Resource Type

Journal Article 443

Year

2024 1

2023 48

2022 46

2021 60

2020 50

2019 35

2018 33

2017 29

2016 35

2015 7

2014 1

2013 3

2012 3

2011 5

2010 1

2009 5

2008 9

2007 11

2006 11

2005 15

open ︾

Keywords

neural network 16

Deep learning 10

Artificial intelligence 8

Neural network 8

Software-defined networking (SDN) 7

Machine learning 5

cyberspace 5

cyberspace security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Boolean control networks 3

Network security 3

fuzzy sets 3

5G 2

Accelerator 2

Additive manufacturing 2

Artificial intelligence (AI) 2

open ︾

Search scope:

排序: Display mode:

Quantifying multiple social relationships based on a multiplex stochastic block model Science Letter

Mincheng Wu, Zhen Li, Cunqi Shao, Shibo He,s18he@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 11,   Pages 1458-1462 doi: 10.1631/FITEE.2000617

Abstract: Online s have attracted great attention recently, because they make it easy to build social connections for people all over the world. However, the observed structure of an online is always the aggregation of multiple social relationships. Thus, it is of great importance for real-world networks to reconstruct the full network structure using limited observations. The multiplex is introduced to describe multiple social ties, where different layers correspond to different attributes (e.g., age and gender of users in a ). In this letter, we aim to improve the model precision using maximum likelihood estimation, where the precision is defined by the cross entropy of parameters between the data and model. Within this framework, the layers and partitions of nodes in a are determined by natural node annotations, and the aggregate of the is available. Because the original has a high degree of freedom, we add an independent functional layer to cover it, and theoretically provide the optimal block number of the added layer. Empirical results verify the effectiveness of the proposed method using four measures, i.e., error of link probability, cross entropy, area under the receiver operating characteristic curve, and Bayes factor.

Keywords: 社交网络;多重网络;随机块模型    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: can save wireless network resources and is very fast in comparison with traditional routing. In real application scenarios, is vulnerable to pollution attacks and forgery attacks. To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediate node linearly combines the received data. NC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high. NC-CLBMS has extensive application prospects in unmanned aerial vehicle (UAV) communication networks, fifth-generation wireless networks, wireless sensor networks, mobile wireless networks, and Internet of Vehicles.

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Output tracking of delayed logical control networks withmulti-constraint Research Articles

Ya-ting ZHENG, Jun-e FENG

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2,   Pages 316-323 doi: 10.1631/FITEE.1900376

Abstract: In this study, the output tracking of delayed logical control networks (DLCNs) with state and control constraints is further investigated. Compared with other delays, state-dependent delay updates its value depending on the current state values and a pseudo-logical function. Multiple constraints mean that state values are constrained in a nonempty set and the design of the controller is conditioned. Using the semi-tensor product of matrices, dynamical equations of DLCNs are converted into an algebraic description, and an equivalent augmented system is constructed. Based on the augmented system, the output tracking problem is transformed into a set stabilization problem. A deformation of the state transition matrix is computed, and a necessary and sufficient condition is derived for the output tracking of a DLCN with multi-constraint. This condition is easily verified by mathematical software. In addition, the admissible state-feedback controller is designed to enable the outputs of the DLCN to track the reference signal. Finally, theoretical results are illustrated by an example.

Keywords: Logical control networks     Multi-constraint     Output tracking     Stabilization     State-dependent delay     Semi-tensor product    

Multiple Knowledge Representation of Artificial Intelligence

Yunhe Pan

Engineering 2020, Volume 6, Issue 3,   Pages 216-217 doi: 10.1016/j.eng.2019.12.011

Multiple knowledge representation for big data artificial intelligence: framework, applications, and case studies Perspective

Yi Yang, Yueting Zhuang, Yunhe Pan,yangyics@zju.edu.cn,yzhuang@zju.edu.cn,panyh@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 12,   Pages 1551-1684 doi: 10.1631/FITEE.2100463

Abstract: In this paper, we present a multiple knowledge representation (MKR) framework and discuss its potential for developing big data artificial intelligence (AI) techniques with possible broader impacts across different AI areas. Typically, canonical knowledge representations and modern representations each emphasize a particular aspect of transforming inputs into symbolic encoding or vectors. For example, knowledge graphs focus on depicting semantic connections among concepts, whereas deep neural networks (DNNs) are more of a tool to perceive raw signal inputs. MKR is an advanced AI representation framework for more complete intelligent functions, such as raw signal perception, feature extraction and vectorization, knowledge symbolization, and logical reasoning. MKR has two benefits: (1) it makes the current AI techniques (dominated by deep learning) more explainable and generalizable, and (2) it expands current AI techniques by integrating MKR to facilitate the mutual benefits of the complementary capacity of each representation, e.g., raw signal perception and symbolic encoding. We expect that MKR research and its applications will drive the evolution of AI 2.0 and beyond.

