Advanced Search

2020 Vol. 42, No. 9

contents
2020, 42(9): 1-4.
Abstract:
Special Topic on System and Software Security
Overview of Cyber Security Threats and Defense Technologies for Energy Critical Infrastructure
Jianhua LI
2020, 42(9): 2065-2081. doi: 10.11999/JEIT191055
Abstract:
Energy critical infrastructure has undergone transformative rapid development in the context of the rapid development of information technology, and has been deeply integrated with new technologies such as Artificial Intelligence (AI), big data, and ...
Android Malware Detection Based on Deep Learning: Achievements and Challenges
Yi CHEN, Di TANG, Wei ZOU
2020, 42(9): 2082-2094. doi: 10.11999/JEIT200009
Abstract:
With the prosperous of Android applications, Android malware has been scattered everywhere, which raises the serious security risk to users. On the other hand, the rapid developing of deep learning fires the combat between the two sides of malware de...
Domain-Independent Intelligent Planning Technology and Its Application to Automated Penetration Testing Oriented Attack Path Discovery
Yichao ZHANG, Tianyang ZHOU, Junhu ZHU, Qingxian WANG
2020, 42(9): 2095-2107. doi: 10.11999/JEIT191056
Abstract:
Attack path discovery is an important research direction in automated penetration testing area. This paper introduces the research progress of domain independent intelligent planning technology and its application to the field of automated penetratio...
Protecting Android Native Code Based on Instruction Virtualization
Xiaohan ZHANG, Yuan ZHANG, Xinjian CHI, Min YANG
2020, 42(9): 2108-2116. doi: 10.11999/JEIT191036
Abstract:
Android system is now increasingly used in different kinds of smart devices, such as smart phones, smart watches, smart TVs and smart cars. Unfortunately, reverse attacks against Android applications are also emerging, which not only violates the int...
An Anti-cheat Method of Game Based on Windows Kernel Events
Jianming FU, Zheng YANG, Chenke LUO, Jianwei HUANG
2020, 42(9): 2117-2125. doi: 10.11999/JEIT190695
Abstract:
In view of many limitations of current client anti plug-in methods, an anti-cheat method based on kernel events is proposed, and the network game anti-cheat system called CheatBlocker is implemented. This method uses the kernel event monitoring provi...
Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
Jia YAN, Chujiang NIE, Purui SU
2020, 42(9): 2126-2133. doi: 10.11999/JEIT191059
Abstract:
Machine learning is widely used in malicious code detection and plays an important role in malicious code detection products. Constructing adversarial samples for malicious code detection machine learning models is the key to discovering defects in m...
Research on Target Failure Link Location Method in Inter-domain Routing System Cascading Failure
Ziyi ZENG, Han QIU, Junhu ZHU, Qingxian WANG, Di CHEN
2020, 42(9): 2134-2141. doi: 10.11999/JEIT200008
Abstract:
Coordinated Cross Plane Session Termination (CXPST) repeatedly implements Low rate Denial of Service (LDoS) attacks on multiple target critical links, causing the cascading failure of the inter-domain routing system and the collapse of the internet. ...
Zero-knowledge Location Proof Based on Blockchain
Rongwei YU, Boxiao ZHOU, Lina WANG, Xinyan ZHU, Huihua XIE, Hongjun XIE
2020, 42(9): 2142-2149. doi: 10.11999/JEIT191054
Abstract:
Due to the proliferation of geographic location virtual software and the easy simulation or tampering of civil satellite positioning signals, it is difficult to realize the trusted authentication of geographic location. In view of the security risk o...
Blind Recognition of RS Codes Based on Soft Decision
Zhaojun WU, Limin ZHANG, Zhaogen ZHONG, Chuanhui LIU
2020, 42(9): 2150-2157. doi: 10.11999/JEIT190690
Abstract:
To solve the problem that the existing algorithms for recognition of RS codes need to transform the code characters among different domains and poor performance, a new algorithm based on soft decision is proposed. Firstly, starting from the definitio...
Network and Information Security
A Steganography Algorithm in Encrypted Stereoscopic Video Based on Entropy Coding
Wei GAO, Gangyi JIANG, Mei YU, Ting LUO
2020, 42(9): 2158-2165. doi: 10.11999/JEIT190345
Abstract:
For security of stereoscopic video, a video encryption and information hiding algorithm based on entropy coding is proposed. Firstly, with the analysis of Multi-view Video Coding (MVC), the physical mechanism of error drift is investigated. By applyi...
