Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work
Current Issue
2024 Issue 8 (Issue 107)
Publication Date
08 August 2024
Cover Story:
Internet Public Opinion Event Detection Based on the...
At present, the Internet has become an important place for public opinion, and major events of Internet public opinion have an increasingly
...More
Current Issue
Archive
Most Read
Most Download
Most Cited
08 August 2024, Volume 10 Issue 8
Previous Issue
Blockchain Security Sharding Scheme Based on Multi-dimensional Reputation
2024, 10(8): 690.
Asbtract
(
)
PDF
(2816KB) (
)
References
|
Related Articles
|
Metrics
Blockchain faces scalability issues. Sharding improves system performance by dividing the blockchain network into multiple subnetworks that process transactions in parallel. However, sharding can lead to the clustering of malicious nodes, resulting in 51% attacks and affecting system security. The existing singledimensional reputation schemes have the problems of high overhead and insufficient shard consensus in the redistribution process, failing to ensure both performance and security. To address these problems, a blockchain security sharding scheme based on multidimensional reputation is proposed: Firstly, the scheme integrates multidimensional indicators of nodes to balance shard reputation and computational communication abilities, identifying malicious nodes. Secondly, a twostage redistribution scheme is proposed to reduce the frequency and cost of redistribution through partial redistribution in first stage and complete redistribution in second stage. Finally, a multidimensional reputation based fast Byzantine faulttolerant consensus (MRFBFT) is designed, which combines voting power and reputation, and introduces consensus among shard leader nodes to prevent malicious behavior. The experimental results show that the shard reputation and computational communication level are more balanced, the consensus delay is reduced by about 20%, and the throughput is increased by about 15%.
Reversible Video Information Hiding Based on Multi-pass Motion Vector Ordering
2024, 10(8): 698.
Asbtract
(
)
PDF
(1590KB) (
)
References
|
Related Articles
|
Metrics
Aiming at the problem that existing reversible video information hiding algorithms based on motion vector ordering cannot adaptively adjust the embedding capacity according to the visual characteristics of video frames and have limited capacity, a multipass vector ordering reversible video information hiding algorithm is proposed. This algorithm decides whether to embed information in subsequent frames by assessing the texture and motion complexities of reference frames, thereby enabling adaptive information embedding in subsequent frames. The algorithm also enhances the multipass pixel value ordering (multipass PVO) technique and applies it to video information hiding, significantly enhancing the embedding capacity of reversible hiding algorithms. Experimental results demonstrate that, compared to similar algorithms, the variation values of PSNR and SSIM decreased by 14.5% and 8.5% respectively, and the embedding capacity increased by 7.4%. This represents significant improvements in both visual quality and embedding capacity.
A Differential Privacy Text Desensitization Method for Enhancing Semantic Consistency
2024, 10(8): 706.
Asbtract
(
)
PDF
(1067KB) (
)
References
|
Related Articles
|
Metrics
Text desensitization is an extremely important privacy protection method, and the balance between its privacy protection effect and semantic consistency with the original text is a challenge. When existing differential privacy desensitization methods are used to desensitize sensitive words, the similarity calculation probability method is used to select substitute words for sensitive words, which can easily cause inconsistency or even irrelevance between the substitute words and the original text semantics, seriously affecting the preservation of the original text semantics in the desensitized text. A differential privacy text desensitization method is proposed to enhance semantic consistency. A truncation distance measurement formula is given to adjust the probability of selecting replacement words and limit semantic irrelevant replacement words. The experimental results on real datasets show that it effectively improves the semantic consistency between desensitized text and the original text, and has great practical application value.
K-means++ Clustering Method Supporting Differential Privacy Protection in Spark Framework
2024, 10(8): 712.
Asbtract
(
)
PDF
(2232KB) (
)
References
|
Related Articles
|
Metrics
To address the tradeoff between privacy and utility in differentially private clustering algorithms when handling with massive data, a distributed differentially private Kmeans++ clustering algorithm is proposed. This algorithm leverages the memorybased computing engine Spark to create resilient distributed datasets(RDD) and performs computations using transformation and action operators. During the selection of initial centroids and iterative updates, a combination of the exponential mechanism and the Laplace mechanism is employed to mitigate the issues of sensitive initial centroids and privacy leakage, while reducing perturbation applied to the data during the computation. According to the characteristics of differential privacy, this paper provides a theoretical proof for the entire algorithm to satisfy εdifferential privacy protection. Experimental results demonstrate that this method possesses excellent privacy protection capabilities and efficient operational efficiency while ensuring the usability of clustering results.
Research on Data Security Sharing Technology Based on Blockchain and Proxy Re-encryption
2024, 10(8): 719.
