Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.展开更多
The rapid advancement of communication and satellite technology drives broadband satellite networks to carry different traffic loads.However,traffic class routing of satellite cannot be provided by the existing 2-laye...The rapid advancement of communication and satellite technology drives broadband satellite networks to carry different traffic loads.However,traffic class routing of satellite cannot be provided by the existing 2-layerd satellite networks.In this paper,a 2-layered satellite network composed of low-Earth orbit and medium-Earth orbit satellite networks is presented,and a novel Self-adapting Routing Protocol(SRP)is developed.This scheme aims to adopt self-adapting routing algorithm to support different traffic classes.Meanwhile,the path discovery processing is invoked independently for each individual origin/destination pair.Simulation results are provided to evaluate the performance of the new scheme in terms of end-to-end delay,normalized data throughput,delay jitter and delivery ratio.展开更多
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat...This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).展开更多
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-...In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.展开更多
Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is ma...Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is mainly established under graphbased models,which are not only impractical but also incorrect due to the essentially fading characteristics of signals.In this paper,we study the shortest link scheduling problem under two more realistic models,namely the signal to interference plus noise ratio(SINR)model and the Rayleigh fading model.We propose a centralized square-based scheduling algorithm(CSSA)with oblivious power control under the SINR model and prove its correctness under both the SINR model and the Rayleigh fading model.Furthermore,we extend CSSA and propose a distributed square-based scheduling algorithm(DSSA).Note that DSSA adopts CSMA/CA so that a wireless node can compete for the wireless channel before starting its communication.We also show theoretical analysis and conduct extensive simulations to exhibit the correctness and efficiency of our algorithms.展开更多
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc...Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.展开更多
Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented reality.The narrow beam usag...Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented reality.The narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile links.In this research work,the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is investigated.The high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output(MIMO)which is utilized in a hyperdense environment called heterogeneous networks(HetNet).The optimization problem which arises while maximizing the Mean Opinion Score(MOS)is analyzed along with the QoE(Quality of Experience)metric by considering the Base Station(BS)powers in addition to the needed Quality of Service(QoS).Most of the approaches related to wireless network communication are not suitable for the millimeter-wave band because of its problems due to high complexity and its dynamic nature.Hence a deep reinforcement learning framework is developed for tackling the same opti-mization problem.In this work,a Fuzzy-based Deep Convolutional Neural Net-work(FDCNN)is proposed in addition to a Deep Reinforcing Learning Framework(DRLF)for extracting the features of highly correlated data.The investigational results prove that the proposed method yields the highest satisfac-tion to the user by increasing the number of antennas in addition with the small-scale antennas at the base stations.The proposed work outperforms in terms of MOS with multiple antennas.展开更多
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe navigation.However,vessel motion and challenging environmental conditions often affect measurement...Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe navigation.However,vessel motion and challenging environmental conditions often affect measurement precision.To address this issue,this study proposes an innovative framework for correcting and predicting shipborne wind speed.By integrating a main network with a momentum updating network,the proposed framework effectively extracts features from the time and frequency domains,thereby allowing for precise adjustments and predictions of shipborne wind speed data.Validation using real sensor data collected at the Qingdao Oceanographic Institute demonstrates that the proposed method outperforms existing approaches in single-and multi-step predictions compared to existing methods,achieving higher accuracy in wind speed forecasting.The proposed innovative approach offers a promising direction for future validation in more realistic maritime onboard scenarios.展开更多
