您的位置: 专家智库 > >

国家自然科学基金(61202458)

作品数:28 被引量:70H指数:5
相关作者:赵国生王健廖祎玮赵中楠李振兴更多>>
相关机构:哈尔滨师范大学哈尔滨理工大学更多>>
发文基金:国家自然科学基金黑龙江省自然科学基金国家教育部博士点基金更多>>
相关领域:自动化与计算机技术文化科学理学电子电信更多>>

文献类型

  • 27篇中文期刊文章

领域

  • 26篇自动化与计算...
  • 1篇电子电信
  • 1篇文化科学
  • 1篇理学

主题

  • 8篇感知
  • 6篇可生存系统
  • 5篇网络
  • 4篇可生存性
  • 3篇物联网
  • 3篇联网
  • 2篇形式化
  • 2篇形式化描述
  • 2篇英文
  • 2篇用户
  • 2篇入侵
  • 2篇入侵检测
  • 2篇入侵检测模型
  • 2篇识别性
  • 2篇可识别性
  • 2篇OPTIMI...
  • 2篇PEPA
  • 2篇CLOUD
  • 2篇TANGLE
  • 1篇递归

机构

  • 23篇哈尔滨师范大...
  • 16篇哈尔滨理工大...

作者

  • 20篇赵国生
  • 16篇王健
  • 4篇廖祎玮
  • 2篇李志聪
  • 2篇李振兴
  • 2篇赵中楠
  • 2篇李琳
  • 2篇姜春茂
  • 2篇张楠
  • 1篇盛琳阳
  • 1篇那锐
  • 1篇李英梅
  • 1篇李世明
  • 1篇杨阳
  • 1篇刘海龙
  • 1篇苏岩
  • 1篇郭乃文

传媒

  • 5篇小型微型计算...
  • 4篇计算机工程与...
  • 3篇The Jo...
  • 2篇电子与信息学...
  • 2篇Journa...
  • 2篇智能计算机与...
  • 1篇哈尔滨师范大...
  • 1篇电子学报
  • 1篇华中科技大学...
  • 1篇高技术通讯
  • 1篇计算机工程与...
  • 1篇传感技术学报
  • 1篇计算机科学
  • 1篇Wuhan ...
  • 1篇计算机教育

