Resource Type

Journal Article 1626

Year

2024 3

2023 132

2022 153

2021 128

2020 136

2019 123

2018 102

2017 103

2016 72

2015 88

2014 53

2013 44

2012 36

2011 45

2010 48

2009 49

2008 55

2007 68

2006 47

2005 35

open ︾

Keywords

optimization 18

Machine learning 13

multi-objective optimization 10

genetic algorithm 9

neural network 8

Deep learning 7

Reinforcement learning 7

big data 7

different 5

fault diagnosis 5

sustainable development 5

topology optimization 5

Adsorption 4

Artificial intelligence 4

Blockchain 4

COVID-19 4

Neural network 4

algorithm 4

blockchain 4

open ︾

Search scope:

排序: Display mode:

Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 773-786 doi: 10.1631/FITEE.1800512

Abstract:

Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problemsHowever, ABE schemes have practical limitations on dynamic attribute revocation.We propose a generic attribute revocation system for ABE with user privacy protection.The attribute revocation ABE (AR-ABE) system can work with any type of ABE scheme to dynamically revoke

Keywords: Attribute-based encryption     Generic attribute revocation     User privacy     Cloud storage     Access control    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract:

Cloud-based storage is a service model for businesses and individual users that involves paid or freeAttribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)Attribute-related ciphertext elements, which are contained in an assembly ciphertext (ACT) file, areThe proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-basedencryption    

A quantitative attribute-based benchmark methodology for single-target visual tracking Article

Wen-jing KANG, Chang LIU, Gong-liang LIU

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 3,   Pages 405-421 doi: 10.1631/FITEE.1900245

Abstract: Based on these definitions, we propose two novel test methodologies, a correlation-based test and a weight-basedwell when the size of the target changed rapidly or intensely, and even the advanced deep learning based

Keywords: Visual tracking     Performance evaluation     Visual attributes     Computer vision    

Reduction of rough set attribute based on immune clone selection

LIANG Lin, XU Guang-hua

Frontiers of Mechanical Engineering 2006, Volume 1, Issue 4,   Pages 413-417 doi: 10.1007/s11465-006-0049-4

Abstract: A novel attribute reduction approach of rough set based on immune clone selection is proposed.In this method, the approximation quality and attribute set were adopted as evolution object and antibodyIn addition, the machinery fault data were analyzed by this method, and the attribute reduction sets

Keywords: inherent distribution     maturation     evolution     diversity     antibody    

A multi-attribute decision making approach of mix design based on experimental soil characterization

Amit K. BERA, Tanmoy MUKHOPADHYAY, Ponnada J. MOHAN, Tushar K. DEY

Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 3,   Pages 361-371 doi: 10.1007/s11709-017-0425-7

Abstract: In this article, a novel multi-attribute decision making (MADM) based approach of mix design has been

Keywords: silty sand     bentonite soil     soil mix design     multi-attribute decision making    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchicalidentity based encryption (HIBE) scheme in the standard model whose public key size is only ( ) logof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

The engineering analysis of the multidimensional attribute

Xu Changshan,Qu Lei

Strategic Study of CAE 2013, Volume 15, Issue 11,   Pages 92-96

Abstract:

Engineering as a activity which people change nature and construction of artificial nature, has multidimensional attributes which include: stage, integrity, dynamics, contradictoriness, innovation, openness, humanity, risk, ethics and value. The research of the engineering,we should inspect the multidimensional attributes of engineering,and devote to explain in philosophical. So, people can understand and engage in engineering activities better than before.

Keywords: engineering     multidimensional     attribute    

Attribute reduction in interval-valued information systems based on information entropies Article

Jian-hua DAI,Hu HU,Guo-jie ZHENG,Qing-hua HU,Hui-feng HAN,Hong SHI

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 9,   Pages 919-928 doi: 10.1631/FITEE.1500447

Abstract: Attribute reduction is a key issue in analysis of interval-valued data.Existing attribute reduction methods for single-valued data are unsuitable for interval-valued data.So far, there have been few studies on attribute reduction methods for interval-valued data.Based on these concepts, we provide an information theory view for attribute reduction in interval-valuedConsequently, attribute reduction algorithms are proposed.

Keywords: Rough set theory     Interval-valued data     Attribute reduction     Entropy    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: A non-interactive identity-based TPRE (IB-TPRE) scheme over is proposed which removes the public keythe delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryptionThis property is achieved by lattice-based fully homomorphic signatures.The security of the proposed scheme is based on the decisional learning with error hardness assumptionTwo typical application scenarios, including a file-sharing system based on a blockchain network and

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Study on the Multi-attribute Decision Model of Grey Target Based on Interval Number

Dang Yaoguo,Liu Sifeng,Liu Bin

Strategic Study of CAE 2005, Volume 7, Issue 8,   Pages 31-35

Abstract: Based on the above, the multi-attribute decision model of grey target based on interval number is derived

Keywords: interval number     grey target decision     model     application    

Study on Grey Incidence Decision Model of the Dynamic Multiple-attribute

Dang Yaoguo,Liu Sifeng,Liu Bin,Tao Yong

Strategic Study of CAE 2005, Volume 7, Issue 2,   Pages 69-72

Abstract:

Based on the decision character of the dynamic multiple-attribute system, in initializing the attributeand negative ideal precept of each period, a new grey incidence decision model of the dynamic multi-attributeIn this model, the developing character of each attribute in the system is fully consider, and appliedAll of the above provide a scientific and applied decision method for the dynamic multiple - attribute

Keywords: grey incidence analysis     multi-attribute decision     model    

Construction Project Investment Optimization Based on Genetic Algorithm

Chen Yaoming,Zhong Denghua,Fu Jinqiang

Strategic Study of CAE 2006, Volume 8, Issue 7,   Pages 68-71

Abstract: time-cost-quality trade-off optimization model is set up by using multi-objective optimization theory and multi-attribute

Keywords: project investment     multi-attribute utility function     genetic algorithms    

Title Author Date Type Operation

Generic attribute revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article

A quantitative attribute-based benchmark methodology for single-target visual tracking

Wen-jing KANG, Chang LIU, Gong-liang LIU

Journal Article

Reduction of rough set attribute based on immune clone selection

LIANG Lin, XU Guang-hua

Journal Article

A multi-attribute decision making approach of mix design based on experimental soil characterization

Amit K. BERA, Tanmoy MUKHOPADHYAY, Ponnada J. MOHAN, Tushar K. DEY

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

The engineering analysis of the multidimensional attribute

Xu Changshan,Qu Lei

Journal Article

Attribute reduction in interval-valued information systems based on information entropies

Jian-hua DAI,Hu HU,Guo-jie ZHENG,Qing-hua HU,Hui-feng HAN,Hong SHI

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Study on the Multi-attribute Decision Model of Grey Target Based on Interval Number

Dang Yaoguo,Liu Sifeng,Liu Bin

Journal Article

Study on Grey Incidence Decision Model of the Dynamic Multiple-attribute

Dang Yaoguo,Liu Sifeng,Liu Bin,Tao Yong

Journal Article

Construction Project Investment Optimization Based on Genetic Algorithm

Chen Yaoming,Zhong Denghua,Fu Jinqiang

Journal Article