Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classif...Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classification-based attack methods to body joint regression tasks is not straightforward.Another issue is that the attack effectiveness and imperceptibility contradict each other.To solve these issues,we propose local imperceptible attacks on HPE networks.In particular,we reformulate imperceptible attacks on body joint regression into a constrained maximum allowable attack.Furthermore,we approximate the solution using iterative gradient-based strength refinement and greedy-based pixel selection.Our method crafts effective perceptual adversarial attacks that consider both human perception and attack effectiveness.We conducted a series of imperceptible attacks against state-of-the-art HPE methods,including HigherHRNet,DEKR,and ViTPose.The experimental results demonstrate that the proposed method achieves excellent imperceptibility while maintaining attack effectiveness by significantly reducing the number of perturbed pixels.Approximately 4%of the pixels can achieve sufficient attacks on HPE.展开更多
Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,qua...Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,quantum mechanics has been shrouded with mysteries preventing itself from reaching definable causality for a general purpose analytical quantum computing paradigm.Ground-0 Axioms are introduced as an equilibrium-based,dynamic,bipolar set-theoretic unification of the first principles of science and the second law of thermodynamics.Related literatures are critically reviewed to justify the self-evident nature of Ground-0 Axioms.A historical misinterpretation by the founding fathers of quantum mechanics is identified and corrected.That disproves spacetime geometries(including but not limited to Euclidean and Hilbert spaces)as the geometries of light and truth-based logics(including but not limited to bra-ket quantum logic)as the logics of photon.Backed with logically definable causality and Dirac 3-polarizer experiment,bipolar quantum geometry(BQG)and bipolar dynamic logic(BDL)are identified as the geometry of light and the logic of photon,respectively,and wave-particle complementarity is shown less fundamental than bipolar complementarity.As a result,Ground-0 Axioms lead to a geometrical and logical illumination of the quantum and classical worlds as well as the physical and mental worlds.With logical resolutions to the EPR and Schr?dinger’s cat paradoxes,an analytical quantum computing paradigm named quantum intelligence(QI)is introduced.It is shown that QI makes mind-light-matter unity and quantum-digital compatibility logically reachable for quantumneuro-fuzzy AI-machinery with groundbreaking applications.It is contended that Ground-0 Axioms open a new era of science and philosophy—the era of mind-light-matter unity in which humanlevel white-box AI&QI is logically prompted to join Einstein’s grand unification to foster major scientific advances.展开更多
As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform tra...As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.展开更多
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is proposed.This scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of rounds.Attackers can be prevented from recovering the key under black-box model.The length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting security.WAS has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm.展开更多
The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almo...The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement.展开更多
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.展开更多
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto...Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.展开更多
The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirica...The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy.展开更多
European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible ...European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible to install.Therefore,the development of virtual tools that enable the study of energy consumption in existing buildings is necessary.Virtual sensors,particularly based on white-box models,offer the opportunity to recreate these behaviours.When calibrated with measured data,white-box models,which incorporate detailed building physics,become increasingly valuable for designing energy-efficient buildings.This research explores a novel approach to identifying building’s load period directly from energy data generated by these calibrated models.The volume of data generated by white-box models can be overwhelming for visual analysis,but the hypothesis here is that analysing this data through clustering techniques can reveal patterns related to occupant behaviour and operational schedules.By feeding indoor temperature data into the calibrated model and analysing the resulting energy outputs,the research proposes a method to identify the heating,ventilation and air conditioning(HVAC)system operation schedule,free oscillation periods and non-recurrent events.Validation is achieved by comparing the identified periods with actual measured data.This methodology enables the development of a virtual sensor for cost allocation,which minimises the need for physical sensor deployment while complying with European Union directives.The research not only demonstrates high accuracy but also the potential to outperform measured schedule.This suggests the ability of the method to identify missing sensor data or other factors affecting temperature curves,enabling fault detection and diagnostics(FDD).Consequently,this opens doors for setting optimised operation schedules that balance energy efficiency with occupant comfort.展开更多
基金National Natural Science Foundation of China,No.61972458Natural Science Foundation of Zhejiang Province,No.LZ23F020002.
