期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Quantum Circuit Implementation and Resource Evaluation of Ballet‑p/k Under Grover’s Attack
1
作者 HONG Rui-Peng ZHANG Lei +3 位作者 PANG Chen-Xu LI Guo-Yuan DING Ding WANG Jian-Xin 《密码学报(中英文)》 北大核心 2025年第5期1178-1194,共17页
The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for thre... The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3. 展开更多
关键词 Grover’s algorithm quantum circuit Ballet family block ciphers quantum ripple-carry adder
在线阅读 下载PDF
Communication delay-aware cooperative adaptive cruise control with dynamic network topologies——A convergence of communication and control
2
作者 Jihong Liu Yiqing Zhou Ling Liu 《Digital Communications and Networks》 2025年第1期191-199,共9页
Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed ... Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency. 展开更多
关键词 Communication delay Cooperative adaptive Cruise control Network topology String stability
在线阅读 下载PDF
Design space exploration of neural network accelerator based on transfer learning
3
作者 吴豫章 ZHI Tian +1 位作者 SONG Xinkai LI Xi 《High Technology Letters》 EI CAS 2023年第4期416-426,共11页
With the increasing demand of computational power in artificial intelligence(AI)algorithms,dedicated accelerators have become a necessity.However,the complexity of hardware architectures,vast design search space,and c... With the increasing demand of computational power in artificial intelligence(AI)algorithms,dedicated accelerators have become a necessity.However,the complexity of hardware architectures,vast design search space,and complex tasks of accelerators have posed significant challenges.Tra-ditional search methods can become prohibitively slow if the search space continues to be expanded.A design space exploration(DSE)method is proposed based on transfer learning,which reduces the time for repeated training and uses multi-task models for different tasks on the same processor.The proposed method accurately predicts the latency and energy consumption associated with neural net-work accelerator design parameters,enabling faster identification of optimal outcomes compared with traditional methods.And compared with other DSE methods by using multilayer perceptron(MLP),the required training time is shorter.Comparative experiments with other methods demonstrate that the proposed method improves the efficiency of DSE without compromising the accuracy of the re-sults. 展开更多
关键词 design space exploration(DSE) transfer learning neural network accelerator multi-task learning
在线阅读 下载PDF
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
4
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital Communications and Networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden Jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
Computing over Space:Status,Challenges,and Opportunities
5
作者 Yaoqi Liu Yinhe Han +3 位作者 Hongxin Li Shuhao Gu Jibing Qiu Ting Li 《Engineering》 2025年第11期20-25,共6页
1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the es... 1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight. 展开更多
关键词 satellite constellations deployment computational resources data processing space computing radiation exposure SPACE high performance computing power consumption
在线阅读 下载PDF
Inertial Navigation System Based Synthetic Aperture Radar RFID Localization for AGV
6
作者 Wu Jie Zhou Yiqing +1 位作者 Liu Ling Shi Jinglin 《China Communications》 2025年第12期15-29,共15页
Synthetic aperture radar(SAR)radio frequency identification(RFID)localization is widely used for automated guided vehicles(AGVs)in the industrial internet of things(IIoT).However,the AGV’s speeds are limited by the p... Synthetic aperture radar(SAR)radio frequency identification(RFID)localization is widely used for automated guided vehicles(AGVs)in the industrial internet of things(IIoT).However,the AGV’s speeds are limited by the phase difference(PD)of two neighboring readers.In this paper,an inertial navigation system(INS)based SAR RFID localization method(ISRL)where AGV moves nonlinearly.To relax the speed limitation,a new phase-unwrapping method based on the similarity of PDs(PU-SPD)is proposed to deal with the PD ambiguity when the AGV speed exceeds 60km/h.In localization,the gauss-newton algorithm(GN)is employed and an initial value estimation scheme based on variable substitution(IVE-VS)is proposed to improve its positioning accuracy and the convergence rate.Thus,ISRL is a combination of IVE-VS and GN.Moreover,the Cramer-Rao lower bound(CRLB)and the speed limitation is derived.Simulation results show that the ISRL can converge after two iterations,and the positioning accuracy can achieve 7.50cm at a phase noise levelσ=0.18,which is 35%better than the Hyperbolic unbiased estimation localization(HyUnb). 展开更多
关键词 first-order Taylor expansion phase ambiguity phase unwrapping radio frequency identification synthetic aperture radar
在线阅读 下载PDF
Shadow tomography of quantum states with prediction
7
作者 Jiyu JIANG Zongqi WAN +2 位作者 Tongyang LI Meiyue SHAO Jialin ZHANG 《Frontiers of Computer Science》 2025年第7期131-142,共12页
