Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Sensitive Information Protection Model Based on Bayesian Game

    Yuzhen Liu1,2, Zhe Liu3, Xiaoliang Wang1,2,*, Qing Yang4, Guocai Zuo5, Frank Jiang6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 883-898, 2022, DOI:10.32604/cmc.2022.029002

    Abstract

    A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack in Named Data Networking

    Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 113-127, 2021, DOI:10.32604/iasc.2021.018895

    Abstract In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of… More >

  • Open Access

    ARTICLE

    Eye Gaze Detection Based on Computational Visual Perception and Facial Landmarks

    Debajit Datta1, Pramod Kumar Maurya1, Kathiravan Srinivasan2, Chuan-Yu Chang3,*, Rishav Agarwal1, Ishita Tuteja1, V. Bhavyashri Vedula1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2545-2561, 2021, DOI:10.32604/cmc.2021.015478

    Abstract The pandemic situation in 2020 brought about a ‘digitized new normal’ and created various issues within the current education systems. One of the issues is the monitoring of students during online examination situations. A system to determine the student’s eye gazes during an examination can help to eradicate malpractices. In this work, we track the users’ eye gazes by incorporating twelve facial landmarks around both eyes in conjunction with computer vision and the HAAR classifier. We aim to implement eye gaze detection by considering facial landmarks with two different Convolutional Neural Network (CNN) models, namely the AlexNet model and the… More >

  • Open Access

    ARTICLE

    An Entropy-Based Model for Recommendation of Taxis’ Cruising Route

    Yizhi Liu1, 2, Xuesong Wang1, 2, Jianxun Liu1, 2, *, Zhuhua Liao1, 2, Yijiang Zhao1, 2, Jianjun Wang1, 2

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 137-148, 2020, DOI:10.32604/jai.2020.010620

    Abstract Cruising route recommendation based on trajectory mining can improve taxidrivers' income and reduce energy consumption. However, existing methods mostly recommend pick-up points for taxis only. Moreover, their performance is not good enough since there lacks a good evaluation model for the pick-up points. Therefore, we propose an entropy-based model for recommendation of taxis' cruising route. Firstly, we select more positional attributes from historical pick-up points in order to obtain accurate spatial-temporal features. Secondly, the information entropy of spatial-temporal features is integrated in the evaluation model. Then it is applied for getting the next pick-up points and further recommending a series… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack on Content Centric Network

    Yabin Xu1, 2, 3, *, Ting Xu3, Xiaowei Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1075-1089, 2020, DOI:10.32604/cmc.2020.09849

    Abstract To improve the attack detection capability of content centric network (CCN), we propose a detection method of interest flooding attack (IFA) making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet. On the one hand, taking advantage of the characteristics of self-similarity is very sensitive to traffic changes, calculating the Hurst index of the traffic, to identify initial IFA attacks. On the other hand, according to the randomness of user requests, calculating the information entropy of content name of the interest packets, to detect the severity of the IFA attack, is.… More >

  • Open Access

    ARTICLE

    Optimization of Well Position and Sampling Frequency for Groundwater Monitoring and Inverse Identification of Contamination Source Conditions Using Bayes’ Theorem

    Shuangsheng Zhang1,5, Hanhu Liu1, Jing Qiang2,*, Hongze Gao3,*, Diego Galar4, Jing Lin4

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.2, pp. 373-394, 2019, DOI:10.32604/cmes.2019.03825

    Abstract Coupling Bayes’ Theorem with a two-dimensional (2D) groundwater solute advection-diffusion transport equation allows an inverse model to be established to identify a set of contamination source parameters including source intensity (M ), release location ( X0 , Y0) and release time (T0), based on monitoring well data. To address the issues of insufficient monitoring wells or weak correlation between monitoring data and model parameters, a monitoring well design optimization approach was developed based on the Bayesian formula and information entropy. To demonstrate how the model works, an exemplar problem with an instantaneous release of a contaminant in a confined groundwater… More >

Displaying 1-10 on page 1 of 6. Per Page