In the era of rapidly expanding wireless technologies,the push for larger spectrum efficiency and better signal integrity has intensified the need for high-efficient and low noise amplifiers(LNAs).A two-stage LNA base...In the era of rapidly expanding wireless technologies,the push for larger spectrum efficiency and better signal integrity has intensified the need for high-efficient and low noise amplifiers(LNAs).A two-stage LNA based on the GaAs/InGaAs pseudomorphic high electron mobility transistor(pHEMT)with a relatively large gate length of 2μm is designed for high-performance 2.4-GHz wireless communication.The I-V characteristic and two-port high-frequency S-parameter of the transistor are measured by on-wafer probing techniques.The results indicate that a discrete transistor with a gate size of 2μm×50μm can provide a maximum transconductance of 16 mS,corresponding to a maximum current-gain cut-off frequency of 7 GHz and maximum oscillation frequency of 8 GHz at the 1-V drain-source voltage.With the impedance matching networks based transmission line technique,an extended integrated layout structure is designed and simulated by using the momentum simulation tool embedded in Advanced Design System,to alleviate the trade-off between noise figure(NF)and gain of the circuit.The findings show that the transistor based on the GaAs/InGaAs technology is capable of delivering high performance with power consumption low to 16 mW,where the maximum simulated gain of 21.5 dB and minimum NF of 2.4 dB are achieved.In terms of linearity,the proposed LNA provides terrific output 1-dB compression of-3 dBm and output third-order intercept point values of 10 dBm.The bandwidth of 0.12 GHz and figure-of-merit of 12 are obtained,which are comparable to that of existing LNAs based on pHEMT.Such a device may benefit to accelerate the development of more robust and power-efficient front-end modules in modern wireless systems,especially for advancing performance-driven applications.展开更多
Today,phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers,passwords,and usernames.We can find several anti-phishing solutions,such as heuristic detection,...Today,phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers,passwords,and usernames.We can find several anti-phishing solutions,such as heuristic detection,virtual similarity detection,black and white lists,and machine learning(ML).However,phishing attempts remain a problem,and establishing an effective anti-phishing strategy is a work in progress.Furthermore,while most antiphishing solutions achieve the highest levels of accuracy on a given dataset,their methods suffer from an increased number of false positives.These methods are ineffective against zero-hour attacks.Phishing sites with a high False Positive Rate(FPR)are considered genuine because they can cause people to lose a lot ofmoney by visiting them.Feature selection is critical when developing phishing detection strategies.Good feature selection helps improve accuracy;however,duplicate features can also increase noise in the dataset and reduce the accuracy of the algorithm.Therefore,a combination of filter-based feature selection methods is proposed to detect phishing attacks,including constant feature removal,duplicate feature removal,quasi-feature removal,correlated feature removal,mutual information extraction,and Analysis of Variance(ANOVA)testing.The technique has been tested with differentMachine Learning classifiers:Random Forest,Artificial Neural Network(ANN),Ada-Boost,Extreme Gradient Boosting(XGBoost),Logistic Regression,Decision Trees,Gradient Boosting Classifiers,Support Vector Machine(SVM),and two types of ensemble models,stacking and majority voting to gain A low false positive rate is achieved.Stacked ensemble classifiers(gradient boosting,randomforest,support vector machine)achieve 1.31%FPR and 98.17%accuracy on Dataset 1,2.81%FPR and Dataset 3 shows 2.81%FPR and 97.61%accuracy,while Dataset 2 shows 3.47%FPR and 96.47%accuracy.展开更多
As a frequently-observed phenomenon in the northern South China Sea(nSCS),subsurface chlorophyll maximum(SCM)evolution from summer to winter remains unclear,neither the associated hydrographic control.In this study,on...As a frequently-observed phenomenon in the northern South China Sea(nSCS),subsurface chlorophyll maximum(SCM)evolution from summer to winter remains unclear,neither the associated hydrographic control.In this study,on the basis of in-situ data of fall-season cruises in 2004–2006,we characterized the depth,thickness and intensity of the SCM in the nSCS using a general Gaussian-function fitting approach,and investigated a linkage to the corresponding ocean vertical buoyance properties.Our results show that the SCM becomes deeper,thicker and less intense offshore-wards in the nSCS during fall seasons.In parallel,a correlation between the SCM variation and mixed layer depth exists in the nSCS,and it becomes pronounced in the shelf region compared to the slope and basin areas in autumn.Physically,once warmer surface ocean and thus stronger thermo-determined stratification,the SCM layer goes deeper and becomes thicker and less intense in the nSCS,especially in the shelf area of the nSCS.Moreover,the impact of water temperatures at deeper layers on the vertical stratification exerts more consequent roles on the spatial variability of SCM,compared to surface temperatures in the nSCS.Specifically,the isotherm line of 22℃ acts as crucial indicator for variations of the SCM in the nSCS during autumns.展开更多
