Physical unclonable functions (PUFs) provide a promising solution for enhancing security and device authentication. Strong PUFs can generate quantities of challenge-response pairs(CRPs) but are vulnerable to machine l...
详细信息
ISBN:
(纸本)9798331540340;9798331540333
Physical unclonable functions (PUFs) provide a promising solution for enhancing security and device authentication. Strong PUFs can generate quantities of challenge-response pairs(CRPs) but are vulnerable to machine learning (ML) attacks. Weak PUFs must restrict direct access to the original response because they have limited CRPs. In this article, we present a shuffled Chaotic-dual-PUF structure(SCD-PUF) to defeat against ML attacks. Its working procedure is divided into two main stages: In the first phase, the weak PUF is used to generate secret bits as parameters for the chaotic configuration and along with the secret bits generated by the chaotic process, serve as the obfuscation configuration for the second phase. The second stage involves the Knuth-Durstenfeld shuffle algorithm, concatenation and XOR operations to obfuscate the challenges and responses at the same time. To prove the effectiveness of our proposal, we implement an example of SCD-PUF using Static Random-Access Memory(SRAM) PUF and Arbiter PUF(APUF) on Xilinx ZedBoard FPGAs. Using Logistic Regression (LR), Support Vector Machine (SVM), and Artificial Neural Networks (ANN) as attacking methods, the learning accuracy is maintained at around 51% even when the training data increase to one million, which proves our proposal has enough resistance to ML attacks. Also, the area overhead of our proposal is appropriate and acceptable.
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue pr...
详细信息
ISBN:
(纸本)9781450366298
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems associated with data security. Information is secure if it fulfills the three conditions namely Confidentiality, Integrity and Availability. In cloud computing confidentiality is obtained by cryptography. Symmetric algorithms notably Blowfish algorithm displayed undeniable success in cryptography. In this paper, a Modified Approach of Blowfish algorithm using shuffle algorithm was applied and test the encryption, decryption speed, and throughput. The result shows that the higher the performance, the higher the efficiency of encrypting files.
Hadoop MapReduce is the most popular open-source parallel programming model extensively used in Big Data analytics. Although fault tolerance and platform independence make Hadoop MapReduce the most popular choice for ...
详细信息
ISBN:
(纸本)9781450326421
Hadoop MapReduce is the most popular open-source parallel programming model extensively used in Big Data analytics. Although fault tolerance and platform independence make Hadoop MapReduce the most popular choice for many users, it still has huge performance improvement potentials. Recently, RDMA-based design of Hadoop MapReduce has alleviated major performance bottlenecks with the implementation of many novel design features such as in-memory merge, prefetching and caching of map outputs, and overlapping of merge and reduce phases. Although these features reduce the overall execution time for MapReduce jobs compared to the default framework, further improvement is possible if shuffle and merge phases can also be overlapped with the map phase during job execution. In this paper, we propose HOMR (a Hybrid approach to exploit maximum Overlapping in MapReduce), that incorporates not only the features implemented in RDMA-based design, but also exploits maximum possible overlapping among all different phases compared to current best approaches. Our solution introduces two key concepts: Greedy shuffle algorithm and On demand shuffle Adjustment, both of which are essential to achieve significant performance benefits over the default MapReduce framework. Architecture of HOMR is generalized enough to provide performance efficiency both over different Sockets interface as well as previous RDMA-based designs over InfiniBand. Performance evaluations show that HOMR with RDMA over InfiniBand can achieve performance benefits of 54% and 56% compared to default Hadoop over IPoIB (IP over InfiniBand) and 10 GigE, respectively. Compared to the previous best RDMA-based designs, this benefit is 29%. HOMR over Sockets also achieves a maximum of 38-40% benefit compared to default Hadoop over Sockets interface. We also evaluate our design with real-world workloads like SWIM and PUMA, and observe benefits of up to 16% and 18%, respectively, over the previous best-case RDMA-based design. To
In this paper, numerical methods for the solution of linear singular differential systems are analyzed. A numerical solution technique which solves consistent initial value problems is introduced by using theory of th...