The shadow tomography problem introduced by[1]is an important problem in quantum computing.Given an unknown-qubit quantum state,the goal is to estimate tr■,...,tr■using as least copies of■as possible,within an addi... The shadow tomography problem introduced by[1]is an important problem in quantum computing.Given an unknown-qubit quantum state,the goal is to estimate tr■,...,tr■using as least copies of■as possible,within an additive error of,whereF1,...,FM are known-outcome measurements.In this paper,we consider the shadow tomography problem with a potentially inaccurate prediction■of the true state■.This corresponds to practical cases where we possess prior knowledge of the unknown state.For example,in quantum verification or calibration,we may be aware of the quantum state that the quantum device is expected to generate.However,the actual state it generates may have deviations.We introduce an algorithm with sample complexity■(nmax{■ε}log2M/ε4.In the generic case,even if the prediction can be arbitrarily bad,our algorithm has the same complexity as the best algorithm without prediction[2].At the same time,as the prediction quality improves,the sample complexity can be reduced smoothly to■(nlog2M/ε3)when the trace distance between the prediction and the unknown state is■(ε).Furthermore,we conduct numerical experiments to validate our theoretical analysis.The experiments are constructed to simulate noisy quantum circuits that reflect possible real scenarios in quantum verification or calibration.Notably,our algorithm outperforms the previous work without prediction in most settings. 展开更多
关键词 shadow tomography online learning quantum state learning FTRL quantum machine learning
原文传递
A Parallel Discrete Event Simulation Engine for the Low-Earth-Orbit Satellite Constellation Networks
8
作者 Su Hailong Liu Yaoqi +3 位作者 Zhou Yiqing Shi Jinglin Li Hongguang Qian Manli 《China Communications》 SCIE CSCD 2024年第8期264-275,共12页
Low-Earth-Orbit satellite constellation networks(LEO-SCN)can provide low-cost,largescale,flexible coverage wireless communication services.High dynamics and large topological sizes characterize LEO-SCN.Protocol develo... Low-Earth-Orbit satellite constellation networks(LEO-SCN)can provide low-cost,largescale,flexible coverage wireless communication services.High dynamics and large topological sizes characterize LEO-SCN.Protocol development and application testing of LEO-SCN are challenging to carry out in a natural environment.Simulation platforms are a more effective means of technology demonstration.Currently available simulators have a single function and limited simulation scale.There needs to be a simulator for full-featured simulation.In this paper,we apply the parallel discrete-event simulation technique to the simulation of LEO-SCN to support large-scale complex system simulation at the packet level.To solve the problem that single-process programs cannot cope with complex simulations containing numerous entities,we propose a parallel mechanism and algorithms LP-NM and LP-YAWNS for synchronization.In the experiment,we use ns-3 to verify the acceleration ratio and efficiency of the above algorithms.The results show that our proposed mechanism can provide parallel simulation engine support for the LEO-SCN. 展开更多
关键词 CONSTELLATION low earth orbit satellite ns-3 null-message parallel discrete-event simulation
在线阅读 下载PDF
From organoids to organoids-on-a-chip:Current applications and challenges in biomedical research 被引量:1
9
作者 Kailun Liu Xiaowei Chen +3 位作者 Zhen Fan Fei Ren Jing Liu Baoyang Hu 《Chinese Medical Journal》 2025年第7期792-807,共16页
The high failure rates in clinical drug development based on animal models highlight the urgent need for more representative human models in biomedical research.In response to this demand,organoids and organ chips wer... The high failure rates in clinical drug development based on animal models highlight the urgent need for more representative human models in biomedical research.In response to this demand,organoids and organ chips were integrated for greater physiological relevance and dynamic,controlled experimental conditions.This innovative platform—the organoids-on-a-chip technology—shows great promise in disease modeling,drug discovery,and personalized medicine,attracting interest from researchers,clinicians,regulatory authorities,and industry stakeholders.This review traces the evolution from organoids to organoids-on-a-chip,driven by the necessity for advanced biological models.We summarize the applications of organoids-on-a-chip in simulating physiological and pathological phenotypes and therapeutic evaluation of this technology.This section highlights how integrating technologies from organ chips,such as microfluidic systems,mechanical stimulation,and sensor integration,optimizes organoid cell types,spatial structure,and physiological functions,thereby expanding their biomedical applications.We conclude by addressing the current challenges in the development of organoids-on-a-chip and offering insights into the prospects.The advancement of organoids-on-a-chip is poised to enhance fidelity,standardization,and scalability.Furthermore,the integration of cutting-edge technologies and interdisciplinary collaborations will be crucial for the progression of organoids-on-a-chip technology. 展开更多
