Technology trends in large-scale high-efficiency network computing

J Su, B Zhao, Y Dai, J Cao, Z Wei, N Zhao… - Frontiers of Information …, 2022 - Springer
Network technology is the basis for large-scale high-efficiency network computing, such as
supercomputing, cloud computing, big data processing, and artificial intelligence computing …

Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet

H Chen, X Han, Y Zhang - Tsinghua Science and Technology, 2023 - ieeexplore.ieee.org
With the rapid development of information technologies, industrial Internet has become more
open, and security issues have become more challenging. The endogenous security …

A Differentially Private Framework for the Dynamic Heterogeneous Redundant Architecture System in Cyberspace

Y Kang, Q Zhang, B Jiang, Y Bu - Electronics, 2024 - mdpi.com
With the development of information technology, tremendous vulnerabilities and backdoors
have evolved, causing inevitable and severe security problems in cyberspace. To fix them …

IoT-enabled Secure Service-Oriented Architecture (IOT-SOA) through Blockchain

A Sharma, M Gali, A Mahamkali… - … For Smart Nation …, 2023 - ieeexplore.ieee.org
Web providers publish service descriptions in a registry for clients to find and use in
conventional SOA. This design allows loosely connected service invocation but lacks a …

Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels

Z Wan, M Yan, K Huang, Z Zhong, X Xu… - Frontiers of Information …, 2023 - Springer
Physical layer key generation (PKG) technology leverages reciprocal channel randomness
to generate shared secret keys. However, multipath fading at the receiver may degrade the …

A Countermeasure Against RIS Jamming Attack in Physical Layer Key Generation

Z Wan, X Hu, X Sun, X Xu, K Huang… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
The attacker can manipulate a reconfigurable intelligent surface (RIS) to jamming attack to
break the channel reciprocity, resulting in an increasing key disagreement rate (KDR) to …

[HTML][HTML] 6G 天地一体化信息网络内生安全技术

季新生, 黄开枝, 邬江兴, 陈亚军, 游伟 - 天地一体化信息网络 - infocomm-journal.com
6G 天地一体化信息网络面临因网络高度暴露, 节点高速运动, 计算资源受限等特点带来的安全
挑战, 且新架构, 新应用, 新技术也将引入新的安全问题, 亟须提出普适性安全理论 …

高性能计算和数据中心融合网络研究综述.

陆平静, 董德尊, 赖明澈, 齐星云… - Journal of National …, 2023 - search.ebscohost.com
随着高性能计算, 大数据处理, 云计算和人工智能计算呈融合发展趋势, 高性能计算网络和数据
中心网络的融合网络成为互连网络发展的重要趋势. 分析当前融合网络研究现状; …

大规模高效网络计算中的网络技术发展趋势

J SU, B ZHAO, Y DAI, J CAO, Z WEI, N ZHAO, C SONG… - Frontiers, 2022 - jzus.zju.edu.cn
网络技术是超级计算, 云计算, 大数据和人工智能等大规模高效计算的基础.
不同领域的网络技术既互相借鉴, 又各自针对性设计和优化. 综合考虑, 本文认为大规模高效网络 …

The Overall Development Trend of 6G

Y Ran, D Zhang - 2023 5th International Academic Exchange …, 2023 - ieeexplore.ieee.org
In the year 2030, the anticipated sixth-generation (6G) wireless communication network is
poised to offer worldwide coverage, heightened efficiency in spectrum utilization, energy …