Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li +6 more
doaj +1 more source
In the natural and social systems of the real world, various network can be seen everywhere. The world where people live can be seen as a combination of network with different dimensions. Link prediction formalizes the interaction behavior between people.
Tianyu Xia, Yijun Gu, Dechun Yin
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj
Secure physical layer network coding versus secure network coding [PDF]
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted)
openaire +5 more sources
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding [PDF]
The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes.
Kurihara, Jun +2 more
core +1 more source
IoT Equipment Monitoring System Based on C5.0 Decision Tree and Time-Series Analysis
Abnormal traffic and vulnerability attack monitoring play an important role in today’s Internet of Things (IoT) applications. The existing solutions are usually based on machine learning for traffic, and its disadvantage is that a large number of ...
Biaokai Zhu +8 more
doaj +1 more source
An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng +3 more
doaj +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
Rallying Adversarial Techniques against Deep Learning for Network Security [PDF]
Recent advances in artificial intelligence and the increasing need for robust defensive measures in network security have led to the adoption of deep learning approaches for network intrusion detection systems (NIDS). These methods have achieved superior
Joseph Clements +4 more
semanticscholar +1 more source
Security risk assessment of projects in high-risk areas based on attack-defense game model
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model.
Yifan Yao, Wenjing Chen
doaj +1 more source

