Global navigation satellite system has been widely used,but it is vulnerable to *** military satellite communications,frequency hopping(FH)signal is usually used for anti-jamming *** the FH signal can be used in satel...
详细信息
Global navigation satellite system has been widely used,but it is vulnerable to *** military satellite communications,frequency hopping(FH)signal is usually used for anti-jamming *** the FH signal can be used in satellite navigation,the anti-jamming ability of satellite navigation can be *** a recently proposed timefrequency matrix ranging method(TFMR)can use FH signals to realize pseudorange measurement,it cannot transmit navigation messages using the ranging signal which is crucial for satellite *** this article,we propose dual-tone binary frequency shift keyingbased TFMR(DBFSK-TFMR).DBFSK-TFMR designs an extended time-frequency matrix(ETFM)and its generation algorithm,which can use the frequency differences in different dual-tone signals in ETFM to modulate data and eliminate the negative impact of data modulation on pseudorange *** ETFM,DBFSK-TFMR not only realizes the navigation message transmission but also ensures the precision and unambiguous measurement range of pseudorange ***-TFMR can be used as an integrated solution for anti-jamming communication and navigation based on FH *** results show that DBFSK-TFMR has almost the same ranging performance as TFMR.
Software Defect Prediction(SDP) technology is an effective tool for improving software system quality that has attracted much attention in recent ***,the prediction of cross-project data remains a challenge for the tr...
详细信息
Software Defect Prediction(SDP) technology is an effective tool for improving software system quality that has attracted much attention in recent ***,the prediction of cross-project data remains a challenge for the traditional SDP method due to the different distributions of the training and testing *** major difficulty is the class imbalance issue that must be addressed in Cross-Project Defect Prediction(CPDP).In this work,we propose a transfer-leaning algorithm(TSboostDF) that considers both knowledge transfer and class imbalance for *** experimental results demonstrate that the performance achieved by TSboostDF is better than those of existing CPDP methods.
Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic *** contracts cannot be changed once it is deployed on the blockchain and thus demand further *** testing is a...
详细信息
Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic *** contracts cannot be changed once it is deployed on the blockchain and thus demand further *** testing is a fault-based testing method that can effectively improve the sufficiency of a test for smart ***,existing methods cannot efficiently perform mutation testing specifically for integer overflow in ***,by analyzing integer overflow in ESCs,we propose five special mutation operators to address such vulnerability in terms of detecting sufficiency in ESC *** empirical study on 40 open-source ESCs is conducted to evaluate the effectiveness of the proposed mutation *** show that(1)our proposed mutation operators can reproduce all 179 integer overflow vulnerabilities in 40 smart contracts,and the generated mutants have high compilation pass rate and integer overflow vulnerability generation rate;moreover,(2)the generated mutants can find the shortcomings of existing testing methods for integer overflow vulnerability,thereby providing effective support to improve the sufficiency of the test.
In the era of big data,the conflict between data mining and data privacy protection is increasing day by *** information security focuses on protecting the security of attribute values without semantic *** data privac...
详细信息
In the era of big data,the conflict between data mining and data privacy protection is increasing day by *** information security focuses on protecting the security of attribute values without semantic *** data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive *** the semantic association,reasonable security access for privacy protect is ***-structured and self-descriptive XML(eXtensible Markup Language)has become a common form of data organization for database management in big data *** on the semantic integration nature of XML data,this paper proposes a data access control model for individual *** the semantic dependency between data and the integration process from bottom to top,the global visual range of inverted XML structure is *** results show that the model effectively protects the privacy and has high access efficiency.
Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud *** is widely used in di...
详细信息
Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud *** is widely used in distributed environment as a declaratively fine-grained,attribute-based access control policy language,but the policy integration of XACML lacks formal description and theory *** Access control Policy Integration Framework(MACPIF)is proposed in the paper,which consists of Attribute-based Policy Evaluation Model(ABPEM),Four-value Logic with Completeness(FLC)and Four-value Logic based Policy Integration Operators(FLPIOs).ABPEM evaluates access control policy and extends XACML decision to *** to policy decision set and policy integration characteristics,we construct FLC and define FLPIOs including Intersection,Union,Difference,Implication and *** prove that MACPIF can achieve policy monotonicity,functional completeness,canonical suitability and canonical *** results show that this framework can meet the requirements of policy integration in Multicloud.
暂无评论