Keywords: 多重知识表达;人工智能;大数据    

Miniaturized five fundamental issues about visual knowledge Perspectives

Yun-he Pan,panyh@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5,   Pages 615-766 doi: 10.1631/FITEE.2040000

Abstract: 认知心理学早已指出,人类知识记忆中的重要部分是视觉知识,被用来进行形象思维。因此,基于视觉的人工智能(AI)是AI绕不开的课题,且具有重要意义。本文继《论视觉知识》一文,讨论与之相关的5个基本问题:(1)视觉知识表达;(2)视觉识别;(3)视觉形象思维模拟;(4)视觉知识的学习;(5)多重知识表达。视觉知识的独特优点是具有形象的综合生成能力,时空演化能力和形象显示能力。这些正是字符知识和深度神经网络所缺乏的。AI与计算机辅助设计/图形学/视觉的技术联合将在创造、预测和人机融合等方面对AI新发展提供重要的基础动力。视觉知识和多重知识表达的研究是发展新的视觉智能的关键,也是促进AI 2.0取得重要突破的关键理论与技术。这是一块荒芜、寒湿而肥沃的“北大荒”,也是一块充满希望值得多学科合作勇探的“无人区”。

Keywords: 视觉知识表达;视觉识别;视觉形象思维模拟;视觉知识学习;多重知识表达    

Multi-stage Model Updating Method via Substructure Analysis

Guo Li,Li Zhaoxia,Chen Hongtian

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 42-48

Abstract:

Basing on substructure analysis, original research on multi-stage model updating method (MSMUM) is presented to reduce the uncertainties in traditional model updating process. The kernel philosophy of the multi-stage model updating method is used to update a complicated FE model with multi steps, i. e. firstly localize the model errors and then update the error parameters. Comparing with the computed results, it is shown that the error localization methods and the parameter updating methods developed here are fine. As a case study, the model of the Runyang Nancha suspension bridge tower is updated with the MSMUM. Comparing the updated FE model here with the updated model using traditional updating method, it could be concluded that the multi-stage updating method is more effective.

Keywords: model updating     substructure     error localization     parameters updating     Runyang Bridge    

The Mechanics of 3D Multi-body Contact System of Long Shell and Tyres

Liang Xiaoling,Xiao Yougang,Li Xuejun

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 41-44

Abstract:

According to the high iterative feature of shell and tyre structure, the multi-level substructure technique is adopted to set up the multi-body contact model between tyres and long shell. Applying parametric quadratic programming method, the multi-body contact FEM analysis of the No.2 rotary kiln in Henan Branch of China Aluminum Company is done, and the conclusions are as follows: The equivalent stress of shell at supports changes 5 times, and at other parts changes 4 times; the strength of shell at supports is weak, and at other parts is affluent; the strength of shell at the supports 2 and 3 is the weakest.

Keywords: shell     multi-body contact     multi-level substructure     mechanical property    

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cyber sovereignty guarantee has attracted great attention around the world. From the perspective of China's cyber sovereignty situation, this paper analyzes the main problems related to China's cyber sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense, and jurisdiction. Corresponding countermeasures and suggestions are also provided. The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse right on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace security interests.

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract:

The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison. This paper describes scenes of network behavior as differential manifolds. Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathematical description of the network behavior path and behavior utility. Based on the principle of differential geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility. We also provide a calculation framework for assessment of the network’s attack-defense confrontation on the strength of behavior utility. Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior.

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001

Abstract:

Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.