关键词 Organoids-on-a-chip ORGANOIDS Organ-on-a-chip Drug testing Disease modeling
原文传递
Grover’s search finds new applications in continuous optimization and spectral analysis
10
作者 Xiaoming Sun 《Science China(Physics,Mechanics & Astronomy)》 2025年第6期212-213,共2页
A novel quantum search algorithm tailored for continuous optimization and spectral problems was proposed recently by a research team from the University of Electronic Science and Technology of China to broaden quantum... A novel quantum search algorithm tailored for continuous optimization and spectral problems was proposed recently by a research team from the University of Electronic Science and Technology of China to broaden quantum computation frontiers and enrich its application landscape.Quantum computing has traditionally excelled at tackling discrete search challenges,but many important applications from large-scale optimization to advanced physics simulations necessitate searching through continuous domains.These continuous search problems involve uncountably infinite solution spaces and bring about computational complexities far beyond those faced in conventional discrete settings.This draft,titled“Fixed-Point Quantum Continuous Search Algorithm with Optimal Query Complexity”,takes on the core challenge of performing search tasks in domains that may be uncountably infinite,offering theoretical and practical insights into achieving quantum speedups in such settings[1]. 展开更多
关键词 advanced physics simulations discrete search challengesbut quantum computation optimization spectral problems spectral analysis fixed point algorithm quantum search algorithm continuous optimization
原文传递
Assessing and Understanding Creativity in Large Language Models
11
作者 Yunpu Zhao Rui Zhang +1 位作者 Wenyi Li Ling Li 《Machine Intelligence Research》 2025年第3期417-436,共20页
In the field of natural language processing,the rapid development of large language model(LLM)has attracted increasing attention.LLMs have shown a high level of creativity in various tasks,but the methods for assessin... In the field of natural language processing,the rapid development of large language model(LLM)has attracted increasing attention.LLMs have shown a high level of creativity in various tasks,but the methods for assessing such creativity are inadequate.Assessment of LLM creativity needs to consider differences from humans,requiring multiple dimensional measurement while balancing accuracy and efficiency.This paper aims to establish an efficient framework for assessing the level of creativity in LLMs.By adapting the modified Torrance tests of creative thinking,the research evaluates the creative performance of various LLMs across 7 tasks,emphasizing 4 criteria including fluency,flexibility,originality,and elaboration.In this context,we develop a comprehensive dataset of 700 questions for testing and an LLM-based evaluation method.In addition,this study presents a novel analysis of LLMs'responses to diverse prompts and role-play situations.We found that the creativity of LLMs primarily falls short in originality,while excelling in elaboration.In addition,the use of prompts and role-play settings of the model significantly influence creativity.Additionally,the experimental results also indicate that collaboration among multiple LLMs can enhance originality.Notably,our findings reveal a consensus between human evaluations and LLMs regarding the personality traits that influence creativity.The findings underscore the significant impact of LLM design on creativity and bridge artificial intelligence and human creativity,offering insights into LLMs'creativity and potential applications. 展开更多
关键词 Large language models(LLMs) creativity assessment prompt engineering cognitive psychology divergent thinking
原文传递
Deterministic streaming algorithms for non-monotone submodular maximization
12
作者 Xiaoming SUN Jialin ZHANG Shuo ZHANG 《Frontiers of Computer Science》 2025年第6期103-114,共12页
Submodular maximization is a significant area of interest in combinatorial optimization.It has various real-world applications.In recent years,streaming algorithms for submodular maximization have gained attention,all... Submodular maximization is a significant area of interest in combinatorial optimization.It has various real-world applications.In recent years,streaming algorithms for submodular maximization have gained attention,allowing realtime processing of large data sets by examining each piece of data only once.However,most of the current state-of-the-art algorithms are only applicable to monotone submodular maximization.There are still significant gaps in the approximation ratios between monotone and non-monotone objective functions.In this paper,we propose a streaming algorithm framework for non-monotone