期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Local imperceptible adversarial attacks against human pose estimation networks
1
作者 Fuchang Liu Shen Zhang +2 位作者 Hao Wang Caiping Yan Yongwei Miao 《Visual Computing for Industry,Biomedicine,and Art》 EI 2023年第1期318-328,共11页
Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classif... Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classification-based attack methods to body joint regression tasks is not straightforward.Another issue is that the attack effectiveness and imperceptibility contradict each other.To solve these issues,we propose local imperceptible attacks on HPE networks.In particular,we reformulate imperceptible attacks on body joint regression into a constrained maximum allowable attack.Furthermore,we approximate the solution using iterative gradient-based strength refinement and greedy-based pixel selection.Our method crafts effective perceptual adversarial attacks that consider both human perception and attack effectiveness.We conducted a series of imperceptible attacks against state-of-the-art HPE methods,including HigherHRNet,DEKR,and ViTPose.The experimental results demonstrate that the proposed method achieves excellent imperceptibility while maintaining attack effectiveness by significantly reducing the number of perturbed pixels.Approximately 4%of the pixels can achieve sufficient attacks on HPE. 展开更多
关键词 Adversarial attack Human pose estimation white-box attack IMPERCEPTIBILITY Local perturbation
在线阅读 下载PDF
Ground-0 Axioms vs.First Principles and Second Law:From the Geometry of Light and Logic of Photon to Mind-Light-Matter Unity-AI&QI
2
作者 Wen-Ran Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第3期534-553,共20页
Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,qua... Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,quantum mechanics has been shrouded with mysteries preventing itself from reaching definable causality for a general purpose analytical quantum computing paradigm.Ground-0 Axioms are introduced as an equilibrium-based,dynamic,bipolar set-theoretic unification of the first principles of science and the second law of thermodynamics.Related literatures are critically reviewed to justify the self-evident nature of Ground-0 Axioms.A historical misinterpretation by the founding fathers of quantum mechanics is identified and corrected.That disproves spacetime geometries(including but not limited to Euclidean and Hilbert spaces)as the geometries of light and truth-based logics(including but not limited to bra-ket quantum logic)as the logics of photon.Backed with logically definable causality and Dirac 3-polarizer experiment,bipolar quantum geometry(BQG)and bipolar dynamic logic(BDL)are identified as the geometry of light and the logic of photon,respectively,and wave-particle complementarity is shown less fundamental than bipolar complementarity.As a result,Ground-0 Axioms lead to a geometrical and logical illumination of the quantum and classical worlds as well as the physical and mental worlds.With logical resolutions to the EPR and Schr?dinger’s cat paradoxes,an analytical quantum computing paradigm named quantum intelligence(QI)is introduced.It is shown that QI makes mind-light-matter unity and quantum-digital compatibility logically reachable for quantumneuro-fuzzy AI-machinery with groundbreaking applications.It is contended that Ground-0 Axioms open a new era of science and philosophy—the era of mind-light-matter unity in which humanlevel white-box AI&QI is logically prompted to join Einstein’s grand unification to foster major scientific advances. 展开更多
关键词 Analytical quantum computing bipolar fuzzy sets bipolar quantum agents business intelligence cognitive neuroscience dynamic equilibrium Einstein-Bohr debate information conservational computing/cryptography computational psychiatry international relations logically definable causality quantum intelligence quantum-neuro-fuzzy AI human level AI&QI quantum superposition/entanglement white-box brain model
在线阅读 下载PDF
The Current and Future of Software Securities and Vulnerabilities
3
作者 Cuixue Zhang Meijiao Zhou +1 位作者 Yalian Xie Xiangli Li 《Journal of Software Engineering and Applications》 2014年第1期1-5,共5页
As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform tra... As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment. 展开更多
关键词 e-Time SDLC SOFTWARE Security white-box TESTING and BLACK-BOX TESTING
暂未订购
WAS:improved white-box cryptographic algorithm over AS iteration
4
作者 Yatao Yang Yuying Zhai +1 位作者 Hui Dong Yanshuo Zhang 《Cybersecurity》 2025年第1期142-152,共11页
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ... The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is proposed.This scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of rounds.Attackers can be prevented from recovering the key under black-box model.The length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting security.WAS has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm. 展开更多
关键词 white-box cryptography Block cipher Substitution permutation network structure Anti-key extraction Anti-code lifting
原文传递
A New Feistel-Type White-Box Encryption Scheme 被引量:5
5
作者 Ting-Ting Lin Xue-Jia Lai +1 位作者 Wei-Jia Xue Yin Jia 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期386-395,共10页
The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almo... The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement. 展开更多
关键词 white-box equivalent key Feistel network CRYPTOGRAPHY ASASASA
原文传递
WBZUC:novel white-box ZUC-128 stream cipher 被引量:1
6
作者 Yang Yatao Zhang Ruoqing +2 位作者 Dong hui Ma Yingjie Zhang Xiaowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期96-106,共11页
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ... White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment. 展开更多
关键词 Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication
原文传递
General digital rights management solution based on white-box cryptography
7
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
An adaptive neuro-fuzzy inference system white-box model for real-time multiphase flowing bottom-hole pressure prediction in wellbores
8
作者 Chibuzo Cosmas Nwanwe Ugochukwu Ilozurike Duru 《Petroleum》 EI CSCD 2023年第4期629-646,共18页
The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirica... The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy. 展开更多
关键词 Machine learning models Empirical correlations Mechanistic models Multiphase flowing bottom-hole pressure Adaptive neuro-fuzzy inference system white-box model
原文传递
Calibrated models for effective clustering:Discriminating operation schedules in occupied buildings
9
作者 Karla Guerrero Ramírez Cristina Nuevo-Gallardo +2 位作者 Jesús Miguel Santamaría Ulecia Beatriz Montalbán Pozas Carlos Fernández Bandera 《Building Simulation》 2025年第1期161-181,共21页
European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible ... European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible to install.Therefore,the development of virtual tools that enable the study of energy consumption in existing buildings is necessary.Virtual sensors,particularly based on white-box models,offer the opportunity to recreate these behaviours.When calibrated with measured data,white-box models,which incorporate detailed building physics,become increasingly valuable for designing energy-efficient buildings.This research explores a novel approach to identifying building’s load period directly from energy data generated by these calibrated models.The volume of data generated by white-box models can be overwhelming for visual analysis,but the hypothesis here is that analysing this data through clustering techniques can reveal patterns related to occupant behaviour and operational schedules.By feeding indoor temperature data into the calibrated model and analysing the resulting energy outputs,the research proposes a method to identify the heating,ventilation and air conditioning(HVAC)system operation schedule,free oscillation periods and non-recurrent events.Validation is achieved by comparing the identified periods with actual measured data.This methodology enables the development of a virtual sensor for cost allocation,which minimises the need for physical sensor deployment while complying with European Union directives.The research not only demonstrates high accuracy but also the potential to outperform measured schedule.This suggests the ability of the method to identify missing sensor data or other factors affecting temperature curves,enabling fault detection and diagnostics(FDD).Consequently,this opens doors for setting optimised operation schedules that balance energy efficiency with occupant comfort. 展开更多
关键词 calibrated models white-box CLUSTER SCHEDULE free oscillation LOAD
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部