Survivability Coordinated Mapping Based on Node Centrality and Spectrum Dispersion Awareness for Virtual Optical Networks
Huanlin LIU, Huixia HU, Yong CHEN, Meng WEN, Zhanpeng WANG
2020, 42(9): 2166-2172. doi: 10.11999/JEIT190543
Abstract:
The mapping strategy of virtual network has important effect on the resource availability and survivability of the Elastic Optical Network (EON). A survivable virtual optical network Coordinated Mapping based on the Distance and Spectrum Dispersion A...
Deep Reinforcement Learning Based Migration Mechanism for Service Function Chain in Operator Networks
Zhuo CHEN, Gang FENG, Ying HE, Yang ZHOU
2020, 42(9): 2173-2179. doi: 10.11999/JEIT190545
Abstract:
To improve the service experience provided by the operator network, this paper studies the online migration of Service Function Chain(SFC). Based on the Markov Decision Process(MDP), modeling analysis is performed on the migration of multiple Virtual...
Optimal Task Offloading Scheme Based on Network Delay and Resource Management in Joint Blockchain and Fog Computing System
Tong LIU, Lun TANG, Xiaoqiang HE, Qianbin CHEN
2020, 42(9): 2180-2185. doi: 10.11999/JEIT190654
Abstract:
To solve the problem of increasing the digital currency of mobile terminals based on limited residual resources of the system, a task offloading scheme is proposed based on node residual resources and network delay in the joint blockchain and fog com...
A Robust Secure Transmission Scheme Based onArtificial Noise for Resisting Active Eavesdropper in MIMO Heterogeneous Networks
Bo ZHANG, Kaizhi HUANG, Shengbin LIN, Ming YI, Yajun CHEN
2020, 42(9): 2186-2193. doi: 10.11999/5EIT190649
Abstract:
To ensure the security of MIMO heterogeneous networks while facing the active multi-antenna eavesdropping, a robust secure transmission scheme based on artificial noise is proposed. Firstly, considering that the eavesdropper sends uplink pilot interf...
An Improved Virtual Force Relocation Coverage Enhancement Algorithm
Fei ZHOU, Haotian GUO, Yi YANG
2020, 42(9): 2194-2200. doi: 10.11999/JEIT190662
Abstract:
The most critical issue in the deployment of Mobile Wireless Sensor Networks (MWSN) is how to provide maximum regional coverage.To solve the problem that the existing coverage control algorithm has unsatisfactory coverage, low deployment efficiency a...
Wireless Communication and Internet of Things
Feature-Aware D2D Content Caching Strategy
Jing YANG, Jinke LI
2020, 42(9): 2201-2207. doi: 10.11999/JEIT190691
Abstract:
Device to Device (D2D) communications can effectively offload base station traffic. In D2D networks, the popular content is not only needs to be shared, but also the individual content is needs to be cached. In this paper, the problem of cache conten...
MIMO Signal Modulation Recognition Algorithm Based on ICA and Feature Extraction
Tianqi ZHANG, Congcong FAN, Wanying GE, Tian ZHANG
2020, 42(9): 2208-2215. doi: 10.11999/JEIT190320
Abstract:
For blind modulation recognition of Multiple Input Multiple Output (MIMO) signals in non-cooperative communication, a modulation recognition method based on Independent Component Analysis (ICA) and feature extraction is proposed. According to the sig...
Multi-User Detection Based on Sparsity Adaptive Matching Pursuit Compressive Sensing for Uplink Grant-free Non-Orthogonal Multiple Access
Qianzhu WANG, Dong FANG, Guangfu WU
2020, 42(9): 2216-2222. doi: 10.11999/JEIT190505
Abstract:
Grant-free Non-Orthogonal Multiple Access (NOMA) combined with Multi-User Detection (MUD) technology can meet the requirements of large connection volume, low signaling overhead and low latency transmission in massive Machine Type Communications (mMT...
Radar Signal Processing
Adaptive Incremental Kalman Filter Based on Innovation
Xiaojun SUN, Han ZHOU, Guangming YAN
2020, 42(9): 2223-2230. doi: 10.11999/JEIT190493
Abstract:
Under certain environmental conditions, the unknown system errors often occur and yield to larger filtering errors when the unverified or uncalibrated measurement equation is used. Incremental equation can be introduced, which can effectively solve t...
Estimation of Volume Target Length in Alpha Distribution Noise
Bin WANG, Yuesheng HOU
2020, 42(9): 2231-2238. doi: 10.11999/JEIT190327
Abstract:
In order to estimate the length of moving ship targets in Alpha stable distribution noise, a moving target length estimation method based on Generalized Time-Frequency Analysis (G-TFA) and least squares estimation is proposed, which utilizes nonlinea...