Asbtract
(
)
PDF
(2800KB) (
)
References
|
Related Articles
|
Metrics
In the digital age, a vast amount of sensitive data is stored across various networks and cloud platforms, making data protection a crucial challenge in the field of information security. Traditional encryption methods are vulnerable due to single point of failure and centralized control, which can lead to data leakage. To address these issues, this study proposes a new method that integrates blockchain technology with an improved proxy reencryption algorithm, utilizing Shamir threshold key sharing. A data sharing scheme TDPRBC based on the threshold proxy reencryption algorithm is designed. Security analysis and experimental results show that this scheme can meet most data access needs.
Behavior Conflict Detection Model Based on Transformer and Graph Convolution Networks
2024, 10(8): 729.
Asbtract
(
)
PDF
(1811KB) (
)
References
|
Related Articles
|
Metrics
In recent years, with the increasing number of surveillance cameras and the rapid development of the Internet, there are more and more surveillance and online videos. The automatic detection of behavior conflict in videos is of great significance to reduce the risk of privacy information leakage caused by human auditing, maintain social order and purify the environment online. To fully extract features of behavior conflict from videos and obtain models with good generalization ability and detection performance, we use I3D (inflated 3D convolutional network) and VGGish to extract multimodal features based on the XDViolence dataset, and propose the behavior conflict detection model based on transformer and graph convolution networks (TGBCDM) for behavior conflict detection. The model contains a Transformer encoder module and a graph convolution module, which can effectively capture the longrange dependencies in videos while paying attention to global and local information of video features. After experimental verification, the model outperforms eight existing methods.
Sealed Bid Auction Scheme Based on Non-fungible Tokens
2024, 10(8): 738.
Asbtract
(
)
PDF
(1764KB) (
)
References
|
Related Articles
|
Metrics
Current electronic auctions have the contradictory problems of third party untrustworthiness and the winning bidder’s need to guarantee both anonymity and legitimacy of identity. To address the above problems, a sealed bidding auction scheme based on noninteractive zeroknowledge proof and nonhomogenized tokens is proposed. First, the auction environment of peertopeer participation is constructed through the characteristics of blockchain decentralization and data tampering, and the bidders’ bids are encrypted by elliptic curve+AES algorithm, so as to improve the privacy of the eauction; and then, the generation and verification of the identity legitimacy of the winning bidder in the case of onchain anonymity are realized through noninteractive zeroknowledge proof. At the same time, the identity legitimacy is used as the elemental material of nonhomogenized tokens to ensure the winning bidder’s ownership of the identity legitimacy authentication on the chain; finally, the experimental results prove that the algorithms used outperform the RSA and ECC algorithms in terms of encryption and decryption efficiency, and the required storage overhead for identity authentication is lower than that of other comparative schemes, which meets the needs of daily auctions.
Physicallayer Wireless Communication Security Scheme for Distributed Flexible Energy Resources
2024, 10(8): 745.
Asbtract
(
)
PDF
(2486KB) (
)
References
|
Related Articles
|
Metrics
With the rise of renewable energy and the proliferation of distributed power generation, distributed flexible resources capable of bidirectional transmission of electricity and information are becoming increasingly important. In this context, information networks are interconnected wirelessly through the operation of dedicated wireless networks. Due to the vulnerability of the physical layer and the complexity of key distribution and management, it is necessary to consider physical layer security technologies. Traditional physical layer encryption technologies cannot guarantee the security of initial conditions in chaotic systems. To address these issues, we provide a physical layer security scheme for the wireless communication system of distributed flexible resource information networks. This scheme not only reduces the complexity of key distribution and management but also enhances the security of the initial conditions of chaotic systems and the communication system. Our main contributions include a physical layer key generation method that uses lowpass filtering and sliding windows to enhance channel reciprocity, a cumulative distribution function to quantify, and a hash function to achieve key agreement and privacy amplification. We also propose a physical layer encryption scheme based on chaos theory, which uses the previously generated keys to encrypt the phase and amplitude of signals through Arnold transformation and Chen’s chaotic theory. Moreover, we conducted simulations, and the results show that our physical layer key generation scheme enhances the reciprocity of the channel by handling channel characteristics, and the subsequent keys passed the NIST randomness test. Meanwhile, the encryption scheme based on chaotic theory maintains the bit inconsistency rate at 0.5 for eavesdroppers, ensuring the secure transmission of information.
A Cloud Edge Coordinated Federated Computing Method for Fault Detection in the Railway Signal System
2024, 10(8): 753.
