|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Na Wei, Yuxin Peng, Kunming Lu, Guixing Zhou, Xingtao Guo and Minghui Niu
The parallel reservoirs in the upper reach of the Hanjiang River are key projects for watershed management, development, and protection. The optimal operation of parallel reservoirs is a multiple-stage, multiple-objective, and multiple-decision attribute...
ver más
|
|
|
|
|
|
|
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du...
ver más
|
|
|
|
|
|
|
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t...
ver más
|
|
|
|
|
|
|
Ján Mach, Luká? Kohútka and Pavel Cicák
The shrinking of technology nodes allows higher performance, but susceptibility to soft errors increases. The protection has been implemented mainly by lockstep or hardened process techniques, which results in a lower frequency, a larger area, and higher...
ver más
|
|
|
|
|
|
|
Shuxun Qiao, Zhongwen Peng, Jinkai Zhang and Lianghai Jin
As a key transportation equipment in the construction of long tunnels with large slope, the material hoisting system plays an important role in the transportation of materials in sloping shafts. This paper proposes a parameterized calibration scheme for ...
ver más
|
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f...
ver más
|
|
|
|