Study of Gaussianization Processing Based on Symmetric Alpha-stable Distribution Modeling
Pingbo WANG, Zhen DAI, Hongkai WEI
2020, 42(9): 2239-2245. doi: 10.11999/JEIT190539
Abstract:
Considering the requirement for weak signal detection in non-Gaussian background interference, after conceptions and ideas summarizing for Gaussianization processing and extended matched filter, two Gaussianizaiton filters and corresponding detection...
A New Method of Anti-FM Slope Mismatch Jamming for Single Channel Synthetic Aperture Radar
Zhichao MENG, Jingyue LU, Shuaiqin ZHANG, Lei ZHANG, Hongxian WANG
2020, 42(9): 2246-2252. doi: 10.11999/JEIT190687
Abstract:
The problem that single-channel Synthetic Aperture Radar (SAR) can not effectively suppress FM slope mismatch jamming is studied in this paper. According to the difference between the jamming spectrum and the real echo spectrum, a method for suppress...
Study on 3D Imaging and Motion Compensation Algorithm for UWB-MIMO Through-wall Radar
Xin LIU, Kun YAN, Guangyao YANG, Shengbo YE, Qunying ZHANG, Guangyou FANG
2020, 42(9): 2253-2260. doi: 10.11999/JEIT190356
Abstract:
A motion compensation method based on Kirchhoff migration imaging algorithm for MIMO array is proposed. In the method, the traditional Kirchhoff intergral equation is introduced into the MIMO array and the forward Green function is replaced by the ba...
Sub-aperture Keystone Transform Based Echo Simulation Method for High-squint SAR with a Curve Trajectory
Gen LI, Yanheng MA, Jianqiang HOU, Gongguo XU
2020, 42(9): 2261-2268. doi: 10.11999/JEIT190674
Abstract:
The system transfer function of high-squint SAR system with curved trajectory has complex multi-dimensional spatial variability. The existing efficient frequency-domain echo simulation algorithms are difficult to achieve high-precision echo simulatio...
Image Processing and Pattern Recognition
Deep Convolutional Neural Network for Parking Space Occupancy Detection Based on Non-local Operation
Xuanjing SHEN, Zhe SHEN, Yongping HUANG, Yu WANG
2020, 42(9): 2269-2276. doi: 10.11999/JEIT190349
Abstract:
With the intelligent development of urban traffic, accurate and efficient access to available parking spaces is essential to solve the increasingly difficult problem of parking difficulties. Therefore, this paper proposes a deep convolutional neural ...
RGBD Image Co-saliency Object Detection Based on Sample Selection
Zhengyi LIU, Junlei LIU, Peng ZHAO
2020, 42(9): 2277-2284. doi: 10.11999/JEIT190393
Abstract:
Co-saliency object detection aims to discover common and salient objects in an image group which contains two or more relevant images. In this paper, a method of using machine learning is proposed to detect co-saliency objects. Firstly, some simple i...
Research on Rain Removal Method for Single Image Based on Multi-channel and Multi-scale CNN
Changyuan LIU, Qi WANG, Xiaojun BI
2020, 42(9): 2285-2292. doi: 10.11999/JEIT190755
Abstract:
Rainy days and other severe weather will seriously affect the image quality, thus affecting the performance of vision processing algorithms. In order to improve the imaging quality of rain images, a rain removal algorithm based on multi-channel multi...
Light Field All-in-focus Image Fusion Based on Edge Enhanced Guided Filtering
Yingchun WU, Yumei WANG, Anhong WANG, Xianling ZHAO
2020, 42(9): 2293-2301. doi: 10.11999/JEIT190723
Abstract:
Affected by the micro-lens geometric calibration accuracy of the light field camera, the decoding error of the 4D light field in the angular direction will cause the edge information loss of the integrated refocused image, which will reduce the accur...
Circuit and System Design
Method for Color-ring Resistor Detection and Localization in Printed Circuit Board Based on Convolutional Neural Network
Xiaoyan LIU, Zhaoming LI, Jiaxu DUAN, Tianyuan XIANG
2020, 42(9): 2302-2311. doi: 10.11999/JEIT190608
Abstract:
The color-ring resistor is one of the most commonly used electronic components in Printed Circuit Board (PCB). It is featured by sequential color rings, which often brings assembling errors, however. Manual detection of color-ring resistors has low e...
4.5 bit Sub-stage Circuit for 14 bit 210 MS/s Charge-domain ADC
Yan XUE, Zongguang YU, Zhenhai CHEN, Jinghe WEI, Hongwen QIAN
2020, 42(9): 2312-2318. doi: 10.11999/JEIT190592
Abstract:
A 4.5 bit sub-stage circuit for high speed high precision charge domain pipelined Analog-to-Digital Converter (ADC) is proposed. Instead of the high-performance opamps used in traditional switched-capacitor pipelined ADCs, charge transfer and residue...