Investing can often be broken down into a few simple rules that investors can follow to be successful.But success can be as much about what to do as it is what not to do.On top of that,our emotions throw a wrench into...
supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485;Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...
supported by National Natural Science Foundation of China(No.62172436);Additionally,it is supported by Natural Science Foundation of Shaanxi Province(No.2023-JC-YB-584);Engineering University of PAP’s Funding for Scientific Research Innovation Team and Key Researcher(No.KYGG202011).
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers...
supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...
supported in part by National Mobile Communications Research Laboratory,Southeast University(Grant No.2023D03);National Key R&D Program of China(Grant No.2023YFB2904804);National Natural Science Foundation of China(Grant Nos.62394292,62394290)。
As a new communication paradigm,semantic communication(SC)differs from conventional communication based on bit transmission by transmitting semantic information,which demonstrates enormous potential in improving commu...
supported by the General Program of the National Natural Science Foundation of China under Grant No.62172093.
Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security.Machine learning and deep learning have become mainstream methods to analyze traffic,and labeled da...
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...
supported by National Key R&D Program of China for Young Scientists:Cyberspace Endogenous Security Mechanisms and Evaluation Methods(No.2022YFB3102800).
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem...
supported in part by the National Natural Science Foundation of China under Grant 61971474;in part by the National Natural Science Foundation of China under Grant 62301594;in part by the Special Funds of the National Natural Science Foundation of China under Grant 62341112;in part by the Beijing Nova Program under Grant Z201100006820121;in part by the Beijing Municipal Science and Technology Project under Grant Z181100003218015.
Applying non-orthogonal multiple access(NOMA)to the mobile edge computing(MEC)network supported by unmanned aerial vehicles(UAVs)can improve spectral efficiency and achieve massive user access on the basis of solving ...