submodular maximization and use this framework to design deterministic streaming algorithms for the d-knapsack constraint and the knapsack constraint.Our 1-pass streaming algorithm for the d-knapsack constraint has a 1/4(d+1)-∈approximation ratio,using O(BlogB/∈)memory,and O(logB/∈)query time per element,where B=MIN(n,b)is the maximum number of elements that the knapsack can store.As a special case of the d-knapsack constraint,we have the 1-pass streaming algorithm with a 1/8-∈approximation ratio to the knapsack constraint.To our knowledge,there is currently no streaming algorithm for this constraint when the objective function is non-monotone,even when d=1.In addition,we propose a multi-pass streaming algorithm with 1/6-∈approximation,which stores O(B)elements. 展开更多
关键词 submodular maximization streaming algorithms cardinality constraint knapsack constraint
原文传递
Computational pathology in precision oncology:Evolution from task-specific models to foundation models
13
作者 Yuhao Wang Yunjie Gu +8 位作者 Xueyuan Zhang Baizhi Wang Rundong Wang Xiaolong Li Yudong Liu Fengmei Qu Fei Ren Rui Yan S.Kevin Zhou 《Chinese Medical Journal》 2025年第22期2868-2878,共11页
With the rapid development of artificial intelligence,computational pathology has been seamlessly integrated into the entire clinical workflow,which encompasses diagnosis,treatment,prognosis,and biomarker discovery.Th... With the rapid development of artificial intelligence,computational pathology has been seamlessly integrated into the entire clinical workflow,which encompasses diagnosis,treatment,prognosis,and biomarker discovery.This integration has significantly enhanced clinical accuracy and efficiency while reducing the workload for clinicians.Traditionally,research in this field has depended on the collection and labeling of large datasets for specific tasks,followed by the development of task-specific computational pathology models.However,this approach is labor intensive and does not scale efficiently for open-set identification or rare diseases.Given the diversity of clinical tasks,training individual models from scratch to address the whole spectrum of clinical tasks in the pathology workflow is impractical,which highlights the urgent need to transition from task-specific models to foundation models(FMs).In recent years,pathological FMs have proliferated.These FMs can be classified into three categories,namely,pathology image FMs,pathology image-text FMs,and pathology image-gene FMs,each of which results in distinct functionalities and application scenarios.This review provides an overview of the latest research advancements in pathological FMs,with a particular emphasis on their applications in oncology.The key challenges and opportunities presented by pathological FMs in precision oncology are also explored. 展开更多
关键词 Computational pathology Artificial intelligence Deep learning Foundation models Precision oncology
原文传递
Near-term quantum computing techniques: Variational quantum algorithms, error mitigation, circuit compilation, benchmarking and classical simulation 被引量:4
14
作者 He-Liang Huang Xiao-Yue Xu +5 位作者 Chu Guo Guojing Tian Shi-Jie Wei Xiaoming Sun Wan-Su Bao Gui-Lu Long 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2023年第5期23-72,共50页
Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Altho... Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Although it has seen a major boost in the last decade,we are still a long way from reaching the maturity of a full-fledged quantum computer.That said,we will be in the noisy-intermediate scale quantum(NISQ)era for a long time,working on dozens or even thousands of qubits quantum computing systems.An outstanding challenge,then,is to come up with an application that can reliably carry out a nontrivial task of interest on the near-term quantum devices with non-negligible quantum noise.To address this challenge,several near-term quantum computing techniques,including variational quantum algorithms,error mitigation,quantum circuit compilation and benchmarking protocols,have been proposed to characterize and mitigate errors,and to implement algorithms with a certain resistance to noise,so as to enhance the capabilities of near-term quantum devices and explore the boundaries of their ability to realize useful applications.Besides,the development of near-term quantum devices is inseparable from the efficient classical sim-ulation,which plays a vital role in quantum algorithm design and verification,error-tolerant verification and other applications.This review will provide a thorough introduction of these near-term quantum computing techniques,report on their progress,and finally discuss the future prospect of these techniques,which we hope will motivate researchers to undertake additional studies in this field. 展开更多
关键词 quantum computing noisy-intermediate scale quantum variational quantum algorithms error mitigation circuit com-pilation benchmarking protocols classical simulation
原文传递
A hybrid-order local search algorithm for set k-cover problem in wireless sensor networks 被引量:1