年份

  • 1篇2023
  • 1篇2022
  • 6篇2021
  • 7篇2020
  • 2篇2019
  • 3篇2018
  • 2篇2017
  • 4篇2014
  • 1篇2013
28 条 记 录,以下是 1-10
排序方式:
物联网安全与工程专业的建设模式探索被引量:1
2017年
针对物联网安全与工程专业的建设模式提出一些探索性的问题,为该专业的课程设置、课程体系建设、人才培养模式、校企合作机制建设、职业能力分析等方面提供一些新的建设思路。
赵国生王健李世明郭乃文郭兆文
关键词:课程模式
代价敏感的容器多目标资源放置优化算法
2020年
自Docker问世以来,微服务也得到了快速的发展,企业、组织等纷纷使用微服务架构进行容器化开发。为了管理数以万计的容器应用,各种容器编排框架应运而生,但容器调度过程中带来的能耗高、资源利用率低等问题非常显著。研究合理的容器放置,能有效的减缓此类问题。针对CPU、内存和带宽三类资源利用率低等问题,提出了容器多目标资源放置算法CMR(Container Multi-target Resource)。实验结果证明CMR算法能够将容器放置到与自身资源请求大小最吻合的虚拟机上,对比FF、LF、MF和RS算法能够同时节省CPU能耗34.0%,内存能耗33.8%,带宽能耗26.5%。
曹成成李志聪
关键词:多目标资源利用率能耗
基于Tangle网络的移动群智感知数据安全交付模型被引量:16
2020年
针对现有群智感知平台在数据和酬金交付过程中存在的安全风险和隐私泄露问题,该文提出一种基于Tangle网络的分布式群智感知数据安全交付模型。首先,在数据感知阶段,调用局部异常因子检测算法剔除异常数据,聚类获取感知数据并确定可信参与者节点。然后,在交易写入阶段,使用马尔科夫蒙特卡洛算法选择交易并验证其合法性,通过注册认证中心登记完成匿名身份数据上传,并将交易同步写入分布式账本。最后,结合Tangle网络的累计权重共识机制,当交易安全性达到阈值时,任务发布者可进行数据和酬金的安全交付。仿真试验表明,在模型保护用户隐私的同时,增强了数据和酬金的安全交付能力,相比现有感知平台降低了时间复杂度和任务发布成本。
赵国生张慧王健
Cloud security situation prediction method based on grey wolf optimization and BP neural network被引量:1
2020年
Aiming at the accuracy and error correction of cloud security situation prediction,a cloud security situation prediction method based on grey wolf optimization(GWO)and back propagation(BP)neural network is proposed.Firstly,the adaptive disturbance convergence factor is used to improve the GWO algorithm,so as to improve the convergence speed and accuracy of the algorithm.The Chebyshev chaotic mapping is introduced into the position update formula of GWO algorithm,which is used to select the features of the cloud security situation prediction data and optimize the parameters of the BP neural network prediction model to minimize the prediction output error.Then,the initial weights and thresholds of BP neural network are modified by the improved GWO algorithm to increase the learning efficiency and accuracy of BP neural network.Finally,the real data sets of Tencent cloud platform are predicted.The simulation results show that the proposed method has lower mean square error(MSE)and mean absolute error(MAE)compared with BP neural network,BP neural network based on genetic algorithm(GA-BP),BP neural network based on particle swarm optimization(PSO-BP)and BP neural network based on GWO algorithm(GWO-BP).The proposed method has better stability,robustness and prediction accuracy.
Zhao GuoshengLiu DongmeiWang Jian
关键词:CLOUDSITUATIONGREYWOLFOPTIMIZATIONFEATURE
基于Agent的可生存系统认知单元结构模型被引量:1
2013年
基于Agent结构,提出一种新的可生存系统认知单元结构模型.首先建立了基于认知环的可生存系统认知单元结构工作流程,然后给出了一种认知单元具体结构,并对结构中的各模块进行了描述,最后基于Agent结构的HSA模型,对可生存系统认知单元结构模型进行了形式化描述.
李琳赵国生
关键词:可生存系统AGENT形式化描述
一种可生存系统的自主应急恢复方法
2014年
提出一种面向可生存系统的自主应急恢复方法.研究了系统最优重启恢复的时间,确定了重启恢复的时间间隔参数;介绍了分层多级应急恢复的实现方式,依据重启对象的不同将恢复分成4个层次,并按层内分级的思想给出了重启次序优先级和重启次序链的建立方法;并对重启恢复实施过程进行了建模分析和构建了系统状态转换模型.仿真实验进一步分析了影响恢复总成本的参数约束,通过和传统周期性恢复方法比较,提出的方法在大大降低恢复成本的同时提高了系统的可生存性能.
赵国生王健李振兴那锐
Cloud Service Security Adaptive Target Detection Algorithm Based on Bio-Inspired Performance Evaluation Process Algebra被引量:1
2019年
Combining the principle of antibody concentration with the idea of biological evolution, this paper proposes an adaptive target detection algorithm for cloud service security based on Bio-Inspired Performance Evaluation Process Algebra(Bio-PEPA). The formal modelling of cloud services is formally modded by Bio-PEPA and the modules are transformed between cloud service internal structures and various components. Then, the security adaptive target detection algorithm of cloud service is divided into two processes, the short-term optimal action selection process which selects the current optimal detective action through the iterative operation of the expected function and the adaptive function, and the long-term detective strategy realized through the updates and eliminations of action planning table. The combination of the two processes reflects the self-adaptability of cloud service system to target detection. The simulating test detects three different kinds of security risks and then analyzes the relationship between the numbers of components with time in the service process. The performance of this method is compared with random detection method and three anomaly detection methods by the cloud service detection experiment. The detection time of this method is 50.1% of three kinds of detection methods and 86.3% of the random detection method. The service success rate is about 15% higher than that of random detection methods. The experimental results show that the algorithm has good time performance and high detection hit rate.
ZHAO GuoshengQU XiaofengLIAO YutingWANG TiantianZHANG Jingting
关键词:SECURITYBIO-INSPIREDALGEBRAADAPTIVEEVOLUTIONARY
深度信念网络在云安全态势预测中的应用被引量:11
2020年
面向多源异构大数据环境下云安全态势预测的准确性问题,提出了一种基于深度信念网络的云安全态势预测模型.首先,针对云计算环境的安全需求引入可度量的态势要素指标体系.然后,构建了云安全态势预测的样本数据,通过深度信念网络实现了态势要素和预测值之间的映射,并结合改进的差分进化算法实现了隐含层网络参数的优化.同时,引入二维旋转交叉策略增加进化种群的多样性,避免预测模型过早收敛.最后,仿真结果表明相对于现有的云安全态势预测模型提高了预测准确度.
赵国生晁绵星谢宝文王健
关键词:云安全差分进化算法
XGBoost-RF的物联网入侵检测模型被引量:7
2022年
针对物联网入侵检测中检测数据不平衡导致的分类不准确的问题,提出了一种基于极端梯度提升树和随机森林相结合的物联网入侵检测模型.首先,针对物联网应用环境中产生的大量数据,对数据进行数据归一化处理.然后,利用XGBoost算法对其中的特征进行重要性评分,选择最优特征.最后,结合改进的随机森林算法,解决因数据不平衡导致的分类不准确的问题.仿真试验表明所提模型能有效的进行数据最优特征选择及合理地检测分类,同RF算法、SVM算法、Tree-SVM模型和RF-GDBT模型相比,所提模型的检测准确率有效改善.
乔楠李振兴赵国生
关键词:物联网入侵检测
Research on location privacy protection method of sensor-cloud base station
2021年
In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protection algorithm based on local differential privacy(LDP) is proposed. Firstly, through the local obfuscation algorithm(LOA), the base station can get the data of the real location and the pseudo location by flipping a coin, and then send the data to the fog layer, then the obfuscation location domain set is obtained. Secondly, in order to reconstruct the location distribution of the real location and the pseudo location in the base station, the location domain of the base station is divided into several decentralized sub-regions, and a privacy location reconstruction algorithm(PLRA) is performed in each sub-region. Finally, the base station correlates the location information of each sub-region, and then uploads the data information containing the disturbance location to the fog node layer. The simulation results show that compared with the existing base station location anonymity and security technique(BLAST) algorithm, the proposed method not only reduce the algorithm’s running time and network delay, but also improve the data availability. So the proposed method can protect the location privacy of the base station more safely and efficiently.
Zhao GuoshengZhang JingtingWang Jian
共3页<123>
聚类工具0