Frequent typhoons can significantly change the temperature,nutrient availability,and phytoplankton biomass in marginal seas.The oceanic response to typhoons is usually influenced by the features of the typhoon,among w...Frequent typhoons can significantly change the temperature,nutrient availability,and phytoplankton biomass in marginal seas.The oceanic response to typhoons is usually influenced by the features of the typhoon,among which the translational speed is critically important.By using a high resolution coupled physical-biological model,we investigated the response of the Yellow and East China seas(YECS)to two typhoons at different translational speeds,Muifa in August 2011 and Bolaven in August 2012.The model well reproduced the spatial and temporal variations of temperature,chlorophyll-a concentration over the YECS.Results show that typhoons with slower translational speeds uplift more deep water,leading to a more significant oceanic response.Divergence and convergence caused nutrient fluxes in opposite directions in the surface and bottom layers.Moreover,the nutrient flux in the bottom layer was greater than that in the surface layer.These phenomena are closely related to the spatial distribution of nutrients.Further studies show that the degree of ocean response to typhoons is highly correlated with the initial conditions of physical and biological elements of the upper ocean before the typhoon,as well as with ocean structure.Pretyphoon initial conditions of oceanic physical and ecological elements,mixed layer depth,and potential energy anomalies can all alter the degree of typhoon-induced oceanic response.This study emphasizes the important roles of the translational speed of typhoons and the initial oceanic conditions in the oceanic response to typhoons.展开更多
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ...Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.展开更多
Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we...Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we propose an efficient multi-recipient signcryption scheme based on the bilinear pairings, which broadcasts a message to multiple users in a secure and authenticated manner. We prove its semantic security and unforgeability under the Gap Diffie-Hellman problem assumption in the random oracle model. The proposed scheme is more efficient than re-signcrypting a message n times using a signcryption scheme in terms of computational costs and communication overheads.展开更多
Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, w...Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, we cut down the scanning time of those algorithms (i.e. DFA based) by rearranging the states table and shrinking the DFA alphabet size. Both the methods can decrease the probability of large-scale random memory accessing and increase the probability of continuously memory accessing. Then the hitting rate of the CACHE is increased and the searching time of on the DFA is reduced. Shrinking the alphabet size of the DFA also reduces the storage complication. The AC++algorithm, by optimizing the Aho-Corasick (i.e. AC) algorithm using such methods, proves the theoretical analysis. And the experimentation results show that the scanning time of AC++and the storage occupied is better than that of AC in most cases and the result is much attractive when the number of patterns is very large. Because DFA is a widely used base algorithm in may string matching algorithms, such as DAWG, SBOM etc., the optimizing method discussed is significant in practice.展开更多
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ...A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at FSE2008.We reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192.展开更多
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe...This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model.展开更多
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n...A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.展开更多
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.展开更多
基金National Natural Science Foundation of China (No.60633020 and No. 90204012)Natural Science Foundation of Hebei Province (No. F2006000177)
文摘Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
基金the Major Program of National Natural Science Foundation of China under Grant No. 60872041Natural Science Foundation of Guangdong Province under Grant No.10152104101000004the Fundamental Research Funds for the Central Universities under Grant No. JY10000970009
文摘The rapid advancement of communication and satellite technology drives broadband satellite networks to carry different traffic loads.However,traffic class routing of satellite cannot be provided by the existing 2-layerd satellite networks.In this paper,a 2-layered satellite network composed of low-Earth orbit and medium-Earth orbit satellite networks is presented,and a novel Self-adapting Routing Protocol(SRP)is developed.This scheme aims to adopt self-adapting routing algorithm to support different traffic classes.Meanwhile,the path discovery processing is invoked independently for each individual origin/destination pair.Simulation results are provided to evaluate the performance of the new scheme in terms of end-to-end delay,normalized data throughput,delay jitter and delivery ratio.
文摘This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).
基金the Major national S&T program under Grant No. 2011ZX03005-002National Natural Science Foundation of China under Grant No. 60872041,61072066the Fundamental Research Funds for the Central Universities under Grant No. JY10000903001,JY10000901034
文摘In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.
