Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Computing power trading and pricing in mobile edge computing based on Stackelberg game
WU Yuxin, CAI Ting, ZHANG Dabin
Journal of Computer Applications    2020, 40 (9): 2683-2690.   DOI: 10.11772/j.issn.1001-9081.2020010112
Abstract587)      PDF (1429KB)(846)       Save
Concerning the problem of limited computing capacity and storage capacity of lightweight smart devices in mobile edge computing, a computational offloading solution based on Stackelberg game was proposed. First, Combining with the blockchain technology, a computing power trading model based on cloud mining mechanism, named CPTP-BSG (Computing Power Trading and Pricing with Blockchain and Stackelberg Game), was built, which allows mobile smart devices (miners) to offload intensive and complex computing tasks to edge servers. Second, the computing power trading between miners and Edge computing Service Providers (ESPs) was modeled as a two-stage Stackelberg game process, and the expected profit functions for miners and ESP were formulated. Then, the existence and uniqueness of Nash equilibrium solution were respectively analyzed under uniform pricing and discriminatory pricing strategies by backward induction. Finally, a low gradient iterative algorithm was proposed to maximize the profits of miners and ESP. Experimental results show the effectiveness of the proposed algorithm, and it can be seen that the discriminatory pricing is more in line with the personalized computing power demand of miners than uniform pricing, and can achieve higher total demand of computing power and ESP profit.
Reference | Related Articles | Metrics
Automatic smart contract classification model based on hierarchical attention mechanism and bidirectional long short-term memory neural network
WU Yuxin, CAI Ting, ZHANG Dabin
Journal of Computer Applications    2020, 40 (4): 978-984.   DOI: 10.11772/j.issn.1001-9081.2019081327
Abstract607)      PDF (1079KB)(874)       Save
For that the variety of smart contract applications on the blockchain platform exists more widely and manual filtering the suitable smart contract application services is more difficult, a hierarchical attention mechanism and Bidirectional Long Short-Term Memory(Bi-LSTM)neural network based model was proposed for automatic smart contract classification,namely HANN-SCA(Hierarchical Attention Neural Network with Source Code and Account). Firstly,the Bi-LSTM network was used to simultaneously model the smart contract source code and account information to extract the feature information of smart contract to the greatest extent. The source code perspective focused on the semantic features of code, and the account information perspective focused on the features of the account. Then,in the process of feature learning,the attention mechanism was introduced into the word level and the sentence level respectively to focus on the words and sentences that were important to the classification of smart contract. Finally,the code features and the account features were spliced to generate the document-level feature representation of the smart contract,and the classification task was completed through the Softmax layer. Experimental results on datasets of Dataset-E,Dataset-N and Dataset-EO show that the classification precisions of HANN-SCA model reach 93. 1%,91. 7% and 92. 1% respectively,which are better than those of the traditional Support Vector Machine(SVM)model and other neural network benchmark models,and the proposed model also has better stability and higher convergence speed.
Reference | Related Articles | Metrics
Specification and verification method for security policy in multi-domain cloud systems
CAI Ting, CAI Yu, OUYANG Kai
Journal of Computer Applications    2016, 36 (7): 1834-1840.   DOI: 10.11772/j.issn.1001-9081.2016.07.1834
Abstract629)      PDF (1108KB)(318)       Save
To effectively manage the enforcement of secure policies during the cross-domain interoperation among cloud systems, a management technique applied for the verification of multi-domain cloud policies was proposed. First, both the access control policies and security properties under secure inter-operation environments were studied, the intra-domain administration was distinguished from inter-domain administration according to role hierarchies, and a multi-domain Role Based Access Control (domRBAC) model and specifications for the security properties based on Computation Tree Logic (CTL) were formally defined. Next, a role-to-role mapping algorithm derived from the graph theory was proposed, to depict the reasoning for domRBAC hierarchies, and a verification algorithm of security policies for cloud systems was further constructed. The simulation results show that, the time cost of security policy verification for multi-domains increases with the expansion of the size of the system. Multi-process parallel detection mode can reduce the time of policy verification from 70.1% to 88.5%, and compared to the normal mode, the model optimized detection mode fluctuates smaller in time lines, and the time overhead is significantly lower for large-scale systems. Therefore, the proposed technique has stable performance and high efficiency to be used in secure interoperation of large-scale cloud systems.
Reference | Related Articles | Metrics