您的位置: 专家智库 > >

国家自然科学基金(61170217)

作品数:8 被引量:22H指数:3
相关作者:马良荔郭晓明苏凯孙煜飞更多>>
相关机构:中国人民解放军海军工程大学更多>>
发文基金:国家自然科学基金中国人民解放军总装备部预研基金国家重点基础研究发展计划更多>>
相关领域:自动化与计算机技术电子电信经济管理更多>>

文献类型

  • 8篇期刊文章
  • 1篇会议论文

领域

  • 7篇自动化与计算...
  • 4篇电子电信
  • 1篇经济管理

主题

  • 2篇SECURE
  • 2篇LIGHTW...
  • 2篇PRIVAC...
  • 1篇遗传算法
  • 1篇映射
  • 1篇语义相似
  • 1篇语义相似度
  • 1篇全局优化
  • 1篇自适
  • 1篇自适应
  • 1篇相似度
  • 1篇相似度计算
  • 1篇相似度计算方...
  • 1篇消歧
  • 1篇矩阵
  • 1篇矩阵分解
  • 1篇非负矩阵
  • 1篇非负矩阵分解
  • 1篇感知
  • 1篇本体

机构

  • 3篇中国人民解放...

作者

  • 3篇孙煜飞
  • 3篇苏凯
  • 3篇郭晓明
  • 3篇马良荔

传媒

  • 5篇Tsingh...
  • 1篇华中科技大学...
  • 1篇小型微型计算...
  • 1篇浙江大学学报...

