In order to improve the attack efficiency of the New FORK-256 function, an algorithm based on Grover's quantum search algorithm and birthday attack is proposed. In this algorithm, finding a collision for arbitrary...
详细信息
In order to improve the attack efficiency of the New FORK-256 function, an algorithm based on Grover's quantum search algorithm and birthday attack is proposed. In this algorithm, finding a collision for arbitrary hash function only needs O(2m/3) expected evaluations, where m is the size of hash space value. It is proved that the algorithm can obviously improve the attack efficiency for only needing O(2 74.7) expected evaluations, and this is more efficient than any known classical algorithm, and the consumed space of the algorithm equals the evaluation.
Via introducing the Robin flux jump into the Galerkin scheme, this paper develops a new anisotropic trilinear immersed finite element (IFE) method for solving the magnetized plasma diffusion problem with plasma sheath...
详细信息
Via introducing the Robin flux jump into the Galerkin scheme, this paper develops a new anisotropic trilinear immersed finite element (IFE) method for solving the magnetized plasma diffusion problem with plasma sheath interface condition under Cartesian meshes. The three-dimensional (3D) diffusion process of magnetized plasma is anisotropic and highly sensitive to magnetic fields, making it difficult to efficiently solve by commonly used body fitted mesh methods when the simulation domain has complex boundary conditions. Even worse, the plasma sheath boundary will further exacerbates its solving difficulty. The presented method first utilizes the anisotropic trilinear IFE basis functions describing the diffusion of magnetized plasma in interface elements. Then the trilinear IFE basis functions are used to handle the plasma sheath interface conditions, i.e. the Robin flux jump conditions. As for the other non interface elements, the traditional trilinear basis functions are used. On this basis, a new Galerkin scheme is derived and applied to efficiently solving the plasma anisotropic diffusion problem with the Robin flux jump interfaces in Cartesian meshes. The proposed method can also solve other types of elliptical interface problems via controlling the coefficients. Moreover, the orthogonal meshes makes it convenient to couple other Cartesian mesh based methods, such as the particle-in-cell method, which provides an advanced tool for solving plasma transport problems. Numerical experiments are provided to demonstrate the proposed method and show the applicability in the simulations of actual engineering issues.
Software defined networks(SDNs) are innovative network frameworks that have recently received wide attention. Their programming flexibility facilitates automatic network management and control, thus mitigating existin...
详细信息
Software defined networks(SDNs) are innovative network frameworks that have recently received wide attention. Their programming flexibility facilitates automatic network management and control, thus mitigating existing issues in the traditional network architecture. However, SDNs face several security risks,in particular denial-of-service(DoS) attacks, the most common and serious network attacks. To address such a threat, an SDN-DoS attack detection method is proposed based on fusing multiple flow features for describing the network catastrophe between the normal and the attack state. Several statistic attributes of SDN flow information are first chosen as detection features; subsequently, the cusp model is used to establish a catastrophe equilibrium surface for SDN states. After being trained, the cusp catastrophe model can be utilized to infer whether an SDN is under DoS attack. The experimental results demonstrate that the method can effectively and timely perceive SDN-DoS attacks, not only in simple networks but also in larger enterprise networks.
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper addresses this limitation by incorporating the side geometry of clothed humans as a prior. We propose ThicknessVAE, a novel two-stage method that makes two key contributions: (1) We learn a prototype from point clouds for the lateral regions of clothed humans to extract common and detailed geometric features. (2) We utilize this prototype as a prior to transform geometric features into a thickness map associated with clothed human images, enabling refined normal integration for sandwich-like reconstruction methods. By seamlessly integrating our model into the sandwich-like reconstruction pipeline, we achieve highly realistic side views. Both qualitative and quantitative experiments demonstrate that our approach is comparable to state-of-the-art methods in terms of side-view realism.
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di...
详细信息
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Ding et *** the Boolean Macaulay matrix and analyzed the lower bound on the condition *** by Ding et al.’s research,several related algorithms are proposed in this ***,the improved PoSSoB algorithm using the Boolean Macaulay matrix is proved to have lower ***,for solving equations with errors,a quantum algorithm for the max-polynomial system solving(Max-PoSSo)problem is proposed based on the improved PoSSoB ***,the Max-PoSSo algorithm is extended to the learning with errors(LWE)problem and its special case,the learning parity with noise(LPN)problem,providing a quantitative criterion,the condition number,for the security of these basic problems.
Multispectral imaging plays a critical role in a range of intelligent transportation applications, including advanced driver assistance systems (ADAS), traffic monitoring, and night vision. However, accurate visible a...
详细信息
Accurate tumor segmentation is crucial for cancer diagnosis and treatment. While foundation models have advanced general-purpose segmentation, existing methods still struggle with: (1) limited incorporation of medical...
详细信息
Tensor product function (TPF) approximations have been widely adopted in solving high-dimensional problems, such as partial differential equations and eigenvalue problems, achieving desirable accuracy with computation...
详细信息
With the rapid development of supercomputers, the scale and complexity are ever increasing, and the reliability and resilience are faced with larger challenges. There are many important technologies in fault tolerance...
详细信息
With the rapid development of supercomputers, the scale and complexity are ever increasing, and the reliability and resilience are faced with larger challenges. There are many important technologies in fault tolerance, such as proacrive failure avoidance technologies based on fault prediction, reactive fault tolerance based on checkpoint, and scheduling technologies to improve reliability. Both qualitative and quantitative descriptions on characteristics of system faults are very critical for these technologies, This study analyzes the source of failures on two typical petascale supercomputers called Sunway BlueLight (based on multi-core CPUs) and Sunway TaihuLight (based on heterogeneous manycore CPUs). It uncovers some interesting fault characteristics and finds unknown correlation relationship among main components' faults. Finally the paper analyzes the failure time of the two supercomputers in various grains of resource and different time spans, and builds a uniform multi-dimensional failure time model for petascale supereomputers.
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use unive...
详细信息
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use universal hardware and software to connect with public networks via the Internet, and are probably open to security threats from Trojan viruses and other malware. As a result, the security of sensitive personal data is threatened and economic interests in the industry are compromised. To address the run-time security problems efficiently, first, a TrustEnclave-based secure architecture is proposed, and the trusted execution environment is constructed by hardware isolation technology. Then the prototype system is implemented on real TrustZone-enabled hardware devices. Finally, both analytical and experimental evaluations are provided. The experimental results demonstrate the effectiveness and feasibility of the proposed security scheme.
暂无评论