With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into pract...
详细信息
ISBN:
(纸本)9781479979820
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into practice. However, because of the mobility of nodes, links in opportunistic networks is intermittent and dynamic, which results in the problems of long delay time and low success rate of delivery. And these problems limit the further development of opportunistic networks. To solve these problems, this paper proposes a solution framework based on prediction, explores potential methods that are applicable to opportunistic networks and compares their performance and suitable application model.
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche...
详细信息
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa...
详细信息
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden *** the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary *** secret message hiding/unhiding process is linked with the QSDC process only by unitary *** accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this *** performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good ***,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service *** improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e...
详细信息
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorith...
详细信息
ISBN:
(纸本)9781479970063
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorithms are dealing with uncompressed images, while numerous images are distributed and stored in JPEG format over Internet. Thus, this paper proposes a novel image saliency detection method dealing with JPEG images, which directly extracts 3 image low-level features (intensity, texture and color) from JPEG DCT blocks and then evaluates image saliency by calculating the shortest path from each internal point to the background. We compare our method with some state-of-the-art methods on the publicly available dataset MSRA-1000. Experimental results show that our method exhibits better performance in terms of all four evaluations than some state-of-the-art methods in our experiments. The final saliency maps indicate that our method can also produce satisfied saliency maps directly in compressed domain.
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the ...
详细信息
ISBN:
(纸本)9781479975761
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the distributed way to obtain high performance. To address the above problem, we study a VM-assisted ALM tree optimization solution (called ALMTO). The proposed solution uses cloud virtual machines (VMs) to collect the structure information on the ALM tree, and uses a centralized way to effectively reduce average latency of the ALM tree built by the distribute way.
The law of equipments or products life is the calculation fundament of reliability indexes in power plant. Aim to how to determine the most fitted life distribution type, the linear regression and correlation coeffici...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. With this mode, a deterministic key derivation algorithm is designed, which makes every user and perceptual node possesses a single key material to get some keys, and obtains the resources at the presented class and all descendant classes in the hierarchy. Furthermore, a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link. Compared with previous proposals, the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
Location-aware devices and cloud computing services have triggered the widespread development of location-based applications. However, such applications require users to disclose their actual locations, which raises s...
详细信息
Location-aware devices and cloud computing services have triggered the widespread development of location-based applications. However, such applications require users to disclose their actual locations, which raises serious privacy concerns. As a kind of spatial transformation method, the standard Hilbert curve (SHC) is widely used in privacy preserving for spatial data. But there are still many limitations for SHC, such as high CPU cost, using the unified partition granularity and inability to support partial region authorization, etc. In this paper, we present a density-based space filling curve (DSC) for spatial data transformation, which partition the space based on the density of points of interest (POI) and supports partial authorization of the space, and need relatively low CPU cost. Our experiments show that the security risk of DSC is lower than that of SHC, and DSC provides better index building and range query processing performance than SHC.
暂无评论