期刊文献+
共找到126篇文章
< 1 2 7 >
每页显示 20 50 100
A Method for Time-Series Location Data Publication Based on Differential Privacy
1
作者 KANG Haiyan ZHANG Shuxuan JIA Qianqian 《武汉大学学报:自然科学英文版》 CAS CSCD 2019年第2期107-115,共9页
In the age of information sharing, logistics information sharing also faces the risk of privacy leakage. In regard to the privacy leakage of time-series location information in the field of logistics, this paper propo... In the age of information sharing, logistics information sharing also faces the risk of privacy leakage. In regard to the privacy leakage of time-series location information in the field of logistics, this paper proposes a method based on differential privacy for time-series location data publication. Firstly, it constructs public region of interest (PRO!) related to time by using clustering optimal algorithm. And it adopts the method of the centroid point to ensure the public interest point (PIP) representing the location of the public interest zone. Secondly, according to the PIP, we can construct location search tree (LST) that is a commonly used index structure of spatial data, in order to ensure the inherent relation among location data. Thirdly, we add Laplace noise to the node of LST, which means fewer times to add Laplace noise on the original data set and ensures the data availability. Finally, experiments show that this method not only ensures the security of sequential location data publishing, but also has better data availability than the general differential privacy method, which achieves a good balance between the security and availability of data. 展开更多
关键词 sequential LOCATION DATA PUBLISHING region of INTEREST LOCATION search tree differential PRIVACY
Improved impossible differential cryptanalysis of large-block Rijndael
2
作者 Ya LIU Yifan SHI +5 位作者 Dawu GU Bo DAI Fengyu ZHAO Wei LI Zhiqiang LIU Zhiqiang ZENG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2019年第3期1-14,共14页
Rijndael is a substitution-permutation network(SPN)block cipher for the AES development process.Its block and key sizes range from 128 to 256 bits in steps of 32 bits,which can be denoted by Rijndael-6-Zc,where b and ... Rijndael is a substitution-permutation network(SPN)block cipher for the AES development process.Its block and key sizes range from 128 to 256 bits in steps of 32 bits,which can be denoted by Rijndael-6-Zc,where b and k are the block and key sizes,respectively.Among them,Rijndael-128-128/192/256,that is,AES,has been studied by many researchers,and the security of other large-block versions of Rijndael has been exploited less frequently.However,more attention has been paid to large-block versions of block ciphers with the fast development of quantum computers.In this paper,we propose improved impossible differential attacks on 10-round Rijndael-256-256,10-round Rijndael-224-256,and 9-round Rijndael-224-224 using precomputation tables,redundancies of key schedules,and multiple impossible differentials.For 10-round Rijndael-256-256,the data,time,and memory complexities of our attack were approximately 2^244.4 chosen plaintexts,2^240.1 encryptions,and 2^181.4 blocks,respectively.For 10-round Rijndael-224-256,the data,time,and memory complexities of our attack were approximately 2^214.4 chosen plaintexts,2^241.3 encryptions,and 2183.4 blocks,respectively.For 9-round Rijndael-224-224,the data,time,and memory complexities of our attack are approximately 2^214.4 chosen plaintexts,2^113.4 encryptions,and 2^87.4 blocks,respectively,or 2^206.6 chosen plaintexts,2^153.6 encryptions,and 2^111.6 blocks,respectively.To the best of our knowledge,our results are currently the best on Rijndael-256-256 and R.ijndael-224-224/256. 展开更多