基金supported by NSF of China under grants 61672321,61771289,61832012 and 61373027MBRP of Shandong Provincial Natural Science Foundation under grant ZR2019ZD10+1 种基金STPU of Shandong Province under grant J15LN05supported by NSFC under grants 90718030,and 90818002。
文摘Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is mainly established under graphbased models,which are not only impractical but also incorrect due to the essentially fading characteristics of signals.In this paper,we study the shortest link scheduling problem under two more realistic models,namely the signal to interference plus noise ratio(SINR)model and the Rayleigh fading model.We propose a centralized square-based scheduling algorithm(CSSA)with oblivious power control under the SINR model and prove its correctness under both the SINR model and the Rayleigh fading model.Furthermore,we extend CSSA and propose a distributed square-based scheduling algorithm(DSSA).Note that DSSA adopts CSMA/CA so that a wireless node can compete for the wireless channel before starting its communication.We also show theoretical analysis and conduct extensive simulations to exhibit the correctness and efficiency of our algorithms.
基金supported by the National Natural Science Foundation of China(No.62201313)the Opening Foundation of Fujian Key Laboratory of Sensing and Computing for Smart Cities(Xiamen University)(No.SCSCKF202101)the Open Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University)(No.MJUKF-IPIC202206).
文摘Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.
文摘Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented reality.The narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile links.In this research work,the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is investigated.The high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output(MIMO)which is utilized in a hyperdense environment called heterogeneous networks(HetNet).The optimization problem which arises while maximizing the Mean Opinion Score(MOS)is analyzed along with the QoE(Quality of Experience)metric by considering the Base Station(BS)powers in addition to the needed Quality of Service(QoS).Most of the approaches related to wireless network communication are not suitable for the millimeter-wave band because of its problems due to high complexity and its dynamic nature.Hence a deep reinforcement learning framework is developed for tackling the same opti-mization problem.In this work,a Fuzzy-based Deep Convolutional Neural Net-work(FDCNN)is proposed in addition to a Deep Reinforcing Learning Framework(DRLF)for extracting the features of highly correlated data.The investigational results prove that the proposed method yields the highest satisfac-tion to the user by increasing the number of antennas in addition with the small-scale antennas at the base stations.The proposed work outperforms in terms of MOS with multiple antennas.
基金supported by the Major Innovation Project for the Integration of Science,Education,and Industry of Qilu University of Technology(Shandong Academy of Sciences)(Nos.2023HYZX01,2023JBZ02)the Open Project of Key Laboratory of Computing Power Network and Information Security,Ministry of Education,Qilu University of Technology(Shandong Academy of Sciences)(No.2023ZD007)+2 种基金the Talent Research Projects of Qilu University of Technology(Shandong Academy of Sciences)(No.2023RCKY136)the Technology and Innovation Major Project of the Ministry of Science and Technology of China(No.2022ZD0118600)the Jinan‘20 New Colleges and Universities’Funded Project(No.202333043)。
文摘Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe navigation.However,vessel motion and challenging environmental conditions often affect measurement precision.To address this issue,this study proposes an innovative framework for correcting and predicting shipborne wind speed.By integrating a main network with a momentum updating network,the proposed framework effectively extracts features from the time and frequency domains,thereby allowing for precise adjustments and predictions of shipborne wind speed data.Validation using real sensor data collected at the Qingdao Oceanographic Institute demonstrates that the proposed method outperforms existing approaches in single-and multi-step predictions compared to existing methods,achieving higher accuracy in wind speed forecasting.The proposed innovative approach offers a promising direction for future validation in more realistic maritime onboard scenarios.
基金supported by Engineering and Physical Sciences Research Council(EPSRC)under Grant No.EP/P006973/1.