Keywords: cyberspace     cyberspace sovereignty     stakeholder    

A novel multiple-outlier-robust Kalman filter Research Articles

Yulong HUANG, Mingming BAI, Yonggang ZHANG,heuedu@163.com,mingming.bai@hrbeu.edu.cn,zhangyg@hrbeu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3,   Pages 422-437 doi: 10.1631/FITEE.2000642

Abstract: This paper presents a novel multiple-outlier-robust Kalman filter (MORKF) for linear stochastic discrete-time systems. A new is first proposed to evaluate the similarity between two random vectors from dimension to dimension. Then, the proposed MORKF is derived via maximizing a based cost function. The MORKF guarantees the convergence of iterations in mild conditions, and the boundedness of the approximation errors is analyzed theoretically. The selection strategy for the similarity function and comparisons with existing robust methods are presented. Simulation results show the advantages of the proposed filter.

Keywords: Kalman filtering     Multiple statistical similarity measure     Multiple outliers     Fixed-point iteration     State estimate    

Future Internet: trends and challenges Special Feature on Future Network-Review Article

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9,   Pages 1185-1194 doi: 10.1631/FITEE.1800445

Abstract: Traditional networks face many challenges due to the diversity of applications, such as cloud computing, Internet of Things, and the industrial Internet. Future Internet needs to address these challenges to improve network scalability, security, mobility, and quality of service. In this work, we survey the recently proposed architectures and the emerging technologies that meet these new demands. Some cases for these architectures and technologies are also presented. We propose an integrated framework called the service customized network which combines the strength of current architectures, and discuss some of the open challenges and opportunities for future Internet. We hope that this work can help readers quickly understand the problems and challenges in the current research and serves as a guide and motivation for future network research.

Keywords: Future Internet     Network architecture     Service customized network    

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010

Abstract:

The rapid development of quantum information has brought new opportunities and challenges to modern information technologies. As one of the popular research directions in the field of quantum information, quantum networks aim to utilize the fundamental properties of quantum mechanics to achieve long-distance (secure) communications or provide computational capabilities superior to classical computing networks through distributed computing. The study of quantum networks holds great significance in advancing the practicality of quantum information. To gain a comprehensive understanding of the development trajectory of quantum networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloud computing, and quantum teleportation networks, based on different application scenarios and technical approaches. It provides comprehensive reviews of both domestic and international research progress and the challenges faced in each aspect. Furthermore, in conjunction with the practical implementation of quantum networks, the key technologies that need to be overcome in the development of quantum network systems, involving link establishment, information transmission, networking protocols, and physical hardware, are summarized. Overall, the development of quantum networks is still in the primary stage. At this stage, actively addressing challenges and seizing opportunities are of great significance to enhance the technological prowess of China. Therefore, to promote the development of quantum network systems in China, suggestions are proposed from three aspects: strengthening investment in the research and development of fundamental hardware infrastructure, attaching importance to the theoretical research of quantum networks, and enhancing interdisciplinary research and talent cultivation.

Keywords: quantum information     quantum network     quantum cryptography network     quantum cloud computing network     quantum teleportation network    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Title Author Date Type Operation

Quantifying multiple social relationships based on a multiplex stochastic block model

Mincheng Wu, Zhen Li, Cunqi Shao, Shibo He,s18he@zju.edu.cn

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Output tracking of delayed logical control networks withmulti-constraint

Ya-ting ZHENG, Jun-e FENG

Journal Article

Multiple Knowledge Representation of Artificial Intelligence

Yunhe Pan

Journal Article

Multiple knowledge representation for big data artificial intelligence: framework, applications, and case studies

Yi Yang, Yueting Zhuang, Yunhe Pan,yangyics@zju.edu.cn,yzhuang@zju.edu.cn,panyh@zju.edu.cn

Journal Article

Miniaturized five fundamental issues about visual knowledge

Yun-he Pan,panyh@zju.edu.cn

Journal Article

Multi-stage Model Updating Method via Substructure Analysis

Guo Li,Li Zhaoxia,Chen Hongtian

Journal Article

The Mechanics of 3D Multi-body Contact System of Long Shell and Tyres

Liang Xiaoling,Xiao Yougang,Li Xuejun

Journal Article

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Journal Article

A novel multiple-outlier-robust Kalman filter

Yulong HUANG, Mingming BAI, Yonggang ZHANG,heuedu@163.com,mingming.bai@hrbeu.edu.cn,zhangyg@hrbeu.edu.cn

Journal Article

Future Internet: trends and challenges

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Journal Article

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article