Abstract: In order to comprehensively study the security of the Attribute-Based Encryption (ABE) scheme based on Learning With Errors (LWE) and test its ability to resist existing attacks, an analysis method for concrete security of ABE based on LWE is propose...
Abstract: Heterogeneous signcryption can ensure the confidentiality and unforgeability of information data between different cryptosystems systems. Security for the traditional Public Key Infrastructure (PKI) and Identity-Based Cryptosystem (IBC) two-way and a...
Abstract: In a cloud database environment, data is usually encrypted and stored to ensure the security of cloud storage data. To overcome the shortcomings of encrypting the data that the query overhead is big, the cipher text sortings and query are not support...
Abstract: Mobile network authentication protocol attacks continue to emerge. For the new 5G network protocol EAP-AKA', an EAP-AKA' security analysis method based on Lowe’s taxonomy is proposed. Firstly, 5G network, EAP-AKA', communication channel and adversary...
Abstract: Considering that the existing attribute-based searchable encryption scheme lacks the authorization service to the cloud server, a multi-server searchable Ciphertext Polity Attribute Base Encryption (CP-ABE) scheme is proposed based on authorization. ...
Abstract: In order to solve the problem that users can not request to exit during the bitcoin confusion process, an anonymous revocation scheme for Bitcoin confusion is proposed. The commitment is used to bind the user with its destination address. When the us...
Abstract: The definition and security models of partial blind signcryption scheme in heterogeneous environment between CertificateLess Public Key Cryptography (CLPKC)and Traditional Public Key Infrastructure (TPKI) are proposed, and a construction by using the...
Abstract: Data compression and decompression are widely used in modern communication and data transmission. However, how to decompress the damaged lossless compressed files is still a challenge. For the lossless data compression algorithm widely used in the ge...
Abstract: Firstly, a network Dynamic Threat Attribute Attack Graph (DT-AAG) analysis model is constructed by using Attribute Attack Graph theory. On the basis of the comprehensive description of system vulnerability and network service-induced threat transfer ...
Abstract: In order to solve the problem of member information leakage in multi-party cooperative design of integrated circuits, a orthogonal obfuscation scheme of multi-hardware IPs core security protection is proposed. Firstly, the orthogonal obfuscation matr...
Abstract: Large integer multiplication is the most important part in public key encryption, which often consumes most of the computing time in RSA, ElGamal, Fully Homomorphic Encryption (FHE) and other cryptosystems. Based on Schönhage-Strassen Algorithm (SSA)...
Abstract: A Priority Scheduling scheme based on Adaptive Random Linear Network Coding (PSARLNC) is proposed, to avoid the high computation complexity of the scheduling scheme based on Random Linear Network Coding (RLNC) and the high feedback dependence of the ...
Abstract: In Software Defined Networks (SDN), latency and load are important factors for Controller Placement Problem (CPP). To reduce the transmission latency between controllers, the propagation latency and queuing latency of flow requests, and balance the c...
Abstract: Recently, the mobile charging and data collecting by using Mobile Equipment (ME) in Wireless Sensor Networks (WSNs) is a hot topic. Existing studies determine usually the traveling path of ME according to the charging requirements of sensor nodes fir...
Abstract: Considering lacking of centralized and synergistic scheduling for time-slots and wavelength resources of the inter-TWDM-PONs, a novel Resource Allocation based on Bandwidth Prediction (RABP) strategy with software-defined centralized schedule is prop...
Abstract: In order to deal with the limited capacity of Virtualized Network Function (VNF), hardware acceleration resources are adopted in Software-Defined Networking and Network Function Virtualization (SDN/NFV) architecture. The deployment of hardware accele...
Abstract: A two-user single cell network employing Non-Orthogonal Multiple Access (NOMA) technique is studied. Accounting for time-varying channel fading and dynamic traffic arrival, a stochastic optimization issue is formulated, which aims to balance the queu...
Abstract: A novel scheme termed Hybrid Power Allocation Strategy (H-PAS), which is integrated with Statistical Channel State Information (S-CSI) and Instantaneous Channel State Information (I-CSI), is proposed for Non-Orthogonal Multiple Access (NOMA) based on...
Abstract: In order to solve the problem of classification and recognition of unknown interference types under large samples, an adaptive recognition method for unknown interference based on signal feature space is proposed. Firstly, the interference signal is ...
Abstract: In order to improve the utilization of non-contiguous virtual array elements in the underdetermined DOA estimation of the coprime array, a DOA estimation method based on Toeplitz covariance matrix reconstruction is proposed. First, the virtual array ...
Abstract: High Frequency Surface Wave Radar (HFSWR) utilizes electromagnetic wave diffracting along the earth to detect targets over the horizon. However, the increase of target distance decreases the received echo energy, and this degrades the detection capab...
Abstract: With the development of light and small Unmanned Aerial Vehicles (UAV), the detection method of Mini SAR based on UAV platform brings a revolutionary impact on information acquisition mode. In this paper, a W-band Mini SAR system for UAV is proposed,...
Abstract: The radiometric calibration of Synthetic Aperture Radar (SAR) can establish a mapping relationship between SAR image and Radar Cross Section (RCS) of ground objects, which benefits the inversion of target physical properties, and further meets the ne...
Abstract: Generally speaking, Three Dimension (3D) imaging of spinning space target is obtained by performing matrix factorization method on the scattering trajectories obtained from sequential radar images. Because of the errors of scattering center extractio...
Abstract: Because of restricted earth-based tracking network, Tracking, Telemetry and Command (TT&C) for lunar orbit micro-satellite is depended on Unified S/X Band (USB) antennas in China Chang’E-4 lunar exploration. Based on analysis of the geometry betw...
Abstract: Based on the analysis on the difference between vector tracking loop and scalar tracking loop on fault detection, it is pointed out that in vector receiver of Global Navigation Satellite System (GNSS), the detection statistic of Receiver Autonomous I...
Abstract: In order to improve the secure transmission performance of dual-polarized satellite communication, a secure transmission method based on Double Layer Multi-Parameter Weighted-type FRactional Fourier Transform (DL-MPWFRFT) is proposed. Two orthogonall...
Abstract: Correlation Filters (CF) are efficient in visual tracking, but their performance is badly affected by boundary effects. Focusing on this problem, the adaptive regularized correlation filters for visual tracking based on sample quality estimation are ...
Abstract: In order to improve the recognition rate of banknotes, the improved banknote recognition algorithm based on Deep Convolutional Neural Network(DCNN) is proposed. Firstly, the algorithm constructs a deep convolution layer by integrating transfer learni...
Abstract: The structure of Tree-Augmented Naïve Bayes (TAN) forces each attribute node to have a class node and a attribute node as parent, which results in poor classification accuracy without considering correlation between each attribute node and the class ...
Abstract: To solve the problems of Apriori algorithm and FP-Growth algorithm in the process of mining the maximal frequent itemsets, which refer to inefficient operation, high memory consumption, difficulty in adapting to the process of dense datasets, and aff...
Abstract: The multi-threshold image segmentation of the classical 2D maximal between-cluster variance method has deficiencies such as large computation, long calculation time, low segmentation precision and so on. A multi-threshold segmentation of 2D Otsu base...
Abstract: In order to reconstruct natural image from Compressed Sensing(CS) measurements accurately and effectively, a CS image reconstruction algorithm based on Non-local Low Rank(NLR) and Weighted Total Variation(WTV) is proposed. The proposed algorithm cons...