文摘In the era of rapidly expanding wireless technologies,the push for larger spectrum efficiency and better signal integrity has intensified the need for high-efficient and low noise amplifiers(LNAs).A two-stage LNA based on the GaAs/InGaAs pseudomorphic high electron mobility transistor(pHEMT)with a relatively large gate length of 2μm is designed for high-performance 2.4-GHz wireless communication.The I-V characteristic and two-port high-frequency S-parameter of the transistor are measured by on-wafer probing techniques.The results indicate that a discrete transistor with a gate size of 2μm×50μm can provide a maximum transconductance of 16 mS,corresponding to a maximum current-gain cut-off frequency of 7 GHz and maximum oscillation frequency of 8 GHz at the 1-V drain-source voltage.With the impedance matching networks based transmission line technique,an extended integrated layout structure is designed and simulated by using the momentum simulation tool embedded in Advanced Design System,to alleviate the trade-off between noise figure(NF)and gain of the circuit.The findings show that the transistor based on the GaAs/InGaAs technology is capable of delivering high performance with power consumption low to 16 mW,where the maximum simulated gain of 21.5 dB and minimum NF of 2.4 dB are achieved.In terms of linearity,the proposed LNA provides terrific output 1-dB compression of-3 dBm and output third-order intercept point values of 10 dBm.The bandwidth of 0.12 GHz and figure-of-merit of 12 are obtained,which are comparable to that of existing LNAs based on pHEMT.Such a device may benefit to accelerate the development of more robust and power-efficient front-end modules in modern wireless systems,especially for advancing performance-driven applications.
基金financially supported by the Deanship of Scientific Research and Graduate Studies at King Khalid University under research grant number(R.G.P.2/21/46)in part by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia,under Grant KFU253116.
文摘Today,phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers,passwords,and usernames.We can find several anti-phishing solutions,such as heuristic detection,virtual similarity detection,black and white lists,and machine learning(ML).However,phishing attempts remain a problem,and establishing an effective anti-phishing strategy is a work in progress.Furthermore,while most antiphishing solutions achieve the highest levels of accuracy on a given dataset,their methods suffer from an increased number of false positives.These methods are ineffective against zero-hour attacks.Phishing sites with a high False Positive Rate(FPR)are considered genuine because they can cause people to lose a lot ofmoney by visiting them.Feature selection is critical when developing phishing detection strategies.Good feature selection helps improve accuracy;however,duplicate features can also increase noise in the dataset and reduce the accuracy of the algorithm.Therefore,a combination of filter-based feature selection methods is proposed to detect phishing attacks,including constant feature removal,duplicate feature removal,quasi-feature removal,correlated feature removal,mutual information extraction,and Analysis of Variance(ANOVA)testing.The technique has been tested with differentMachine Learning classifiers:Random Forest,Artificial Neural Network(ANN),Ada-Boost,Extreme Gradient Boosting(XGBoost),Logistic Regression,Decision Trees,Gradient Boosting Classifiers,Support Vector Machine(SVM),and two types of ensemble models,stacking and majority voting to gain A low false positive rate is achieved.Stacked ensemble classifiers(gradient boosting,randomforest,support vector machine)achieve 1.31%FPR and 98.17%accuracy on Dataset 1,2.81%FPR and Dataset 3 shows 2.81%FPR and 97.61%accuracy,while Dataset 2 shows 3.47%FPR and 96.47%accuracy.
基金Supported by the Ministry of Science and Technology of the People’s Republic of China(No.2019 YFE 0125000)the National Natural Science Foundation of China-Shandong Joint Fund(No.U 1906215)+1 种基金the National Natural Science Foundation of China(No.41406010)partially by the Key Laboratory of Coastal Environmental Processes and Ecological Remediation,Chinese Academy of Sciences Opening Fund(No.2020 KFJJ 04)。
文摘As a frequently-observed phenomenon in the northern South China Sea(nSCS),subsurface chlorophyll maximum(SCM)evolution from summer to winter remains unclear,neither the associated hydrographic control.In this study,on the basis of in-situ data of fall-season cruises in 2004–2006,we characterized the depth,thickness and intensity of the SCM in the nSCS using a general Gaussian-function fitting approach,and investigated a linkage to the corresponding ocean vertical buoyance properties.Our results show that the SCM becomes deeper,thicker and less intense offshore-wards in the nSCS during fall seasons.In parallel,a correlation between the SCM variation and mixed layer depth exists in the nSCS,and it becomes pronounced in the shelf region compared to the slope and basin areas in autumn.Physically,once warmer surface ocean and thus stronger thermo-determined stratification,the SCM layer goes deeper and becomes thicker and less intense in the nSCS,especially in the shelf area of the nSCS.Moreover,the impact of water temperatures at deeper layers on the vertical stratification exerts more consequent roles on the spatial variability of SCM,compared to surface temperatures in the nSCS.Specifically,the isotherm line of 22℃ acts as crucial indicator for variations of the SCM in the nSCS during autumns.