关键词 block CIPHER Rijndael.precomputation tables impossible DIFFERENTIALS multiple impossible differential ATTACKS
针对异质群体的高质量轨迹规划方法 预览
3
作者 李猛 李石磊 葛渊峥 《中南大学学报:英文版》 SCIE EI CAS CSCD 2019年第3期654-664,共11页
基于具有最大速度和最大加速度约束的轨迹规划方法,针对人群仿真中的异质群体,提出一种新颖的高质量轨迹规划方法。该方法能够保证个体的运动路径是平滑的,个体的速度是连续的。考虑到真实人具有最大速度和最大加速度的生理学约束,本文... 基于具有最大速度和最大加速度约束的轨迹规划方法,针对人群仿真中的异质群体,提出一种新颖的高质量轨迹规划方法。该方法能够保证个体的运动路径是平滑的,个体的速度是连续的。考虑到真实人具有最大速度和最大加速度的生理学约束,本文首先推导出一种时间最优的轨迹和可行域来解决kinodynamic规划问题。随后,通过计算具有恰当速度多样性的轨迹设计出一种高质量的轨迹规划方法。仿真结果表明提出的轨迹规划方法具有更高的真实性,能够为人群仿真中的虚拟人提供高质量的运动轨迹。 展开更多
关键词 异质人群 轨迹规划 有界的速度和加速度 视觉多样性 真实性
在线阅读 免费下载
Improved meet-in-the-middle attacks on reduced-round Piccolo
4
作者 Ya LIU Liang CHENG +3 位作者 Zhiqiang LIU Wei LI Qingju WANG Dawu GU 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2018年第3期91-103,共13页
短笛是与 4 个分支,其各个长是 16 位采用概括 Feistel 网络结构的小块零。关键长度是 80 或 128 小点,分别地由 Piccolo-80 和 Piccolo-128 表示了。在这份报纸,没有 preand whitening 以后钥匙和 18 回合 Piccolo-128,我们由利用... 短笛是与 4 个分支,其各个长是 16 位采用概括 Feistel 网络结构的小块零。关键长度是 80 或 128 小点,分别地由 Piccolo-80 和 Piccolo-128 表示了。在这份报纸,没有 preand whitening 以后钥匙和 18 回合 Piccolo-128,我们由利用关键时间表和最大的距离的性质用 whitening 以后钥匙在 14 回合 Piccolo-80 上发动了 meet-in-the-middle 攻击可分离(MDS ) 矩阵。为 Piccolo-80,我们首先构造了 5 回合 distinguisher。然后, 4 个回合和 5 个回合分别地在开始并且在结束被添加。基于这结构,我们从第 5 回合在 14 回合 Piccolo-80 上发动了攻击到第 18 回合。数据,时间,和存储器复杂性是选择的 2 <sup>52</sup> 纯文本, 2 <sup>67.44</sup> 加密,和 2 <sup>64.91</sup> 块分别地。为 Piccolo-128,我们造了 7 回合 distinguisher 从第 4 回合攻击 18 回合 Piccolo-128 到第 21 回合。数据,时间,和记忆复杂性是选择的 2 <sup>52</sup> 纯文本, 2 <sup>126.63</sup> 加密,和 2 <sup>125.29</sup> 块分别地。如果不在 biclique 密码翻译法上考虑结果,这些当前是短笛块零的这个减少的版本上的最好的公共结果。 展开更多
关键词 攻击 还原剂 网络结构 时间表 复杂性 纯文本 存储器
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
5
作者 Ping ZHOU Tao WANG +3 位作者 Xiaoxuan LOU Xinjie ZHAO Fan ZHANG Shize GUO 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2018年第3期230-232,共3页
关键词 攻击技术 签名算法 缓存 冲洗 核心平台 图形
Orthogonalized lattice enumeration for solving SVP
6
作者 Zhongxiang ZHENG Xiaoyun WANG +1 位作者 Guangwu XU Yang YU 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2018年第3期187-201,共15页
orthogonalized 整数表示独立地被建议由钟声等。使用基因算法和 Fukase 等。使用采样技术解决最短的向量问题(SVP ) 。他们的结果是有希望的。在这份报纸,我们为最短的向量认为稀少的 orthogonalized 是整数代表并且建议一个新枚举方... orthogonalized 整数表示独立地被建议由钟声等。使用基因算法和 Fukase 等。使用采样技术解决最短的向量问题(SVP ) 。他们的结果是有希望的。在这份报纸,我们为最短的向量认为稀少的 orthogonalized 是整数代表并且建议一个新枚举方法,叫的 orthognalized 枚举,由集成如此的一个代表。而且,我们在场一个混合 BKZ 方法,叫的 MBKZ,由或者使用 orthognalized 枚举和其它存在枚举方法。比作存在的,我们的方法有更大的效率并且为解决 SVP 在理论并且在实践完成指数的加速。我们的算法的实现被测试了在解决有效质问格子问题。 展开更多
关键词 SVP 枚举 格子 整数表示 采样技术 est ing 子问题
S-*w-Principal Ideal Domains
7
作者 Hwankoo Kim JungWook Lim 《代数集刊:英文版》 SCIE CSCD 2018年第2期217-224,共8页
关键词 非零理想 主管 不可分 学习 性质 定理 类型 子集
A blockchain future for internet of things security: a position paper 预览
8
作者 Mandrita Banerjee Junghee Lee Kim-Kwang Raymond Choo 《数字通信与网络:英文版》 2018年第3期149-160,共12页
关键词 物联网 发展现状 中国 通讯行业
在线阅读 免费下载
Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
9
作者 Yaoling DING Xiaoyun WANG +1 位作者 Ning WANG Wei WANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2018年第3期216-218,共3页
