- Cloud Data Security Solutions
- Access Control and Trust
- Vehicular Ad Hoc Networks (VANETs)
- Neural Networks and Applications
- Autonomous Vehicle Technology and Safety
- Blockchain Technology Applications and Security
- Caching and Content Delivery
- Innovation Diffusion and Forecasting
- Mining Techniques and Economics
- Algorithms and Data Compression
- IoT and GPS-based Vehicle Safety Systems
- Peer-to-Peer Network Technologies
- Cryptography and Data Security
- Industrial Technology and Control Systems
- Scientific Innovation and Industrial Efficiency
- Vehicle License Plate Recognition
- Molecular Communication and Nanonetworks
- Context-Aware Activity Recognition Systems
- Time Series Analysis and Forecasting
- Stock Market Forecasting Methods
- Collaboration in agile enterprises
- Data Management and Algorithms
- Security and Verification in Computing
Hangzhou Dianzi University
2021-2023
Institute of Economics
2021-2023
Zhejiang University of Technology
2009-2010
The Bitcoin system uses a fully replicated data storage mechanism in which each node keeps full copy of the blockchain. As number nodes increases and transactions get more complex, space are needed to store block data. scalability has become bottleneck, limiting practical application This paper proposes scheme, called RESS, integrate erasure coding technology into blockchain encode multiple blocks. Under proposed grouping method, can reduce times coded decoding. In addition, scheme based on...
In recent years, deep learning theories, such as Recurrent Neural Networks (RNN) and Convolutional (CNN), have been applied effective methods for intrusion detection in the vehicle CAN network. However, existing RNNs realize by establishing independent models each ID, which are unable to learn potential characteristics of different IDs well, relatively complicated model structure high calculation time cost. CNNs can achieve rapid normal attack ID sequences exhibit good performance, but...
The popularization of electronic devices and the enrichment external interfaces have increased attack surface automotive cyber-physical system (CPS). As a vital part CPS, controller area network (CAN) is more vulnerable to security threats due lack corresponding protection mechanisms. This kind problem has also attracted extensive attention from academia industry. Researchers proposed numerous intrusion detection models for in-vehicle CAN bus, solving some problems certain extent. However,...
In e-service environments, the delegation relationship is rarely considered as one of important factors trust models. Most work on focused permission delegatee, depth, constrain and so on. They ignored potential hazards brought from blind delegation, easily to form collusion attack. This paper defines concept trustworthiness firstly, then proposes a method for calculating based relationship. The enables involved delegator delegatee be responsible their actual behavior in process. delegate...
Trust management is a common approach on access control in the distributed environment. RT one of frameworks for role-based trust management. However, has some faults, and main faults delegation control. To address this problem, paper proposes controllable authorization model supported by constraint. First, framework reasonable classification attributes are introduced. Second, to better spread permission, constraint source implemented formalization constraints described. Finally, usage...
This article will complex network theory is introduced to the world's leading technology innovation cooperation study, continue deepen theoretical by numerical simulation and empirical research on method of combining technical evolution mechanism its small world, scale-free characteristics were studied. First perfect modeling work decline period. Secondly, put forward strategy diffusion, namely random selection, target selection associated enterprises strategy, compares advantages...