Dear editor,In recent years, steganalysis researchers have tried their best to extract the hidden messages. For example, under the condition of a known embedding position generator, Liu et al.[1] proposed a collision ...
详细信息
Dear editor,In recent years, steganalysis researchers have tried their best to extract the hidden messages. For example, under the condition of a known embedding position generator, Liu et al.[1] proposed a collision attack algorithm to recover the stego key of least significant bit (LSB) steganography. Fridrich et al.[2] proposed a chi-squared-test-based method to recover the stego key of LSB steganography for the case of an unknown carrier. Under the condition of multiple stego images embedded into the same positions, Ker [3] first proposed locating the
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien...
详细信息
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficient conditions for two compressing sequences to be s-uniform with α provided that the compressing map is of the form φ(x;, x;,..., x;) = g(x;) + η(x;, x;,..., x;), where g(x;) is a permutation polynomial over Z/(p) and η is an(e-1)-variable polynomial over Z/(p).
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously colle...
详细信息
According to OWASP selected web application Top 10 vulnerabilities in 2013 and 2017,structured query language(SQL)injection is consistently ranked the 1 ***,the protection of SQL injection,which is one of the most pre...
详细信息
ISBN:
(纸本)9781538605349;9781538605332
According to OWASP selected web application Top 10 vulnerabilities in 2013 and 2017,structured query language(SQL)injection is consistently ranked the 1 ***,the protection of SQL injection,which is one of the most prevalent and pernicious security issues,requires ***,there are numerous unknown vulnerabilities and potential threats in *** this case,the active defense based on structural diversity can play an effective role to prevent the hacker from exploiting known or unknown *** on the basis of structural diversity,we propose a modified method,heterogeneous language,combined with heterogeneous database in data storage layer,to establish an active defense model for data *** empirically assess the impact of the vulnerability and conclude by testing the accuracy and performance,showing that our security model can not suffer from the same vulnerability as the unprotected ***,the future work and research direction are discussed.
With the development of machine learning and computer vision, we combined the image classification and malware detection in this work. Based on the technology of image classification, we achieved the detection of malw...
详细信息
ISBN:
(纸本)9781538605349;9781538605332
With the development of machine learning and computer vision, we combined the image classification and malware detection in this work. Based on the technology of image classification, we achieved the detection of malware, using machine learning. In our work, we visualized the malware as a grayscale image and extracted texture features by Gabor filter. Depend on machine learning, we used extremely randomized trees as the classification and 10-fold cross validation to value it. Compared with GBDT, KNN and RF, experimental results are quite impressive with the accuracy rate of 96.19% and the recall rate of 97.51% on a malware database of 15,781 samples.
Reconfigurable cipher chip has become a research hotspot because of its flexibility, security and good resource utilization. At present, research of reconfigurable cipher chip usually focuses on the s
ISBN:
(纸本)9781467389808
Reconfigurable cipher chip has become a research hotspot because of its flexibility, security and good resource utilization. At present, research of reconfigurable cipher chip usually focuses on the s
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net...
详细信息
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of network traffic tracing,current watermarking methods cannot work efficiently due to the dependence on specific protocols,demand for large quantities of packets,weakness on resisting network channel interferences and so *** this end,we propose a robust network flow watermarking method based on IP packet sequence,called as *** is designed to utilize the packet sequence as watermark carrier with IP identification field which is insensitive to time jitter and suitable for all IP based *** enhance the robustness against packet loss and packet reordering,the detection sequence set is constructed in terms of the variation range of packet sequence,correcting the possible errors caused by the network *** improve the detection accuracy,the long watermark information is divided into several short sequences to embed in turn and assembled during *** a large number of experiments on the Internet,the overall detection rate and accuracy of IP-Pealing reach 99.91% and 99.42%*** comparison with the classical network flow watermarking methods,such as PROFW,IBW,ICBW,WBIPD and SBTT,the accuracy of IP-Pealing is increased by 13.70% to 54.00%.
For nonlinear feedback shift registers(NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If the g...
详细信息
For nonlinear feedback shift registers(NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If the greatest common subfamily is exactly the set of all sequences which can be generated by both of them, the authors can determine it by Grbner basis theory. Otherwise, the authors can determine it under some conditions and partly solve the problem.
An ideal artificial intelligence (AI) system should have the capability to continually learn like humans. However, when learning new knowledge, AI systems often suffer from catastrophic forgetting of old knowledge. Al...
详细信息
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ...
详细信息
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation is a hot research ***,the existing IP geolocation algorithms cannot effectively utilize the distance characteristics of the delay,and the nodes’connection relation,resulting in high geolocation *** is challenging to obtain the mapping between delay,nodes’connection relation,and geographical *** on the idea of network representation learning,we propose a representation learning model for IP nodes(IP2vec for short)and apply it to street-level IP ***2vec model vectorizes nodes according to the connection relation and delay between nodes so that the IP vectors can reflect the distance and topological proximity between IP *** steps of the street-level IP geolocation algorithm based on IP2vec model are as follows:Firstly,we measure landmarks and target IP to obtain delay and path information to construct the network ***,we use the IP2vec model to obtain the IP vectors from the network ***,we train a neural network to fit the mapping relation between vectors and locations of ***,the vector of target IP is fed into the neural network to obtain the geographical location of target *** algorithm can accurately infer geographical locations of target IPs based on delay and topological proximity embedded in the IP *** cross-validation experimental results on 10023 target IPs in New York,Beijing,Hong Kong,and Zhengzhou demonstrate that the proposed algorithm can achieve street-level *** with the existing algorithms such as Hop-Hot,IP-geolocater and SLG,the mean geolocation error of the proposed algorithm is reduced by 33%,39%,and 51%,respectively.
暂无评论