15
作者 Boxiao LIU Mengting YUAN Haihang YOU 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期235-237,共3页
1 Introduction The lifetime of wireless sensor networks(WSNs)is restricted by the limited energy of battery-powered sensor devices,making the lifetime extension a critical problem in real applications[1].Several aspec... 1 Introduction The lifetime of wireless sensor networks(WSNs)is restricted by the limited energy of battery-powered sensor devices,making the lifetime extension a critical problem in real applications[1].Several aspects have been examined in previous works to extend the lifetime of WSNs,such as the deployment position,the network routing strategy and the sensing range adjustment.Given the fact that there are often many redundant sensors,a practical way to extend the lifetime of a WSN is to partition the sensors into subsets,each of which can cover all the targets[2].Then the sets are activated one by one,extending the lifetime of a WSN to times of the battery lifetime of a sensor.The problem of finding the maximal is abstracted as the set k-cover problem. 展开更多
关键词 NETWORKS LIFETIME BATTERY
原文传递
SparkLink:A short-range wireless communication protocol with ultra-low latency and ultra-high reliability 被引量:1
16
作者 Mingjin Gao Lei Wan +4 位作者 Rujing Shen Yongqiang Gao Jian Wang Yonghui Li Branka Vucetic 《The Innovation》 EI 2023年第2期25-27,共3页
Dear Editor,Short-range wireless communications have been widely used in our daily life,but the pursuit of a better communication experience never stops,leading to the more stringent requirements of emerging applicati... Dear Editor,Short-range wireless communications have been widely used in our daily life,but the pursuit of a better communication experience never stops,leading to the more stringent requirements of emerging applications.^(1)For example,remote control applications such as telesurgery require a delay of less than 1 ms.^(2)Indus-trial closed-loop control applications such as automatic assembly lines have a reliability requirement of at least 99.999%. 展开更多
关键词 COMMUNICATION WIRELESS SPARK
原文传递
PosFuzz:augmenting greybox fuzzing with effective position distribution 被引量:1
17
作者 Yanyan Zou Wei Zou +4 位作者 JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo 《Cybersecurity》 EI CSCD 2023年第4期123-143,共21页
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness.Mu... Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness.Mutation-based greybox fuzzing generates input cases by mutating the input seed,i.e.,applying a sequence of mutation operators to randomly selected mutation positions of the seed.However,existing fruitful research work focuses on scheduling mutation operators,leaving the schedule of mutation positions as an overlooked aspect of fuzzing efficiency.This paper proposes a novel greybox fuzzing method,PosFuzz,that statistically schedules mutation positions based on their historical performance.PosFuzz makes use of a concept of effective position distribution to represent the semantics of the input and to guide the mutations.PosFuzz first utilizes Good-Turing frequency estimation to calculate an effective position distribution for each mutation operator.It then leverages two sampling methods in different mutating stages to select the positions from the distribution.We have implemented PosFuzz on top of AFL,AFLFast and MOPT,called Pos-AFL,-AFLFast and-MOPT respectively,and evaluated them on the UNIFUZZ benchmark(20 widely used open source programs)and LAVA-M dataset.The result shows that,under the same testing time budget,the Pos-AFL,-AFLFast and-MOPT outperform their counterparts in code coverage and vulnerability discovery ability.Compared with AFL,AFLFast,and MOPT,PosFuzz gets 21%more edge coverage and finds 133%more paths on average.It also triggers 275%more unique bugs on average. 展开更多
关键词 Greybox fuzzing Mutation position Mutation operator Code coverage Vulnerability discovery
原文传递
DPA-2:a large atomic model as a multitask learner 被引量:3
18
作者 Duo Zhang Xinzijian Liu +40 位作者 Xiangyu Zhang Chengqian Zhang Chun Cai Hangrui Bi Yiming Du Xuejian Qin Anyang Peng Jiameng Huang Bowen Li Yifan Shan Jinzhe Zeng Yuzhi Zhang Siyuan Liu Yifan Li Junhan Chang Xinyan Wang Shuo Zhou Jianchuan Liu Xiaoshan Luo Zhenyu Wang Wanrun Jiang Jing Wu Yudi Yang Jiyuan Yang Manyi Yang Fu-Qiang Gong Linshuang Zhang Mengchao Shi Fu-Zhi Dai Darrin M.York Shi Liu Tong Zhu Zhicheng Zhong Jian Lv Jun Cheng Weile Jia Mohan Chen Guolin Ke Weinan E Linfeng Zhang Han Wang 《npj Computational Materials》 CSCD 2024年第1期185-199,共15页
