For nonlinear feedback shift registers(NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If the g...
详细信息
For nonlinear feedback shift registers(NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If the greatest common subfamily is exactly the set of all sequences which can be generated by both of them, the authors can determine it by Grbner basis theory. Otherwise, the authors can determine it under some conditions and partly solve the problem.
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien...
详细信息
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficient conditions for two compressing sequences to be s-uniform with α provided that the compressing map is of the form φ(x;, x;,..., x;) = g(x;) + η(x;, x;,..., x;), where g(x;) is a permutation polynomial over Z/(p) and η is an(e-1)-variable polynomial over Z/(p).
Geolocating social media users aims to discover the real geographical locations of users from their publicly available data,which can support online location-based applications such as disaster alerts and local conten...
详细信息
Geolocating social media users aims to discover the real geographical locations of users from their publicly available data,which can support online location-based applications such as disaster alerts and local content *** relationship-based methods represent a classical approach for geolocating social ***,geographically proximate relationships are sparse and challenging to discern within social networks,thereby affecting the accuracy of user *** address this challenge,we propose user geolocation methods that integrate neighborhood geographical distribution and social structure influence(NGSI)to improve geolocation ***,we propose a method for evaluating the homophily of locations based on the k-order neighbor-hood geographic distribution(k-NGD)similarity among *** are notable differences in the distribution of k-NGD similarity between location-proximate and non-location-proximate *** this distinction,we filter out non-location-proximate social relationships to enhance location homophily in the social *** better utilize the location-proximate relationships in social networks,we propose a graph neural network algorithm based on the social structure *** algorithm enables us to perform a weighted aggregation of the information of users’multi-hop neighborhood,thereby mitigating the over-smoothing problem of user features and improving user geolocation *** results on real social media dataset demonstrate that the neighborhood geographical distribution similarity metric can effectively filter out non-location-proximate social ***,compared with 7 existing social relationship-based user positioning methods,our proposed method can achieve multi-granularity user geolocation and improve the accuracy by 4.84%to 13.28%.
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ...
详细信息
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and a quantum algorithm for searching the fixed weight *** with the current classical and quantum meet-in-the-middle attacks,our algorithm has lower time and space ***,this attack can also be applied against different versions of *** result can help to understand the security of NTRU better.
Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during ***,the main multiple images steganography algorithms mainly distribute the p...
详细信息
Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during ***,the main multiple images steganography algorithms mainly distribute the payloads as sparsely as possible inmultiple cover images to improve the detection error rate of stego *** order to enable the payloads to be accurately and efficiently distributed in each cover image,this paper proposes a multiple images steganography for JPEG images based on optimal payload ***,the algorithm uses the principle of dynamic programming to redistribute the payloads of the cover images to reduce the time required in the process of payloads ***,by reducing the difference between the features of the cover images and the stego images to increase the detection error rate of the stego ***,this paper uses a data decomposition mechanism based on Vandermonde *** if part of the data is lost during the transmission of the secret messages,as long as the data loss rate is less than the data redundancy rate,the original secret messages can be *** results show that the method proposed in this paper improves the efficiency of payloads distribution compared with existing multiple images *** the same time,the algorithm can achieve the optimal payload distribution of multiple images steganography to improve the anti-statistical detection performance of stego images.
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in O...
详细信息
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in OSNs, which provides wonderful opportunities to gain insight into how and why individual emotion is evolved in social network. In this paper, we focus on emotion dynamics in OSNs, and try to recognize the evolving process of collective emotions. As a basis of this research, we first construct a corpus and build an emotion classifier based on Bayes theory, and some effective strategies (entropy and salience) are introduced to improve the performance of our classifier, with which we can classify any Chinese tweet into a particular emotion with an accuracy as high as 82%. By analyzing the collective emotions in our sample networks in detail, we get some interesting findings, including a phenomenon of emotion synchronization between friends in OSNs, which offers good evidence for that human emotion can be spread from one person to another. Furthermore, we find that the number of friends has strong correlation with individual emotion. Based on those useful findings, we present a dynamic evolution model of collective emotions, in which both self-evolving process and mutual-evolving process are considered. To this end, extensive simulations on both real and artificial networks have been done to estimate the parameters of our emotion dynamic model, and we find that mutual-evolution plays a more important role than self-evolution in the distribution of collective emotions. As an application of our emotion dynamic model, we design an efficient strategy to control the collective emotions of the whole network by selecting seed users according to k-core rather than degree.
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, ...
详细信息
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, poor generality. In order to solve these problems, this paper presents an improved ROP auto-constructor QExtd. Firstly, we design a Turing-complete language QExtdL and provide the basis of gadgets analysis. Secondly, we represent the MI instruction and realize precise process of side-effect instructions for improving the efficiency of automatic construction. At last, we establish a three-layer language conversion mechanism, making it convenient for users to construct ROP. Theoretical and experimental data show that the QExtd automatic construction method is much better than the ROPgadget based on syntax. In addition, the proposed method succeeds in constructing gadgets of ROP with the probability of 84% for programs whose sizes are more than 20 KB and whose directory is "/usr/bin" in Ubuntu, which proves that the construction capability improves significantly.
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und...
详细信息
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach,but it also poses some *** address the efficiency problem in uncertainty planning,we propose the APU-D*Lite algorithm in this ***,the pentest framework is mapped to the planning problem with the Planning Domain Definition Language(PDDL).Next,we develop the pentest information graph to organize network information and assess relevant exploitation actions,which helps to simplify the problem ***,the APU-D*Lite algorithm is introduced based on the idea of incremental heuristic *** method plans for both hosts and actions,which meets the requirements of *** the pentest information graph as the input,the output is an alternating host and action *** experiments,we use the attack success rate to represent the uncertainty level of the *** result shows that APU-D*Lite displays better reliability and efficiency than classical planning algorithms at different attack success rates.
With the assistance of an authentication server, a gateway-oriented password-authenticated key exchange(GPAKE) protocol can establish a common session key shared between a client and a gateway. Unfortunately, a GPAKE ...
详细信息
With the assistance of an authentication server, a gateway-oriented password-authenticated key exchange(GPAKE) protocol can establish a common session key shared between a client and a gateway. Unfortunately, a GPAKE protocol becomes totally insecure if an adversary can compromise the authentication server and steal the passwords of the clients. In order to provide resilience against adversaries who can hack into the authentication server, we propose a threshold GPAKE protocol and then present its security proof in the standard model based on the hardness of the decisional Diffie-Hellman(DDH) problem. In our proposal,the password is shared among n authentication servers and is secure unless the adversary corrupts more than t + 1 servers. Our protocol requires n > 3t servers to work. Compared with existing threshold PAKE protocols,our protocol maintains both stronger security and greater efficiency.
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device...
详细信息
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart devices to be involved in the smart grid, such as smart meters, who play a part in monitoring and recording consumers’ power usage. The smart meter first amasses the information of energy consumption and then sends it to utility control.
暂无评论