Data-intensive applications, such as data mining and data visualization, need to deal with huge amount of data. Service-oriented architecture, on the other hand, offers a scalable and flexible framework to implement l...
详细信息
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e...
详细信息
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa...
详细信息
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden *** the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary *** secret message hiding/unhiding process is linked with the QSDC process only by unitary *** accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this *** performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good ***,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service *** improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research *** works have demonstrated that required permissions of Android applications are valuable fo...
详细信息
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research *** works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open *** this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware *** to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially *** contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final *** on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.
With the rapid expansion of the Internet,networksecurity has become more and more ***(Intrusion Detection System)is an important technology coping network attacks and is of two main types:network based(NIDS)and host ...
详细信息
With the rapid expansion of the Internet,networksecurity has become more and more ***(Intrusion Detection System)is an important technology coping network attacks and is of two main types:network based(NIDS)and host based(HIDS).In this paper,we propose the conception of NFPPB(network Flow Patterns of Penetrating Behavior)to network vulnerable ports and design a NIDS algorithm to detect infiltration behaviors of ***,NFPPB is a set of metrics calculated by network activities exploiting the vulnerabilities of *** paper investigates choosing,generation and comparison of NFPPB *** show that the method is effective and with high *** last,the paper addresses the future direction and the points that need to be improved.
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a...
详细信息
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.
With the worldwide strengthening of anti-terrorism and other identity verification, the products based on face recognition are used in real life more and more. The recognition as an important ways has become the focus...
详细信息
With the worldwide strengthening of anti-terrorism and other identity verification, the products based on face recognition are used in real life more and more. The recognition as an important ways has become the focus of academic research in the world. Face recognition accuracy can be improved by increasing the number of training samples, but increasing number will result in a large computing complexity. In recent years, the sparse representation becomes hot in face recognition. In this paper, we propose an energy constraint orthogonal matching pursuit (ECOMP) algorithm for sparse representation in face recognition. It selects a few training samples and hierarchical structure for face recognition. In this method, we re-select training samples by ECOMP, calculate the weight of all the selected training samples and find the sparse training samples which can recover the test sample. While the AR and the ORL database experimental results show that this method has better performance than other identification methods.
Due to the development of web services, many social network sites, as well as online shopping sites have been booming in the past decade, where it is a common phenomenon that people are likely to use multiple services...
详细信息
ISBN:
(纸本)9781479979035
Due to the development of web services, many social network sites, as well as online shopping sites have been booming in the past decade, where it is a common phenomenon that people are likely to use multiple services at the same time. Discovering the correspondence between accounts of a same individual is a crucial prerequisite for many interesting cross network applications, such as improving the recommendation performance of the online shopping sites by using extra information from social network services. In this paper, we propose a gametheoretic method to identify correlation accounts of individuals between social network sites and online shopping sites with stable matching model, incorporating accounts profiles as well as historical behaviors. The results show that our method identifies up to 70% of correlation accounts between Facebook and eBay, one of the most popular social network sites and online shopping sites in the world, respectively.
暂无评论