The rapid advancements in artificial intelligence(AI)are catalyzing transformative changes in atomic modeling,simulation,and design.AI-driven potential energy models havedemonstrated the capability to conduct large-sc... The rapid advancements in artificial intelligence(AI)are catalyzing transformative changes in atomic modeling,simulation,and design.AI-driven potential energy models havedemonstrated the capability to conduct large-scale,long-duration simulations with the accuracy of ab initio electronic structure methods.However,the model generation process remains a bottleneck for large-scale applications.We propose a shift towards a model-centric ecosystem,wherein a large atomic model(LAM),pretrained across multiple disciplines,can be efficiently fine-tuned and distilled for various downstream tasks,thereby establishing a new framework for molecular modeling.In this study,we introduce the DPA-2 architecture as a prototype for LAMs.Pre-trained on a diverse array of chemical and materials systemsusing a multi-task approach,DPA-2demonstrates superior generalization capabilities across multiple downstream tasks compared to the traditional single-task pre-training and fine-tuning methodologies.Our approach sets the stage for the development and broad application of LAMs in molecular and materials simulation research. 展开更多
关键词 DPA establishing thereby
原文传递
Functional Verification for Agile Processor Development: A Case for Workflow Integration
19
作者 徐易难 余子濠 +10 位作者 王凯帆 王华强 蔺嘉炜 金越 张林隽 张紫飞 唐丹 王卅 石侃 孙凝晖 包云岗 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第4期737-753,共17页
Agile hardware development methodology has been widely adopted over the past decade.Despite the research progress,the industry still doubts its applicability,especially for the functional verification of complicated p... Agile hardware development methodology has been widely adopted over the past decade.Despite the research progress,the industry still doubts its applicability,especially for the functional verification of complicated processor chips.Functional verification commonly employs a simulation-based method of co-simulating the design under test with a reference model and checking the consistency of their outcomes given the same input stimuli.We observe limited collaboration and information exchange through the design and verification processes,dramatically leading to inefficiencies when applying the conventional functional verification workflow to agile development.In this paper,we propose workflow integration with collaborative task delegation and dynamic information exchange as the design principles to effectively address the challenges on functional verification under the agile development model.Based on workflow integration,we enhance the functional verification workflows with a series of novel methodologies and toolchains.The diff-rule based agile verification methodology(DRAV)reduces the overhead of building reference models with runtime execution information from designs under test.We present the RISC-V implementation for DRAV,DiffTest,which adopts information probes to extract internal design behaviors for co-simulation and debugging.It further integrates two plugins,namely XFUZZ for effective test generation guided by design coverage metrics and LightSSS for efficient fault analysis triggered by co-simulation mismatches.We present the integrated workflows for agile hardware development and demonstrate their effectiveness in designing and verifying RISC-V processors with 33 functional bugs found in NutShell.We also illustrate the efficiency of the proposed toolchains with a case study on a functional bug in the L2 cache of XiangShan. 展开更多
关键词 functional verification agile development open-source hardware workflow integration
原文传递
High performance rapid single-flux-quantum bit-slice arithmetic logic unit
20
作者 Jing Ren Pei-Yao Qu +4 位作者 Jia-Hong Yang Xiang-Yu Zheng Hui Zhang Jie Ren Guang-Ming Tang 《Superconductivity》 2024年第3期73-79,共7页
Two optimization technologies, namely, bypass and carry-control optimization, were demonstrated for enhancing the performance of a bit-slice Arithmetic Logic Unit (ALU) in 2n-bit Rapid Single-Flux-Quantum (RSFQ) micro... Two optimization technologies, namely, bypass and carry-control optimization, were demonstrated for enhancing the performance of a bit-slice Arithmetic Logic Unit (ALU) in 2n-bit Rapid Single-Flux-Quantum (RSFQ) microprocessors. These technologies can not only shorten the calculation time but also solve data hazards. Among them, the proposed bypass technology is applicable to any 2n-bit ALU, whether it is bit-serial, bit-slice or bit-parallel. The high performance bit-slice ALU was implemented using the 6 kA/cm^(2) Nb/AlOx/Nb junction fabrication process from Superconducting Electronics Facility of Shanghai Institute of Microsystem and Information Technology. It consists of 1693 Josephson junctions with an area of 2.46 0.81 mm^(2). All ALU operations of the MIPS32 instruction set are implemented, including two extended instructions, i.e., addition with carry (ADDC) and subtraction with borrow (SUBB). All the ALU operations were successfully obtained in SFQ testing based on OCTOPUX and the measured DC bias current margin can reach 86% - 104%. The ALU achieves a 100 utilization rate, regardless of carry/borrow read-after-write correlations between instructions. 展开更多
关键词 High performance Rapid Single-Flux-Quantum(RSFQ) Arithmetic Logic Unit(ALU) Optimization technologies Superconducting integrated circuits
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部