RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization

        ( Junyan ),( Kegen Yu ),( Yangqin Cao ),( Liang Chen ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.9

        In this paper a three-phase secure compressive sensing (CS) and received signal strength (RSS) based target localization approach is proposed to mitigate the effect of malicious node attack. RSS measurements are first arranged into a group of subsets where the same measurement can be included in multiple subsets. Intermediate target position estimates are then produced using individual subsets of RSS measurements and the CS technique. From the intermediate position estimates, the residual error vector and residual error square vector are formed. The least median of residual error square is utilized to define a verifier parameter. The selected residual error vector is utilized along with a threshold to determine whether a node or measurement is under attack. The final target positions are estimated by using only the attack-free measurements and the CS technique. Further, theoretical analysis is performed for parameter selection and computational complexity evaluation. Extensive simulation studies are carried out to demonstrate the advantage of the proposed CS-based secure localization approach over the existing algorithms.

      • KCI등재

        Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming

        ( Jun Yan ),( Kegen Yu ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.11

        This paper investigates optimization-based base station (BS) placement. An optimization model is defined and the BS placement problem is transformed to a lexicographical stratified programming (LSP) model for a given trajectory, according to different accuracy requirements. The feasible region for BS deployment is obtained from the positioning system requirement, which is also solved with signal coverage problem in BS placement. The LSP mathematical model is formulated with the average geometric dilution of precision (GDOP) as the criterion. To achieve an optimization solution, a tolerant factor based complete stratified series approach and grid searching method are utilized to obtain the possible optimal BS placement. Because of the LSP model utilization, the proposed algorithm has wider application scenarios with different accuracy requirements over different trajectory segments. Simulation results demonstrate that the proposed algorithm has better BS placement result than existing approaches for a given trajectory.

      • KCI등재

        An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks

        Jun Yan,Jiawang Chen,Yihui Zhou,Zhenqiang Wu,Laifeng Lu 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.1

        In pace with the development of network technology at lightning speed, social networks have been extensively applied in our lives. However, as social networks retain a large number of users’ sensitive information, the openness of this information makes social networks vulnerable to attacks by malicious attackers. To preserve the link privacy of individuals in social networks, an uncertain graph method based on node random response is devised, which satisfies differential privacy while maintaining expected data utility. In this method, to achieve privacy preserving, the random response is applied on nodes to achieve edge modification on an original graph and node differential privacy is introduced to inject uncertainty on the edges. Simultaneously, to keep data utility, a divide and conquer strategy is adopted to decompose the original graph into many sub-graphs and each sub-graph is dealt with separately. In particular, only some larger sub-graphs selected by the exponent mechanism are modified, which further reduces the perturbation to the original graph. The presented method is proven to satisfy differential privacy. The performances of experiments demonstrate that this uncertain graph method can effectively provide a strict privacy guarantee and maintain data utility.

      • SCOPUS

        An Interference Matrix Based Approach to Bounding Worst-Case Inter-Thread Cache Interferences and WCET for Multi-Core Processors

        Jun Yan,Wei Zhang 한국정보과학회 2011 Journal of Computing Science and Engineering Vol.5 No.2

        Different cores typically share the last-level cache in a multi-core processor. Threads running on different cores may interfere with each other. Therefore, the multi-core worst-case execution time (WCET) analyzer must be able to safely and accurately estimate the worst-case inter-thread cache interference. This is not supported by current WCET analysis techniques that manly focus on single thread analysis. This paper presents a novel approach to analyze the worst-case cache interference and bounding the WCET for threads running on multi-core processors with shared L2 instruction caches. We propose to use an interference matrix to model inter-thread interference, on which basis we can calculate the worst-case inter-thread cache interference. Our experiments indicate that the proposed approach can give a worst-case bound less than 1%, as in benchmark fib-call, and an average 16.4% overestimate for threads running on a dual-core processor with shared-L2 cache. Our approach dramatically improves the accuracy of WCET overestimatation by on average 20.0% compared to work.

      • KCI등재

        A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective

        Jun Yan,Ziwei Han,Yihui Zhou,Laifeng Lu 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.3

        Genome-wide association studies (GWAS) aim to find the significant genetic variants for common complex disease. However, genotype data has privacy information such as disease status and identity, which make data sharing and research difficult. Differential privacy is widely used in the privacy protection of data sharing. The current differential privacy approach in GWAS pays no attention to raw data but to statistical data, and doesn’t achieve equilibrium between utility and privacy, so that data sharing is hindered and it hampers the development of genomics. To share data more securely, we propose a differential privacy preserving approach of data sharing for GWAS, and achieve the equilibrium between privacy and data utility. Firstly, a reasonable disturbance interval for the genotype is calculated based on the expected utility. Secondly, based on the interval, we get the Nash equilibrium point between utility and privacy. Finally, based on the equilibrium point, the original genotype matrix is perturbed with differential privacy, and the corresponding random genotype matrix is obtained. We theoretically and experimentally show that the method satisfies expected privacy protection and utility. This method provides engineering guidance for protecting GWAS data privacy.