文摘Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classification-based attack methods to body joint regression tasks is not straightforward.Another issue is that the attack effectiveness and imperceptibility contradict each other.To solve these issues,we propose local imperceptible attacks on HPE networks.In particular,we reformulate imperceptible attacks on body joint regression into a constrained maximum allowable attack.Furthermore,we approximate the solution using iterative gradient-based strength refinement and greedy-based pixel selection.Our method crafts effective perceptual adversarial attacks that consider both human perception and attack effectiveness.We conducted a series of imperceptible attacks against state-of-the-art HPE methods,including HigherHRNet,DEKR,and ViTPose.The experimental results demonstrate that the proposed method achieves excellent imperceptibility while maintaining attack effectiveness by significantly reducing the number of perturbed pixels.Approximately 4%of the pixels can achieve sufficient attacks on HPE.
文摘Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,quantum mechanics has been shrouded with mysteries preventing itself from reaching definable causality for a general purpose analytical quantum computing paradigm.Ground-0 Axioms are introduced as an equilibrium-based,dynamic,bipolar set-theoretic unification of the first principles of science and the second law of thermodynamics.Related literatures are critically reviewed to justify the self-evident nature of Ground-0 Axioms.A historical misinterpretation by the founding fathers of quantum mechanics is identified and corrected.That disproves spacetime geometries(including but not limited to Euclidean and Hilbert spaces)as the geometries of light and truth-based logics(including but not limited to bra-ket quantum logic)as the logics of photon.Backed with logically definable causality and Dirac 3-polarizer experiment,bipolar quantum geometry(BQG)and bipolar dynamic logic(BDL)are identified as the geometry of light and the logic of photon,respectively,and wave-particle complementarity is shown less fundamental than bipolar complementarity.As a result,Ground-0 Axioms lead to a geometrical and logical illumination of the quantum and classical worlds as well as the physical and mental worlds.With logical resolutions to the EPR and Schr?dinger’s cat paradoxes,an analytical quantum computing paradigm named quantum intelligence(QI)is introduced.It is shown that QI makes mind-light-matter unity and quantum-digital compatibility logically reachable for quantumneuro-fuzzy AI-machinery with groundbreaking applications.It is contended that Ground-0 Axioms open a new era of science and philosophy—the era of mind-light-matter unity in which humanlevel white-box AI&QI is logically prompted to join Einstein’s grand unification to foster major scientific advances.
文摘As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.
基金supported by Beijing Natural Science Foundation(No:4232034)the Fundamental Research Funds for the Central Universities(No:328202222).
文摘The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is proposed.This scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of rounds.Attackers can be prevented from recovering the key under black-box model.The length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting security.WAS has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm.
基金This work was supported by the National Natural Science Foundation of China under Grant Nos. 61272440, 61472251, and U1536101, and China Postdoctoral Science Foundation under Grant Nos. 2013M531174 and 2014T70417.
文摘The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement.
基金supported by the Beijing Natural Science Foundation(4232034)the Fundamental Research Funds for the Central Universities(328202222)the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
文摘White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.
基金supported by the National Key Research and Development Program of China (2017YFB0802000)the National Natural Science Foundations of China (61672412,61972457)the National Cryptography Development Fund of China (MMJJ20170104, MMJJ20180219)。
文摘Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.
文摘The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy.
基金funded by the Catedra Sanitas de Salud y Medio Ambiente of Universidad de Navarrafunded by the Agencia Estatal de Investigatión under the project“Gemelo Digital de Nueva Generatión de Edificios Inteligentes”(DigiTwin)(ref.CPP2021-008909).
文摘European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible to install.Therefore,the development of virtual tools that enable the study of energy consumption in existing buildings is necessary.Virtual sensors,particularly based on white-box models,offer the opportunity to recreate these behaviours.When calibrated with measured data,white-box models,which incorporate detailed building physics,become increasingly valuable for designing energy-efficient buildings.This research explores a novel approach to identifying building’s load period directly from energy data generated by these calibrated models.The volume of data generated by white-box models can be overwhelming for visual analysis,but the hypothesis here is that analysing this data through clustering techniques can reveal patterns related to occupant behaviour and operational schedules.By feeding indoor temperature data into the calibrated model and analysing the resulting energy outputs,the research proposes a method to identify the heating,ventilation and air conditioning(HVAC)system operation schedule,free oscillation periods and non-recurrent events.Validation is achieved by comparing the identified periods with actual measured data.This methodology enables the development of a virtual sensor for cost allocation,which minimises the need for physical sensor deployment while complying with European Union directives.The research not only demonstrates high accuracy but also the potential to outperform measured schedule.This suggests the ability of the method to identify missing sensor data or other factors affecting temperature curves,enabling fault detection and diagnostics(FDD).Consequently,this opens doors for setting optimised operation schedules that balance energy efficiency with occupant comfort.