For preventing the leakage of confidential messages sent to a marcocell user in dense heterogeneous networks, a physical layer security scheme based on base station cooperation is proposed in the paper. To improve tra...
详细信息
Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity andreliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, ag...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity andreliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, against various attacks. However, existing virtualization solutions do not improve the cryptography facilities of in-cloudsystems. This paper presents SECrIN, a secure cryptography infrastructure for VMs in the cloud. SECrIN is composed of a) virtual cryptographic devices implemented in VM monitors (VMMs), and b) a device management tool integrated in the virtualization management system. A virtual device receives requests from VMs, computes with cryptographic keys within the VMM andreturns results. The keys appear only in the VMM's memory space, so that they are kept secret even if the VMs were compromised. With the management tool, the operator of virtualization management systems assigns virtual cryptographic devices to a VM as well as otherresources, while the tenant (or owner) of a VM still holds proper controls on the keys. The virtual devices work compatibly with live migration, and the cryptographic computations are not interrupted when the VMs are moving from a host to another. We develop the SECrIN prototype with KVM-QEMU and oVirt. Experimental results show that, it works compatibly with existing virtualization solutions, provides reliable cryptographic computing services for applications, and is secure against attacks happening in VMs.
Network function virtualization (NFV) is a newly proposed technique designed to construct and manage network fimctions dynamically and efficiently. Allocating physical resources to the virtual network function forwa...
详细信息
Network function virtualization (NFV) is a newly proposed technique designed to construct and manage network fimctions dynamically and efficiently. Allocating physical resources to the virtual network function forwarding graph is a critical issue in NFV. We formulate the forwarding graph embedding (FGE) problem as a binary integer programming problem, which aims to increase the revenue anddecrease the cost to a service provider (SP) while considering limited network resources and the requirements of virtual functions. We then design a novel regional resource clustering metric to quantify the embedding potential of each substrate node and propose a topology-aware FGE algorithm called 'regional resource clustering FGE' (rrC-FGE). After implementing our algorithms in C++, simulation results showed that the total revenue was increased by more than 50 units and the acceptance ratio by more than 15%, and the cost of the service provider was decreased by more than 60 units.
Considering that the traditional change detection algorithms only focus on extracting the change area but ignore the change content identification, a novel change detection framework for synthetic aperture radar (SAr)...
详细信息
ISBN:
(纸本)9781538649923
Considering that the traditional change detection algorithms only focus on extracting the change area but ignore the change content identification, a novel change detection framework for synthetic aperture radar (SAr) images is proposed. The framework integrates the merits of unsupervised and supervised learning to detect changes in semantic level. First, the residual convolutional auto-encoder (rCAE) is designed to convert SAr image slices to the histogram representation. Then, we calculate the difference vectors and extract the change area by their norms. Finally, we classify the difference vectors of change region and identify the content of change. Experimental results indicate that the proposed method achieves significantly performance improvement over existing algorithms.
In order to effectively identify and extract the red signal from the leakage signal in the computer's power line,a method based on particle swarm optimization(PSO) is proposed to optimize the multi classification ...
详细信息
ISBN:
(纸本)9781509051861;9781509051854
In order to effectively identify and extract the red signal from the leakage signal in the computer's power line,a method based on particle swarm optimization(PSO) is proposed to optimize the multi classification support vector machine(SVM).Firstly,the conductive leakage signal is *** the SVM penalty parameter and kernel parameter are optimized by PSO,the conduction leakage signal is trained and ***,the classification performance of the un-optimized SVM is compared with *** result shows that this method has higher classification rate than the grid search *** classification andrecognition rate reaches 87.23%.
Mimic defense techniques can solve unknown vulnerabilities as well as backdoors without prior knowledge based on dHr structure. Compared with traditional defense methods, dHr structure brings dynamic and heterogeneous...
详细信息
ISBN:
(纸本)9781538683408
Mimic defense techniques can solve unknown vulnerabilities as well as backdoors without prior knowledge based on dHr structure. Compared with traditional defense methods, dHr structure brings dynamic and heterogeneous factors into systems to enhance security. In this paper, we discuss the security-critical scheduling problem in dHr-based processing system and propose MHF algorithm according to the characters of heterogeneous processing nodes with different performance. While ensuring task schedulability, MHF algorithm improves the average heterogeneity of processing nodes as high as possible when allocating redundant versions of a task. Simulation results show that the average heterogeneity of MHF algorithm is 22.7% higher than that of rF algorithm when tasks' guarantee ratio approaches 100%.
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key m...
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key module. To lower the reasoning complexity and shorten the decision time, an intelligent evaluation model based on Stacked Auto-Encoder (SAE) is proposed, which simulates the reasoning mode of human decision-making, and learns commander's knowledge and experience through unsupervised and supervised training. Then, to improve the robustness and generalization ability of the deep learning model, a de-noising training method and sparsity constraints are introduced. Finally, simulation experiment is carried out to verify the scientificity and effectiveness of the proposed model.
To predict the radiation emission of the FPGA,the radiation emission model for the chip is proposed with ICEM and the simulation result is also presented in this *** linear near-field surface scan system(LNFS) followi...
详细信息
ISBN:
(纸本)9781509051861;9781509051854
To predict the radiation emission of the FPGA,the radiation emission model for the chip is proposed with ICEM and the simulation result is also presented in this *** linear near-field surface scan system(LNFS) following electromagnetic compatibility standard is applied to measure the *** is illustrated that the simulation results agree with the measurements,so the value of the model for practical application is verified.
The astronomical observation model, light curve model and solarradiation pressure force model are established to allow estimation of the positions and attitudes of space objects using a fusion of photometric and astr...
详细信息
The astronomical observation model, light curve model and solarradiation pressure force model are established to allow estimation of the positions and attitudes of space objects using a fusion of photometric and astronomical data. Existing algorithms for this purpose involve large errors. The proposed method firstly estimates the attitude of the object by using photometric and astronomical data fusion. Secondly, the position of the object is filtered by the estimated attitude. Theory and numerical simulations show the efficiency of the proposed method.
routing optimization has been discussed in network design for a long time. In recent years, new methods of routing strategy based on reinforcement Learning are being considered. In this paper, we propose a reinforceme...
详细信息
ISBN:
(纸本)9781538683408
routing optimization has been discussed in network design for a long time. In recent years, new methods of routing strategy based on reinforcement Learning are being considered. In this paper, we propose a reinforcement learning based smart agent that can optimize routing strategy without human experience. Our proposed scheme is based on the collection of the traffic intensity in switches and the usage of a recurrent Neural Network baseddeep reinforcement learning model to train the agent. Simulation result shows that the proposed scheme can adjust the routing strategy dynamically according to the network condition and outperforms the traditional shortest path routing after trained.
暂无评论