关键词 山茶 自动搜索 ISO/IEC 有效工具 尼斯湖 苏格兰 非线性
Characterization and acid-mobilization study for typical iron- bearing clay mineral
10
作者 Zhenzhen Wang Rui Li +3 位作者 Lulu Cui Hongbo Fu Jun Lin Jianmin Chen 《环境科学学报:英文版》 SCIE EI CAS CSCD 2018年第9期222-232,共11页
关键词 矿物质 泥土 学习 溶解度 电子显微镜 Fe 酸盐
B-spline surface fitting to mesh vertices
11
作者 Yang LU Junhai YONG +3 位作者 Kanle SHI Hejin GU Ping ZHENG Jean-Claude PAUL 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2017年第7期252-254,共3页
B CAD B B,,, B
关键词 B样条曲面 曲面拟合 网格模型 顶点 树结构 连续性 表面 输入
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction
12
作者 Sudipta ROY Debnath BHATTACHARYYA +1 位作者 Samir Kumar BANDYOPADHYAY Tai-Hoon KIM 《中国计算机科学前沿:英文版》 SCIE EI CSCD 2017年第4期717-727,共11页
这份报纸为特征抽取和大脑反常鉴定的预处理的使用建议大脑 binarization 的磁性的回声成像(MRI ) 的一个计算机化的方法。MRI binarization 的主要问题之一是大脑部分的许多象素不能是正确地 binarized 由于在在 MRI 的背景和前景之间... 这份报纸为特征抽取和大脑反常鉴定的预处理的使用建议大脑 binarization 的磁性的回声成像(MRI ) 的一个计算机化的方法。MRI binarization 的主要问题之一是大脑部分的许多象素不能是正确地 binarized 由于在在 MRI 的背景和前景之间的对比的广泛的黑背景或大变化。我们建议了决定阀值价值的使用意味着的 binarization,变化,标准差和熵由罐头克服大脑部件的 binarization 问题的非范围改进列在后面。建议 binarization 技术广泛地与许多 MRI 被测试并且与改进精确性和减少的错误产生好 binarization。比较关于另外的著名方法与这个创新方法在获得的结果之中被执行。 展开更多
关键词 二值化方法 预处理方法 特征提取 磁共振图像 大脑 异常检测 磁共振成像 黑色背景
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
13
作者 Chao Wang Feng Hu +1 位作者 Huanguo Zhang Jie Wu 《清华大学学报:自然科学英文版》 EI CAS CSCD 2017年第5期499-510,共12页
Ant Colony Optimization(ACO) has the character of positive feedback,distributed searching,and greedy searching.It is applicable to optimization grouping problems.Traditional cryptographic research is mainly based on p... Ant Colony Optimization(ACO) has the character of positive feedback,distributed searching,and greedy searching.It is applicable to optimization grouping problems.Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm.It seems that there is no relationship between cryptography and ACO.Actually,some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm.Therefore,this paper presents a new method of solving secure curve selection problems using ACO.We improved Complex Multiplication(CM)by combining Evolutionary Cryptography Theory with Weber polynomial solutions.We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably.It greatly increases the performance of Weber polynomial solutions.Compared with traditional CM,which can only search one root once time,our new method searches all roots of the polynomial once,and the average time needed to search for one root reduces rapidly.The more roots are searched,the more ECs are obtained. 展开更多
关键词 进化算法 安全曲线 密码学 生成方法 ECS 蚁群优化算法 分布式搜索 蚁群算法
Simple Method for Realizing Weil Theorem in Secure ECC Generation
14
作者 Feng Hu Chao Wang +1 位作者 Huanguo Zhang Jie Wu 《清华大学学报:自然科学英文版》 EI CAS CSCD 2017年第5期511-519,共9页
How to quickly compute the number of points on an Elliptic Curve(EC) has been a longstanding challenge.The computational complexity of the algorithm usually employed makes it highly inefficient.Unlike the general EC,a... How to quickly compute the number of points on an Elliptic Curve(EC) has been a longstanding challenge.The computational complexity of the algorithm usually employed makes it highly inefficient.Unlike the general EC,a simple method called the Weil theorem can be used to compute the order of an EC