详细信息
ISBN:
(纸本)9781905088416
In this paper, numerical methods for the solution of linear singular differential systems are analyzed. A numerical solution technique which solves consistent initial value problems is introduced by using theory of the Drazin inverses. The performance of the resulting numerical methods is tested with a singular system associated with a circuit involving an ideal transformer.
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor s...
详细信息
ISBN:
(纸本)0769519261
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor structure inherently involves a product state space but, inside this product state space, the actual reachable state space can be much smaller. For such cases, we propose an improvement of the standard numerical algorithm, the so-called "shuffle algorithm", which necessitates only vectors of the size of the actual state space. With this contribution, numerical algorithms based on tensor products can now handle larger models. (C) 2006 Elsevier B.V. All rights reserved.
The positivity of discrete-time and continuous-time nonlinear systems is addressed. Necessary and sufficient conditions for the positivity of the descriptor nonlinear systems are established. A procedure for checking ...
详细信息
ISBN:
(纸本)9781628413694
The positivity of discrete-time and continuous-time nonlinear systems is addressed. Necessary and sufficient conditions for the positivity of the descriptor nonlinear systems are established. A procedure for checking the positivity is proposed and demonstrated on numerical examples.
Computer game [1] is a research field, an important research direction in the field of artificial intelligence, and an important scientific research foundation in the field of machine intelligence, wargame deduction, ...
详细信息
ISBN:
(纸本)9781665440899
Computer game [1] is a research field, an important research direction in the field of artificial intelligence, and an important scientific research foundation in the field of machine intelligence, wargame deduction, intelligent decision system and other artificial intelligence. Machine game is considered to be one of the most challenging research directions in the field of artificial intelligence. As a member of computer game, military game is a game with incomplete and asymmetric information. One of the important links is that both sides need to play according to their own wishes in advance. It can be said that in the computer Military game, the layout affects the outcome of the whole game to a certain extent. In order to solve the problem of layout choice in practice, this paper proposes a random layout algorithm based on Fisher Yates shuffle algorithm, which can be used to generate absolutely random military chess layout, test the existing layout and program strength, and find the most suitable layout for the determined combat strategy and style. Compared with the previous method of generating a large amount of test data randomly, it can solve the problem. The new algorithm optimizes the original 25! times to 50 times, and optimizes the algorithm from O (n(2)) of Fisher algorithm to O(n), so researchers can have more energy to find the best way for different strategies, which objectively strengthens the combat capability of the program. And it weakens the influence of human factors in the test and reduces the dependence on human intelligence in computer game.
Universal lossless algorithms of data compression are always efficient to text and inefficient to JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG, and then us...
详细信息
ISBN:
(纸本)9780769536149
Universal lossless algorithms of data compression are always efficient to text and inefficient to JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG, and then use the universal lossless algorithms to compress the resize JPEG. In the end, using the typical example as experiment has been carried out and obtained a preferable compression ratio with little time cost.
Computer game is a research field,an important research direction in the field of artificial intelligence,and an important scientific research foundation in the field of machine intelligence,wargame deduction,intellig...
详细信息
Computer game is a research field,an important research direction in the field of artificial intelligence,and an important scientific research foundation in the field of machine intelligence,wargame deduction,intelligent decision system and other artificial *** game is considered to be one of the most challenging research directions in the field of artificial *** a member of computer game,military game is a game with incomplete and asymmetric *** of the important links is that both sides need to play according to their own wishes in *** can be said that in the computer Military game,the layout affects the outcome of the whole game to a certain *** order to solve the problem of layout choice in practice,this paper proposes a random layout algorithm based on Fisher Yates shuffle algorithm,which can be used to generate absolutely random military chess layout,test the existing layout and program strength,and find the most suitable layout for the determined combat strategy and *** with the previous method of generating a large amount of test data randomly,it can solve the *** new algorithm optimizes the original 25!times to 50 times,and optimizes the algorithm from O(n) of Fisher algorithm to O(n),so researchers can have more energy to find the best way for different strategies,which objectively strengthens the combat capability of the *** it weakens the influence of human factors in the test and reduces the dependence on human intelligence in computer game.
暂无评论