基金Supported by the National Natural Science Foundation of China(Nos.42006018,42276009,42376199)the Open Fund Project of the Key Laboratory of Ocean Observation and Information of Hainan Province(No.HKLOOI-OF-2023-03)the Tianjin Natural Science Foundation(Nos.21JCYBJC00500,21JCQNJC00590)。
文摘Frequent typhoons can significantly change the temperature,nutrient availability,and phytoplankton biomass in marginal seas.The oceanic response to typhoons is usually influenced by the features of the typhoon,among which the translational speed is critically important.By using a high resolution coupled physical-biological model,we investigated the response of the Yellow and East China seas(YECS)to two typhoons at different translational speeds,Muifa in August 2011 and Bolaven in August 2012.The model well reproduced the spatial and temporal variations of temperature,chlorophyll-a concentration over the YECS.Results show that typhoons with slower translational speeds uplift more deep water,leading to a more significant oceanic response.Divergence and convergence caused nutrient fluxes in opposite directions in the surface and bottom layers.Moreover,the nutrient flux in the bottom layer was greater than that in the surface layer.These phenomena are closely related to the spatial distribution of nutrients.Further studies show that the degree of ocean response to typhoons is highly correlated with the initial conditions of physical and biological elements of the upper ocean before the typhoon,as well as with ocean structure.Pretyphoon initial conditions of oceanic physical and ecological elements,mixed layer depth,and potential energy anomalies can all alter the degree of typhoon-induced oceanic response.This study emphasizes the important roles of the translational speed of typhoons and the initial oceanic conditions in the oceanic response to typhoons.
基金Supported by the National Natural Science Foundation of China (90204012, 60573035, 60573036) and the University IT Research Center Project of Korea
文摘Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.
基金Supported by the National Natural Science Foundation of China (60473029)
文摘Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we propose an efficient multi-recipient signcryption scheme based on the bilinear pairings, which broadcasts a message to multiple users in a secure and authenticated manner. We prove its semantic security and unforgeability under the Gap Diffie-Hellman problem assumption in the random oracle model. The proposed scheme is more efficient than re-signcrypting a message n times using a signcryption scheme in terms of computational costs and communication overheads.
文摘Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, we cut down the scanning time of those algorithms (i.e. DFA based) by rearranging the states table and shrinking the DFA alphabet size. Both the methods can decrease the probability of large-scale random memory accessing and increase the probability of continuously memory accessing. Then the hitting rate of the CACHE is increased and the searching time of on the DFA is reduced. Shrinking the alphabet size of the DFA also reduces the storage complication. The AC++algorithm, by optimizing the Aho-Corasick (i.e. AC) algorithm using such methods, proves the theoretical analysis. And the experimentation results show that the scanning time of AC++and the storage occupied is better than that of AC in most cases and the result is much attractive when the number of patterns is very large. Because DFA is a widely used base algorithm in may string matching algorithms, such as DAWG, SBOM etc., the optimizing method discussed is significant in practice.
基金supported by the Nature Science Foundation of China under grant 60970119, 60833008the National Basic Research Program of China(973) under grant 2007CB311201the Fundamental Research Funds for the Central Universities under grant K50510010018
文摘A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at FSE2008.We reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192.
基金the National Natural Science Foundation of China (Nos. 60673072, 60803149)the National Basic Research Program (973) of China(No. 2007CB311201)
文摘This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model.
基金Supported bythe National Basic Research Programof China(973 Program G1999035805)
文摘A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001)the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003)+4 种基金the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007)the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681)the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation,China(Grant No.131067)the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
文摘Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.