characterized by a small prime number,such as the Kobltiz EC characterized by two.The fifteen secure ECs recommended by the National Institute of Standards and Technology(NIST) Digital Signature Standard contain five Koblitz ECs whose maximum base domain reaches 571 bits.Experimental results show that the computation speed decreases for base domains exceeding 600 bits.In this paper,we propose a simple method that combines the Weil theorem with Pascals triangle,which greatly reduces the computational complexity.We have validated the performance of this method for base fields ranging from 2~(100) to 2~(1000).Furthermore,this new method can be generalized to any ECs characterized by any small prime number. 展开更多
关键词 Weil定理 安全系统 ECC 单方 计算复杂度 数字签名标准 美国国家标准 电子商务
Genetic Analysis of FBX02, FBX06, FBXO12, and FBX041 Variants in Han Chinese Patients with Sporadic Parkinson's Disease
15
作者 Lamei Yuan Zhi Song +5 位作者 Xiong Deng Zhijian Yang Yan Yang Yi Guo Hongwei Lu Hao Deng 《神经科学通报:英文版》 SCIE CAS CSCD 2017年第5期510-514,共5页
Parkinson's disease(PD) is the second most common neurodegenerative disorder and has an elusive etiology. It is likely multifactorial, and genetic defects contribute to its pathogenesis. At least 25 genetic loci a... Parkinson's disease(PD) is the second most common neurodegenerative disorder and has an elusive etiology. It is likely multifactorial, and genetic defects contribute to its pathogenesis. At least 25 genetic loci and20 monogenic genes have been identified in monogenic PD. Recessive F-box protein 7 gene(FBXO7) mutations reportedly cause hereditary parkinsonism. To explore the roles of four paralogs(FBXO2, FBXO6, FBXO12, and FBXO41) in PD development, their variants(rs9614,rs28924120, rs6442117, and rs61733550, respectively)were analyzed in 502 Han Chinese patients with PD and556 age, gender, and ethnicity-matched normal participants in mainland China. Statistically significant differences in genotypic and allelic frequencies were detected only in the FBXO2 variant rs9614(P = 0.001 and 0.023, respectively;odds ratio 0.819, 95% confidence interval 0.690–0.973)between patients and controls. These results suggest that the FBXO2 variant rs9614 C allele may decrease the PD risk in mainland Han Chinese and may be a biomarker for PD. 展开更多
关键词 帕金森病 遗传分析 患者 汉族 散发性 神经退行性疾病 变种 等位基因
Performance analysis of quantum access network using code division multiple access model
16
作者 胡林曦 杨灿 何广强 《中国物理B:英文版》 SCIE EI CAS CSCD 2017年第6期37-41,共5页
一个量存取网络被频率分割实现了多重存取和时间分割多重存取,当时代码分割多重存取被限制让它的困难认识到代码的 orthogonality。最近,混乱阶段 shifters 被建议由不同混乱信号和传播保证 orthogonality 光谱量状态的内容。在这封... 一个量存取网络被频率分割实现了多重存取和时间分割多重存取,当时代码分割多重存取被限制让它的困难认识到代码的 orthogonality。最近,混乱阶段 shifters 被建议由不同混乱信号和传播保证 orthogonality 光谱量状态的内容。在这封信,我们建议实现代码部门由使用混乱阶段 shifters 和同步的多重存取量网络。由于不同混乱阶段 shifter 的 orthogonality,每个用户能忠实地通过一条普通隧道播送量信息并且几乎没有在不同用户之间的很少串音。同时,混乱信号的宽带系列高效地帮助量状态对隧道损失和噪音保卫。 展开更多
Acoustic Goos-Hainchen effect
17
作者 Lin Fa Ling Xue +10 位作者 YuXiao Fa YongLan Han YanDong Zhang HongShen Cheng PengFei Ding GuoHui Li ShaoJie Tang ChunLing Bai BingJie Xi XiaoLin Zhang MeiShan Zhao 《中国科学:物理学、力学、天文学英文版》 SCIE EI CAS CSCD 2017年第10期15-26,共12页
