With the rapid development of identity-based cryptography, several traceable (or linkable) identity-based ring signature (TIBRS) schemes have been proposed. Compared with ring signature based on public key cryptograph...
详细信息
Recently, cloud radio access network (C-RAN) with caching as a service (CaaS) was proposed to merge the functionalities of communication, computing, and caching (CCC) together. In this paper, we dissect the interactio...
详细信息
When facing massive statistical data, the k-means algorithm is very difficult to satisfy the need of dataprocessing as it lacks an effective parallel mechanism. This paper proposes an improved k-means algorithm (IMR-...
详细信息
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b...
详细信息
ISBN:
(纸本)9789881404732
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also be used to access secret information of crypto chips, and thus threaten dramatically the security of the cipher keys. In this paper, we propose a secure scan DFT architecture to thwart scan-based side-channel attacks. This architecture provides the scan chain reset mechanism, and thus can prevent these attacks based on mode switching. Meanwhile, the secret key is isolated from scan chains of an advanced encryption standard (AES) design in the test mode. Therefore, it can also halt the test-mode-only scan attacks. The proposed secure scan DFT technique ensures the security without compromising the testability of original chip. Most important of all, the secure scan test is implemented with extremely low hardware overhead.
Recently,many researchers have concentrated on using neu-ral networks to learn features for Distant Supervised Relation Extraction(DSRE).However,these approaches generally employ a softmax classi-fier with cross-entro...
详细信息
ISBN:
(纸本)9783319690049
Recently,many researchers have concentrated on using neu-ral networks to learn features for Distant Supervised Relation Extraction(DSRE).However,these approaches generally employ a softmax classi-fier with cross-entropy loss,and bring the noise of artificial class NA into classification ***,the class imbalance problem is serious in the automatically labeled data,and results in poor classification rates on minor classes in traditional *** this work,we exploit cost-sensitive ranking loss to improve *** first uses a Piecewise Convolutional Neural Network(PCNN)to embed the semantics of *** the features are fed into a classifier which takes into account both the ranking loss and ***-periments show that our method is effective and performs better than state-of-the-art methods.
The texture synthesis and design starts with an initial elements arrangement and expands it outward by using local and global growth, to obtain the new larger distribution of texture elements. There are two types of s...
详细信息
ISBN:
(纸本)9781631901362
The texture synthesis and design starts with an initial elements arrangement and expands it outward by using local and global growth, to obtain the new larger distribution of texture elements. There are two types of synthesized distributions, and their diversity consists in changing the layout of texture elements and decreasing or increasing the number of texture elements according to user's creation. Furthermore, we apply a set of deformation operations to locally change the shapes of texture elements when placing the extracted texture elements into the synthesized distribution, in order to guarantee structure consistency in final synthesized textures. Experimental results show that our method creates a large variety of textures from a given texture sample.
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory da...
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However...
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However, it is difficult to consider numerous factors. We present a new approach for analyzing the SET pulses propagation probabilities (SPPs). It considers all masking effects and uses SET pulses propagation probabilities matrices (SPPMs) to represent the SPPs in current cycle. Based on the matrix union operations, the SPPs in consecutive cycles can be calculated. Experimental results show that our approach is practicable and efficient.
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW...
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW-CMOS IC. Technical background of MMW wireless communications is described. Then the recent development of the critical technologies of the MMW-CMOS IC are introduced in detail and compared. A summarization is given, and the development prospects on MMW-CMOS IC are also discussed.
In the {CLAW, DIAMOND}-FREE EDGE DELETION problem (CDFED), we are given a graph G and an integer k > 0, and the question is whether there are at most k edges whose deletion results in a graph without claws and diam...
详细信息
暂无评论