年份

  • 2篇2015
  • 1篇2014
  • 1篇2013
  • 3篇2012
  • 2篇2011
8 条 记 录,以下是 1-9
排序方式:
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications被引量:1
2013年
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme,
Wei RenLinchen YuLiangli MaYi Ren
本体映射中元素名称相似度计算方法研究被引量:5
2015年
针对现有本体映射中基于元素名称匹配的方法有效性不高等缺点,设计一种综合的元素名称特征匹配的本体映射方法.该方法引入了词义消歧算法,以确定元素名称词汇在本体上下文中表示的确切含义,并设计了更合理的基于信息量和基于语义边加权的概念语义相似度计算方法.通过选择最佳的词形相似度方法,并适当地组合语义相似度和词形相似度,实现了更有效的本体元素名称匹配策略.实验结果表明,本文方法能够在保持查准率的基础上,明显提高本体映射的查全率.
孙煜飞马良荔郭晓明苏凯
关键词:本体映射词义消歧语义相似度
面向Web服务QoS预测的非负矩阵分解模型被引量:4
2015年
针对目前QoS预测算法准确度不高的问题,提出通过挖掘已有QoS观测数据中的近邻信息和隐含特征信息而实现服务QoS预测的方法.建立QoS预测的矩阵分解因子模型,将QoS预测问题转化为稀疏QoS矩阵下的模型参数期望最大化(EM)估计问题,提出结合近邻信息的非负矩阵分解算法NCNMF+EM对该问题进行求解.算法综合利用了QoS矩阵中的近邻信息和隐含特征信息,可以实现对不同类型QoS属性值的准确预测.实验结果表明,采用该方法可以显著地提高服务QoS的预测准确度,且算法的运行时间随着矩阵规模的增大呈线性增长,可以应用于大规模的QoS预测问题中.
苏凯马良荔孙煜飞郭晓明
关键词:WEB服务非负矩阵分解
Lightweight Privacy-Aware Yet Accountable Secure Scheme for SM-SGCC Communications in Smart Grid被引量:2
2011年
Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart grid control and schedule centers via the advanced metering infrastructure to improve power delivery efficiency. However, data gathered in short intervals, such as 15 minutes, will expose customers' detailed daily activities (for example, when they get up and when they use oven) using nonintrusive appliance load monitoring. Thus, data must be hidden to protect customers' privacy. However, data accountability is still required for emergency responses or to trace back suspected intrusions, even though the data is anonymous. In addition to desired security requirements, this imposes two extra tasks: Sensors in smart meters usually have resource constraints; thus, the desired security protocols have to remain lightweight in terms of computation and storage cost. Furthermore, scalability and flexibility are required since there exist vast meters. This paper presents a lightweight Privacy-aware yet Accountable Secure Scheme called PASS which guarantees privacy-aware accountability yet tackles the above challenges in the smart grid. A formal secu- rity analysis justifies that PASS can attain the security goals, while a performance analysis verifies that PASS requires few computations, and is scalable and flexible.
Wei RenJun SongYu YangYi Ren
关键词:PRIVACYACCOUNTABILITY
Provably Secure Information Hiding via Short Text in Social Networking Tools被引量:2
2012年
Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for personal covert communication because it can hide information in a very short carrier text, and this concealment is hard to detect due to the diversity of normal traffic. However, designing appropriate schemes confronts several challenges: they need to be provably secure, and their performance needs to maintain high efficiency and handy usability due to the short length of OLST messages. In this paper, we propose a family of customized schemes known as HiMix, HiCod, HiOpt, and HiPhs for text steganography in OLST. These schemes are evaluated in terms of their security and their performance with regard to two metrics that address the particular characteristics of OLST: hiding rate and hiding ease. All proposed schemes are proved to be at least computationally secure, and their performance in terms of hiding rate and hiding ease justifies their applicability in social networking tools that utilize OLST.
Wei RenYuliang LiuJunge Zhao
Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing被引量:3
2011年
Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers. This paradigm empowers users to pervasively access a large volume of storage resources with portable devices in a distributed and cooperative manner. During the period between uploading and downloading files (data), the privacy and integrity of files need to be guaranteed. To this end, a family of schemes are proposed for different situations. All schemes are lightweight in terms of computational overhead, resilient to storage compromise on mobile devices, and do not assume that trusted cloud servers are present. Corresponding algorithms are proposed in detail for guiding off-the-shelf implementation. The evaluation of security and performance is also extensively analyzed, justifying the applicability of the proposed schemes.
Wei RenLinchen YuRen GaoFeng Xiong
关键词:PRIVACYINTEGRITY
一种QoS感知的服务全局优化选择算法被引量:4
2014年
将服务选择问题建模为带QoS约束的非线性最优化问题,并提出了一种参数自适应的改进遗传算法(IPAGA).构造了基于双曲正切函数的非线性参数变换函数,当迭代次数或种群多样性程度增加时,使遗传算法的交叉和变异概率相应地非线性递减,以保证算法的全局收敛性和收敛速度.实验结果表明:算法能够快速搜索出全局近似最优解,具有很高的有效性和可行性.
苏凯马良荔郭晓明孙煜飞
关键词:遗传算法全局优化参数自适应
CoP: An Ultra-Lightweight Secure Network Coding Scheme via Last Forwarder's Proof被引量:1
2012年
Network coding can improve network efficiency by extending copy-and-forward paradigm to code-and- forward paradigm. It thus imposes a security problem called pollution attack that some network coding or forwarding nodes may intentionally fabricate, modify, forge, or drop packets. Recently, many authentication methods are proposed to guarantee the correctness of encoding and forwarding results via the verification from receivers. Those methods include homomorphic hashing, homomorphic message authentication code, and homomorphic signature. However, those schemes result in expensive computation overhead due to the homomorphic cryptographic primitives, so that those methods will not be able to work in most applications that confront resource constraints. In this paper, we propose an ultra-lightweight checking protocol to guarantee the secure network coding without any homomorphic cryptographic primitives. The extensive analysis proofs that it has following advantages: the least security assumption for intermediate nodes, the least cryptographic primitive requirement, ultra-lightweight computation, flexible message length with probably proof, and minimal rounds in terms of message exchanging.
Wei RenLinchen YuLiangli Ma
Establishing the Network Protocol Design Security Foundations for (In)Security of Network Protocols
The foundation of network security have not been paid enough concentrations,and the comprehensive considera- t...
Zebo FENGXiaoping WuLiangli MaWei Ren
共1页<1>
聚类工具0