Beijing Natural Science Foundation (L233005);National Key Research and Development Program of China (2023YFB3308200)。
To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast cryp...
This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonom...
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...
1.INTRODUCTION.The integration of technology in medicine,particularly in the field of radiology,has led to significant advancements in patient care and diagnosis.While this digital transformation of healthcare has bro...
The out-of-sample R^(2) is designed to measure forecasting performance without look-ahead bias.However,researchers can hack this performance metric even without multiple tests by constructing a prediction model using ...
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...
Internet or public internetwork has become a vulnerable place nowadays as there are so many threats available for the novice or careless users because there exist many types of tools and techniques being used by notor...
Like any competitor,Yueqi Chen was anxious as he awaited the chance to demonstrate his skill in public.It was the afternoon of 19May 2022,and Chen,then a visiting fellow in computer science at Northwestern University ...
This work was supported by the National Natural Science Founda-tion of China(Grant No.51935005).
In this paper,we design a device based on capture technology to solve the problems caused by hacking drones.We introduce the design,simulation,control scheme,and implementation of a capture device.A protective cover i...