并利用安全比特分解(SBD)协议,多密钥隐私保护外包计算(EPOM)和随机引入假阳性的方法,实现对访问模式与搜索模式的隐藏。同时,该方案支持多写者/多读者表示每个用户加密和上传数据,并搜索所有经授权的加密数据。该方案可通过在多个服务器上并行搜索来加速搜索处理,并仅需为所有读者维护一份加密索引。理论分析和实验结果表明,所提方案在满足陷门和密文的不可区分、多类布尔搜索、搜索和访问模式隐私的前提下,执行效率接近同类型的公钥可搜索加密最优方案。 展开更多
关键词 模式隐藏 多关键词 多写者/多读者 公钥可搜索加密 数据共享安全
在线阅读 下载PDF
基于对比学习的半监督加密流量分类模型
20
作者 金彦亮 方洁 +1 位作者 高塬 周嘉豪 《应用科学学报》 北大核心 2025年第3期437-450,共14页
针对大多数加密流量分类(encrypted traffic classification,ETC)模型由于标签数据稀缺而导致的性能下降问题,提出了一个基于对比学习的半监督加密流量分类(semisupervised encrypted traffic classification based on contrastive lear... 针对大多数加密流量分类(encrypted traffic classification,ETC)模型由于标签数据稀缺而导致的性能下降问题,提出了一个基于对比学习的半监督加密流量分类(semisupervised encrypted traffic classification based on contrastive learning,SSETC-CL)模型。通过比较样本之间的相似性和差异性,SSETC-CL模型能够从大量无标注数据中学习到有用的表示,从而获得一个通用且优秀的特征编码网络,降低了下游任务对标签数据的依赖。本文在公有数据集ISCXVPN2016以及两个自采数据集上对SSETC-CL模型进行了评估。与其他基准模型相比,SSETC-CL模型在设定任务上的表现最佳,准确率最大提升了8.92%。实验结果表明,SSETC-CL模型不仅在预训练模型已知的流量上具有较高的精度,而且具备将预训练模型所获得的知识应用于未知流量的迁移能力。 展开更多
关键词 加密流量分类 对比学习 半监督 数据增强 迁移学习
在线阅读 下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部