supported in part by the National Key R&D Program of China under grant no.2022YFB2703000;in part by the Young Backbone Teachers Support Plan of BISTU under grant no.YBT202437;in part by the R&D Program of Beijing Municipal Education Commission under grant no.KM202211232012;in part by the Educational Innovation Program of BISTU under grant no.2025JGYB19。
Physical layer authentication(PLA)in the context of the Internet of Things(IoT)has gained significant attention.Compared with traditional encryption and blockchain technologies,PLA provides a more computationally effi...
supported by the National Natural Science Foundation of China(82274223);National Drug Standard Improvement Project(2023Z002)。
Agarwood is a resinous wood produced by plants of the genus Aquilaria in the Thymelaeaceae family after being injured.The wide distribution of origins and the complexity of formation have led to various species of aga...
funding from the Korea Institute for Advancement of Technology(KIAT)through a grant provided by the Korean Government Ministry of Trade,Industry,and Energy(MOTIE)(RS-2024-00415520,Training Industrial Security Specialist for High-Tech Industry);Additional support was received from the Ministry of Science and ICT(MSIT)under the ICAN(ICT Challenge and Advanced Network of HRD)program(No.IITP-2022-RS-2022-00156310)overseen by the Institute of Information&Communication Technology Planning and Evaluation(IITP).
The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managin...
To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the ...
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...
supported by the Deanship of Graduate Studies and Scientific Research at Qassim University via Grant No.(QU-APC-2025).
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in...
the National Natural Science Foundation of China(Grant No.62172132);Public Welfare Technology Research Project of Zhejiang Province(Grant No.LGF21F020014);the Opening Project of Key Laboratory of Public Security Information Application Based on Big-Data Architecture,Ministry of Public Security of Zhejiang Police College(Grant No.2021DSJSYS002).
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited...
the Agritech National Research Center and received funding from the European Union Next-GenerationEU(PIANO NAZIONALE DI RIPRESA E RESILIENZA(PNRR)-MISSIONE 4 COMPONENTE 2,INVESTIMENTO 1.4-D.D.103217/06/2022,CN00000022).
Food authentication verifies the match between product characteristics and claims and it is crucial in a globalized and complex food sector.Currently.class-modelling approaches,such as soft independent modelling of cl...
supported by the National Natural Science Foundation of China under Grant 62472132;Natural Science Foundation of Zhejiang Province under Grant LZ22F030004;Key Research and Development Program Project of Zhejiang Province under Grant 2024C01179.
Digital twin(DT)technology is currently pervasive in industrial Internet of things(IoT)applications,notably in predictive maintenance scenarios.Prevailing digital twin-based predictive maintenance methodologies are co...
supported by the National Natural Science Foun-dation of China(62271280,62222114,61925109,and 62071428).
The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious...