supported by the research Grant PID2020-116329 GB-C22 funded by MCIN/AEI/10.13039/501100011033.
Cyberthreats continue their expansion,becoming more and more complex and varied.However,credentials and passwords are still a critical point in security.Password cracking can be a powerful tool to fight against cyber ...
“Li Ziqi”is not only a Chinese girl,but also a cultural brand of new media with certain international influence.Currently,she has more than 20 million fans on the YouTube platform.In July 2021,she stopped making wor...
Chinese securities brokerage firms were busierthan usual during the recently concluded National Day holiday(October 1-7).Upon receiving numerous requests to open new accounts or reset passwords for dormant accounts,th...
supported by the National Natural Science Foundation of China(62171414,52175554,52205608,U2341210);the Fundamental Research Program of Shanxi Province(20210302123059,20210302124610);the National Defense Fundamental Research Project.
Flexible sensors have been widely studied for use in motion monitoring,human‒machine interactions(HMIs),personalized medicine,and soft intelligent robots.However,their practical application is limited by their low out...
supported by National Key R&D Program of China(Grant No.2021YFB0301300);National Natural Science Foundation of China(Grant No.U1811461);Zhejiang Lab(Grant No.2021KC0AB04);Major Program of Guangdong Basic and Applied Research(Grant No.2019B030302002);Program for Guangdong Introducing Innovative and Entrepreneurial Teams(Grant No.2016ZT06D211)。
High-throughput computing(HTC)is a computing paradigm that aims to accomplish jobs by easily breaking them into smaller,independent components.However,it requires a large amount of computing power for a long time.Most...
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse...
This work was funded by the Deanship of Scientific Research of King Faisal University through research project(Grant Number GRANT228).
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the communication.S...
This paper explores the decision-making mechanism of the consuming behavior hidden behind the sudden popularity of the Oriental Selection Company in terms of the mental accounting theory.Firstly,according to the“Non-...
supported in part by the National Natural Science Foundation of China (No. 61803149 and No. 61977021);in part by the Technology Innovation Special Program of Hubei Province (No. 2020AEA008);in part by the Hubei Province Project of Key Research Institute of Humanities and Social Sciences at Universities (Research Center of Information Management for Performance Evaluation)
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ...