The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing exten...
详细信息
The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5 G security technology. This paper analyzes the security requirements of 5 G business applications, network architecture, the air interface, and user privacy. The development trends of5 G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5 G security development. Several incremental 5 G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5 G.
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Exis...
详细信息
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Existing solutions for those attacks are based on replication ordetection, which can deal with active attacks; but are helpless to passive attacks. In this paper, we adopt the theory of network coding to fragment the data in the Software-defined Networks and propose a network coding-basedresilient multipath routing scheme. First, we present a new metric named expected eavesdropping ratio to measure the resilience in the presence of passive attacks. Then, we formulate the network coding-basedresilient multipath routing problem as an integer-programming optimization problem by using expected eavesdropping ratio. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results demonstrate that the proposed algorithms improve the defense performance against passive attacks by about 20% when compared with baseline algorithms.
We fabricate an undoped Ge quantum well under a 30 nm relaxed Ge0.8Si0.2 shallow barrier. The bottom barrier contains Ge0.8Si0.2 (650 ℃) followed by Ge0.9Si0.1 (800 ℃) such that variation of Ge content forms a sharp...
详细信息
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-...
详细信息
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-E) is proposed. From the perspective of signal information integrity, this paper multi-extract the secondary features of instantaneous amplitude, frequency and phase, and obtain the box dimension, information dimension, information entropy, as well as the Hilbert envelope spectrum information entropy newly proposed in this paper. Finally, the features are fused into C-E features to identify the individual radiation source. Compared with single class features, the recognition rate of the joint features is greatly improved at little time cost. In simulation experiment, the accuracy increases by 15.2% and 19.7% than fractal dimension and entropy respectively. And features have good independence and noise resistance underdifferent environments.
In this paper, we investigate the effect of different hyperparameters as well as different combinations of hyperparameters settings on the performance of the Attention-Gated Convolutional Neural Networks (AGCNNs), e.g...
详细信息
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity ...
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a gooddynamic balance between dynamics, security, and quality of service.
A high gain low cross polarization Fabry-Perot cavity antenna (FPCA) designed by AMC ground is presented in this paper. In particular, a strip line AMC ground is used to replace the PEC ground in order to reduce the c...
详细信息
A high gain Fabry-Perot cavity antenna (FPCA) designed by modifiedray tracking model(MrTM) is presented in this paper. In particular, the conventional ray tracking is modified in order to calculate the electric field...
详细信息
Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm f...
详细信息
relation classification plays an important role in the field of natural language processing (NLP). Previous research on relation classification has verified the effectiveness of using convolutional neural network (CNN...
详细信息
暂无评论