摘要:High-Confidence Computing 第4卷第4期正式上线,本期共发表11篇研究论文,2篇综述,所有文章均为开放获取,欢迎广大专家学者阅读、引用与分享!
High-Confidence Computing 第4卷第4期正式上线,本期共发表11篇研究论文,2篇综述,所有文章均为开放获取,欢迎广大专家学者阅读、引用与分享!
本期目录
Research Articles
01
【作者】
Yiding Shi, Xueying Zhang, Lei Fu, Huanle Zhang*
【DOI】
【关键词】
WiFi sensing;Private attribute;Deep learning;Privacy protection
【全文链接】
02
【作者】
Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen*
【DOI】
【关键词】
Biological invasion;Species invasion network;Global shipping network
【全文链接】
03
【作者】
Liyuan Gao, Wenjing Li, Hongyue Ma*, Yumin Liu, Chunyang Li
【DOI】
【关键词】
Edge computing;Data storage;Reliability;Compression efficiency
【全文链接】
04
Deviceauthentication for 5G terminals via Radio Frequency fingerprints【作者】
Ping Dong, Namin Hou, Yuting Tang, Yushi Cheng*, Xiaoyu Ji
【DOI】
【关键词】
Radio Frequency fingerprint;5G terminal authentication;Wireless security;Mobile communication networks
【全文链接】
05
【作者】
Moh Sabbir Saadat*, Sanjib Sur, Srihari Nelakuditi
【DOI】
【关键词】
5G;Millimeter-wave;Temperature-aware design;Multi-antenna scheduler
【全文链接】
06
【作者】
Jian Ren*, Tongtong Li
【DOI】
【关键词】
Undirected graph;Characterization;Isomorphism;Algorithm;Polynomialtime complexity
【全文链接】
07
Intelligent edge CDN with smart contract-aided local IoT sharing【作者】
Jiamin Fan, Daming Liu, Guoming Tang, Kui Wu*, Xun Shao
【DOI】
【关键词】
CDN over edge IoT;Game theory;EM algorithm;Smart contracts
【全文链接】
08
EPri-MDAS: An efficient privacy-preserving Multiple data aggregation scheme without trusted authority for fog-based smart grid【作者】
Jinjiao Zhang, Wenying Zhang*, Xiaochao Wei, Huimin Liu
【DOI】
【关键词】
Privacy-preserving;Multiple data aggregation;Smart grid;Fog computing
【全文链接】
09
AIDCT: An AI service development and composition tool for constructing trustworthy intelligent systems
【作者】
Wei Jiang, Luo Xu, Zichao Zhang, Xiang Lei*
【DOI】
【关键词】
AI service;Trustworthy intelligent system;Practical applications
【全文链接】
10
【作者】
Shabab Intishar Rahman, Shadman Ahmed, Tasnim Akter Fariha, Ammar Mohammad, Muhammad Nayeem,Mubasshirul Haque, Sriram Chellappan, Jannatun Noor*
【DOI】
【关键词】
Recommendation system;Clustering;F-P growth;Apriori;Associative pattern;E-learning sphere;Online learning;Energy blockchain; Data security; Storage; Management; Utilization
【全文链接】
11
Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain【作者】
Jing Tian, Yanqi Zhao*, Xiaoyi Yang, Xuan Zhao, Ruonan Chen,Yong Yu
【DOI】
【关键词】
Identity-based signature;Threshold (multi) signature;Accountability;Blockchain
【全文链接】
Review Articles
12
A survey of acoustic eavesdropping attacks: Principle, methods, and progress【作者】
Yiwei Chen, Wenhao Li, Xiuzhen Cheng*, Pengfei Hu*
【DOI】
【关键词】
Acoustic eavesdropping;Attack scenarios and threat models;Acoustic side-channel attacks
【全文链接】
13
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
【作者】
Akshita Maradapu Vera Venkata Sai, Chenyu Wang, Zhipeng Cai, Yingshu Li*
【DOI】
【关键词】
Digital Twin Networks;Network architecture;Privacy and security;Federated learning;Blockchain;Internet of Vehicles;6G;Supply chain
【全文链接】
来源:科创中国一点号