Asbtract
(
)
PDF
(1587KB) (
)
References
|
Related Articles
|
Metrics
The railway signaling system is the main carrying system of transportation capacity in the current society, and it has extremely high requirements for safety. However, due to the susceptibility of the railway signal system to various external factors and the possibility of malfunctions, it is necessary to design a realtime fault detection scheme for the railway signaling system, so as to take effective maintenance measures. Different from the traditional machine learning fault detection method, the bidirectional encoder representation from transformer (BERT) deep learning model is used for realtime intelligent fault detection. The model can obtain the understanding of the twoway context when dealing with the fault detection task, so as to capture the semantic relationship in the sentence more accurately, and make the understanding of the fault description more accurate. The federated computing method of cloudedge collaboration is adopted, so that the data of each railway operator can be preliminarily processed locally, and then the summarized gradient is uploaded to the cloud for model training. Finally, the trained model parameters are sent back to each edge device to realize the update of the model, breaking through the limitation of scattered training data of the model, and allowing multiple operators to jointly train the BERT model under the premise of maintaining data privacy. The results show that the federated edge cloud computing method for BERT model training can effectively improve the accuracy and reliability of rail transit fault detection while solving the problem of data confidentiality, which is better than the existing fault detection schemes in the field of railway signaling system.
Multilabel Classification Method of Open Source Threat Intelligence Text Based on BertTextCNN
2024, 10(8): 760.
Asbtract
(
)
PDF
(1641KB) (
)
References
|
Related Articles
|
Metrics
Open source threat intelligence is very important for network security protection, but it has the characteristics of wide distribution, many forms and loud noise. Therefore, how to organize and analyze the collected massive open source threat intelligence efficiently has become an urgent problem to be solved. Therefore, this paper explores a multilabel classification method based on BertTextCNN model, considering the title, text, and regular judgment. According to the characteristics of the text published by the intelligence source, the article sets regular judgment rules to make up for the deficiency of the model. In order to fully reflect the threat topics involved in the open source threat intelligence text, the paper sets the BertTextCNN multilabel classification model for the title and the text respectively, and then resorts the two labels to get the final threat category of the text. Compared with the BertTextCNN multilabel classification model based on text only, the performance of the proposed model is improved, and the recall rate is significantly improved, which can provide valuable reference for the classification of open source threat intelligence.
Design and Implementation of Quantum Software Cryptography Module
2024, 10(8): 760.
Asbtract
(
)
PDF
(1680KB) (
)
References
|
Related Articles
|
Metrics
With the advancement of the information technology revolution represented by artificial intelligence, big data, and the Internet of things, data has become an important asset and driving force for continuous innovation for the country, enterprises, and institutions. Therefore, how to provide a secure channel for terminal access, ensure the secure transmission and storage of business data, prevent data leakage, and have the ability to resist emerging attack technologies such as quantum computing has become an urgent problem that needs to be solved. To address this challenge, this article proposes a software password module based on quantum secure communication technology, and focuses on the design and implementation of quantum software password modules. The focus includes overall architecture design, functional design, and interface integration, as well as testing and verification of the quantum software password module. This module adopts the fusion of quantum cryptography and classical cryptography to provide an efficient and secure solution for the secure transmission and storage of business data, and has broad application scenarios.
Improving Data Security Governance and Promoting the Development of Artificial Intelligence Industry
2024, 10(8): 776.
Asbtract
(
)
PDF
(758KB) (
)
References
|
Related Articles
|
Metrics
Security Status Analysis and Countermeasures of Basic Software Supply Cha
2024, 10(8): 780.
Asbtract
(
)
PDF
(4217KB) (
)
References
|
Related Articles
|
Metrics
Basic software is the cornerstone of supporting the efficient and stable operation of computer systems, which determines the level of development of digital infrastructure. The industrial chain of basic software, represented by operating system, database and middleware, occupies an upstream position in the entire software industry, which directly determines the scale and the efficiency of the downstream output. Due to the characteristics of long R&D cycle and large R&D investment, basic software has gradually attracted attention from various countries and risen to the level of national strategy in the increasingly complex environment of software supply chain. In recent years, while China’s basic software industry has developed rapidly with the help of open source, many security incidents of basic software supply chain have occurred, which brings risks and challenges. This paper reviews the current situation of the basic software supply chain security, analyzes the risks and challenges faced by the basic software supply chain, and puts forward reasonable suggestions from four aspects: policy, industry, user and ecology.
Previous Issue
NianQi Search
Kdywords Search
Announcement
aadfas vcvsda fsd fa
2021-03-15
Air Clearance Calculation and Compacting Layout Design of Valve Hall in Converter Station of VSC-HVDC Grid with High Voltage and Large Capacity
2021-03-15
Application and optimization of intelligent heating in distribute gas heating systems
2021-03-15
aadfas vcvsda fsd fa fdas fdas fdsa fdas fdsa fds afads dsa fsd fsda
2021-03-15
More>>
Special Report
Application and optimization of intelligent h...
More>>
Expert Viewpoint
Air Clearance Calculation and Compacting Layo...
More>>
Academic Dynamic
Air Clearance Calculation and Compacting Layo...
More>>
Links
More>>