      • KCI등재

        The Effect of H2O2/Fe2+ Catalytic Oxidation System on the Morphology, Structure and Properties of Flake-Like Poly(2,3-dimethylaniline)

        Jun Yan,Li Ma,Mengyu Gan,Xiao Li,Zhitao Li,Jihai Tang,Ying Tu,Haifeng Hu 한국고분자학회 2014 Macromolecular Research Vol.22 No.8

        In this work, flake-like poly(2,3-dimethylaniline) (P(2,3-DMA)) with enhanced thermal stability andanticorrosive ability was synthesized by in situ polymerization using H2O2/Fe2+ catalytic oxidation system, comparingwith traditional oxidant ammonium persulfate (APS) synthetic method. The structure and morphology of thesamples were characterized Fourier transform infrared (FTIR) spectra, X-ray diffraction (XRD) and field-emissionscanning electron microscope (FESEM). The experimental results demonstrated that using H2O2/Fe2+ catalytic oxidationsystem was more inclined to form the two-dimensional P(2,3-DMA) flakes. The enhancement in thermostabilityand corrosion resistance was attributed to the formation of phenazine-like structures in the polymer chains,which could serve as templates to form the flake-like morphology. In addition, using H2O2/Fe2+ catalytic oxidationsystem is more environmental friendly than the APS method that can avoid ammonium pollution on aquatic life aswell as waters.

      • MAPPING THE IN-FEED NATIVE ADVERTISING RESEARCH: A BIBLIOMETRIC REVIEW AND DIRECTIONS FOR FUTURE RESEARCH

        Jun Yan,Chenying Hai,Zhen Li,Hewei Lv 글로벌지식마케팅경영학회 2023 Global Marketing Conference Vol.2023 No.07

        Over the past decade, in-feed native advertising has become one of the most popular forms of online advertising, attracting attention from both academia and industry. Compared to traditional online ads, in-feed native ads are less intrusive and have more engaging content, effectively reducing users' tendency to avoid ads and improving advertising effectiveness. Despite existing review studies, most of them focus on specific aspects of in-feed native advertising, such as ad identification, disclosure, or regulation, and lack an overview of the relevant literature. Moreover, with the diversified development of digital media forms, the widespread application of AI technologies, and the improvement of consumers' ad literacy, in-feed native ad research faces new issues and practical challenges. Thus, a systematic review of existing research is necessary to identify valuable future research directions.

      • SCOPUS

        Computing and Reducing Transient Error Propagation in Registers

        Jun Yan,Wei Zhang 한국정보과학회 2011 Journal of Computing Science and Engineering Vol.5 No.2

        Recent research indicates that transient errors will increasingly become a critical concern in microprocessor design. As embedded processors are widely used in reliability-critical or noisy environments, it is necessary to develop cost-effective fault-tolerant techniques to protect processors against transient errors. The register file is one of the critical components that can significantly affect microprocessor system reliability, since registers are typically accessed very frequently, and transient errors in registers can be easily propagated to functional units or the memory system, leading to silent data error (SDC) or system crash. This paper focuses on investigating the impact of register file soft errors on system reliability and developing cost-effective techniques to improve the register file immunity to soft errors. This paper proposes the register vulnerability factor (RVF) concept to characterize the probability that register transient errors can escape the register file and thus potentially affect system reliability. We propose an approach to compute the RVF based on register access patterns. In this paper, we also propose two compiler-directed techniques and a hybrid approach to improve register file reliability cost-effectively by lowering the RVF value. Our experiments indicate that on average, RVF can be reduced to 9.1% and 9.5% by the hyperblock-based instruction re-scheduling and the reliability-oriented register assignment respectively, which can potentially lower the reliability cost significantly, without sacrificing the register value integrity.

      • SCOPUS

        Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches

        Jun Yan,Wei Zhang 한국정보과학회 2011 Journal of Computing Science and Engineering Vol.5 No.1

        As the first step toward real-time multi-core computing, this paper presents a novel approach to bounding the worst-case performance for threads running on multi-core processors with shared L2 instruction caches. The idea of our approach is to compute the worst-case instruction access interferences between different threads based on the program control flow information of each thread, which can be statically analyzed. Our experiments indicate that the proposed approach can reasonably estimate the worst-case shared L2 instruction cache misses by considering the inter-thread instruction conflicts. Also, the worst-case execution time (WCET) of applications running on multi-core processors estimated by our approach is much better than the estimation by simply assuming all L2 instruction accesses are misses.

      • KCI등재

        A Study of Smartphone Sustainable Business in the Chinese Market through Conjoint Analysis

        Junyan YANG(Junyan YANG),Jun ZHANG(Jun ZHANG) 한국유통과학회 2024 The Journal of Industrial Distribution & Business( Vol.15 No.3

        Purpose: This study focuses on the Chinese smartphone market to estimate product attributes influencing Chinese customers’ preference for developing new smartphones through conjoint analysis. Research design, data and methodology: The online questionnaire survey is processed among Chinese potential smartphone customers. Conjoint analysis including traditional conjoint analysis (TCA) and choice-based conjoint analysis (CBCA), is used to analyze the useful data of 500. Results: Results indicate that price is the most important predictor while screen size is the least for Chinese customers’ preference whether the method is TCA or CBCA. However, the importance of brand, capacity, CPU, and screen design is different. Moreover, based on each smartphone attribute level’s utility, the new products with the best combinations are different compared with both methods. Finally, the predicted market shares of the top 3 products are the same with maximum utility rule model between TCA and CBCA. However, when considering with the new best combined product, they are significantly different. Conclusions: Managers should recognize the differences between TCA and CBCA and select the best method to develop new smartphones for sustainable business in the Chinese competitive market based on the important attributes of price, brand, capacity, CPU, screen design, and size.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