We report two models of the lateral displacement of acoustic-wave scattering on a fluid-solid interface that reveal an acoustic analog of the Goos-H?nchen effect in optics. This acoustic analog is called the acoustic ... We report two models of the lateral displacement of acoustic-wave scattering on a fluid-solid interface that reveal an acoustic analog of the Goos-H?nchen effect in optics. This acoustic analog is called the acoustic Goos-H?nchen effect. Using newly proposed models, we made numerical calculations for the system of a water-Perspex interface. Specifically, in the post-critical-angle region,we observed a lateral displacement(and transition time) of the reflected P-wave with respect to the incident P-wave. The first arrival of the acoustic signal from the interface is found to be a reflected P-wave rather than the sliding-refraction P-wave usually described in traditional acoustic-logging sliding P-wave theory. For both proposed models, the effective propagation speed of the reflected P-wave along the interface depends on not only the physical properties of the interfacial media but also the incident angle.These observations are intriguing and warrant further investigation. 展开更多
关键词 液固界面 反射纵波 位移模型 声学模拟 声波信号 数值计算 转换时间 横向位移
Design and Implementation of Weibo Sentiment Analysis Based on LDA and Dependency Parsing 预览
18
作者 Yonggan Li Xueguang Zhou +1 位作者 Yan Sun Huanguo Zhang 《中国通信:英文版》 SCIE CSCD 2016年第11期91-105,共15页
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i... Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical. 展开更多
关键词 情感表达 句法分析 LDA 设计 网络空间安全 内容安全 合并算法 吉布斯抽样
在线阅读 下载PDF
Soliton formation with controllable frequency line spacing using dual pumps in a microresonator
19
作者 熊梓桐 阮健 +2 位作者 李荣玉 张智明 何广强 《中国光学快报:英文版》 SCIE EI CAS CSCD 2016年第12期108-112,共5页
时间的洞 solitons (CS ) 有能在时间的侧面并且与一条宽带支撑他们的形状的优秀性质,光滑频率的光谱。我们在使用二的 microresonator 为可控制的频率行距 soliton 形成建议一个方法连续波浪(CW ) 与 multi-free-spectral-range (FSR... 时间的洞 solitons (CS ) 有能在时间的侧面并且与一条宽带支撑他们的形状的优秀性质,光滑频率的光谱。我们在使用二的 microresonator 为可控制的频率行距 soliton 形成建议一个方法连续波浪(CW ) 与 multi-free-spectral-range (FSR ) 抽间距。我们建议的方法在与调节的泵方法相比在洞旅行的 solitons 的数量和地点上有更好的控制。我们也由从第一泵与频率 N FSR 介绍第二泵发现那,有 N FSR 梳子间距的 solitons 能被产生。 展开更多
关键词 非线性的光学 参量的过程 脉搏繁殖和时间的 solitons 共鸣器
A Star-Style Trust Model with the Ability of Data Recovery for Trusted Computing Platform
20
作者 CHEN Lu ZHANG Huanguo +1 位作者 ZHOU Qing ZHANG Liqiang 《武汉大学学报:自然科学英文版》 CAS CSCD 2016年第2期115-120,共6页
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG. The distinct advantage is that the compatibility with the existing computing p... Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG. The distinct advantage is that the compatibility with the existing computing platform is preferable, while the shortcomings are obvious simultaneously. A new star-style trust model with the ability of data recovery is proposed in this paper. The model can enhance the hardware-based root of trust in platform measurement, reduce the loss of trust during transfer process, extend the border of trust flexibly, and have the ability of data backup and recovery. The security and reliability of system is much more improved. It is proved that the star-style trust model is much better than the liner-style trust model in trust transfer and boundary extending etc. using formal methods in this paper. We illuminate the design and implementation of a kind of trusted PDA acting on star-style trust model. 展开更多
关键词 information security trusted computing star-style trust model data recovery
上一页 1 2 7 下一页 到第
使用帮助 返回顶部 意见反馈