期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Paillier陷门函数的两个变体的比特安全性分析 被引量:5
1
作者 苏东 王克 吕克伟 《计算机学报》 EI CSCD 北大核心 2010年第6期1050-1059,共10页
文中对Paillier陷门函数两个变体——Rabin-Paillier和RSA-Paillier进行了比特安全分析.对于Rabin-Paillier陷门函数,文中证明了从密文计算其明文的3 2n/2+log2n个最高有效位与对这个函数求逆一样困难,其中n为RSA模数N的二进制长度.该... 文中对Paillier陷门函数两个变体——Rabin-Paillier和RSA-Paillier进行了比特安全分析.对于Rabin-Paillier陷门函数,文中证明了从密文计算其明文的3 2n/2+log2n个最高有效位与对这个函数求逆一样困难,其中n为RSA模数N的二进制长度.该结论的证明基于Boneh等人提出的素数域上的隐藏数问题的一个变体.文中使用Malykhin在2007年得到的指数和的界把该变体扩展到了Paillier模数N2的情况.对于RSA-Paillier陷门函数,该文完善了Morillo等人对于该函数明文最低有效位的困难性证明.通过设计一个随机化的算法使得Morillo等人提出的明文恢复算法在使用不完美的LSB预言机的时候也能工作. 展开更多
关键词 比特安全 Paillier Rabin-Paillier RSA-Paillier 和的界 隐藏数问题
在线阅读 下载PDF
BP神经网络性能与隐藏层结构的相关性探究 被引量:10
2
作者 杨守建 陈恳 《宁波大学学报(理工版)》 CAS 2013年第1期48-52,共5页
利用BP神经网络对多个给定的复杂非线性系统控制进行定量研究,着重讨论了BP神经网络因隐藏层层数和网络学习率之间差异从而引起对复杂非线性系统控制性能上的影响.通过实验数据的对比分析发现,BP神经网络隐藏层层数的递增与系统控制... 利用BP神经网络对多个给定的复杂非线性系统控制进行定量研究,着重讨论了BP神经网络因隐藏层层数和网络学习率之间差异从而引起对复杂非线性系统控制性能上的影响.通过实验数据的对比分析发现,BP神经网络隐藏层层数的递增与系统控制性能的提升并不成正相关性,网络学习率的选取范围可控制在0~2.0之间,具体参数因控制对象而异,可采用分段调试和二分法运算以确定最佳网络学习率参数. 展开更多
关键词 BP神经网络 隐藏层层 网络学习率 多项式拟合
在线阅读 下载PDF
基于模拟退火的BP网络隐藏层节点估算算法 被引量:12
3
作者 张世睿 李心科 《合肥工业大学学报(自然科学版)》 CAS 北大核心 2017年第11期1489-1491,1506,共4页
单隐藏层BP神经网络在模式识别及数据挖掘等领域应用广泛,而隐藏层节点的数目受到众多因素的影响,因此节点数量的选取一直是一个复杂的问题。文章提出一种基于模拟退火算法(simulated annealing,SA)的单隐藏层BP神经网络隐藏层节点估算... 单隐藏层BP神经网络在模式识别及数据挖掘等领域应用广泛,而隐藏层节点的数目受到众多因素的影响,因此节点数量的选取一直是一个复杂的问题。文章提出一种基于模拟退火算法(simulated annealing,SA)的单隐藏层BP神经网络隐藏层节点估算算法,基于经验确定隐藏节点数的下界,通过模拟退火不断增加隐藏节点个数直至算法结束,得到最优解。该方法与经验法和试凑法相比具有较强的理论依据,与遗传算法等方法相比不容易陷入局部最小值。实验证明,采用该方法估算隐藏层节点的准确率较高,速度也较快。 展开更多
关键词 BP网络 模拟退火算法(SA) 隐藏 隐藏层节点
在线阅读 下载PDF
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
4
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
基于PSO算法的DBN模型参数优化 被引量:9
5
作者 居明宇 《国外电子测量技术》 2020年第3期12-16,共5页
针对深度置信网络模型每层神经元个数难以确立的问题,提出利用粒子群寻优确立DBN网络每层节点数,利用Kmeans聚类来决定是否需要增加隐藏层的方法来确立DBN的网络结构。该算法根据粒子群寻优算法以最小化所有样本重构误差的平方和为目标... 针对深度置信网络模型每层神经元个数难以确立的问题,提出利用粒子群寻优确立DBN网络每层节点数,利用Kmeans聚类来决定是否需要增加隐藏层的方法来确立DBN的网络结构。该算法根据粒子群寻优算法以最小化所有样本重构误差的平方和为目标函数来确定DBN每层神经元个数,以确定DBN的初步结构,为了验证DBN结构的有效性,利用DBN提取的数据特征来进行聚类测试,进一步根据聚类结果来修正DBN,以获得DBN的最佳结构,以红酒数据集进行分类实验,实验结果表明,与传统未经改进的深度置信网络进行对比,发现该方法确立的深度置信网络分类效果更优。 展开更多
关键词 深度置信网络 隐藏层层 隐藏层节点 粒子群寻优算法
在线阅读 下载PDF
基于列表译码方法在查询访问模型下含错学习问题的分析 被引量:1
6
作者 王明强 庄金成 《电子与信息学报》 EI CSCD 北大核心 2020年第2期322-326,共5页
Regev在2005年提出了含错学习问题(LWE),这个问题与随机线性码的译码问题密切相关,并且在密码学特别是后量子密码学中应用广泛。原始的含错学习问题是在随机访问模型下提出的,有证据证明该问题的困难性。许多研究者注意到的一个事实是... Regev在2005年提出了含错学习问题(LWE),这个问题与随机线性码的译码问题密切相关,并且在密码学特别是后量子密码学中应用广泛。原始的含错学习问题是在随机访问模型下提出的,有证据证明该问题的困难性。许多研究者注意到的一个事实是当攻击者可以选择样本时,该问题是容易的。但是目前据作者所知并没有一个完整的求解算法。该文分析了查询访问模型下的带有错误学习问题,给出了完整的求解算法。分析采用的工具是将该问题联系到隐藏数问题,然后应用傅里叶学习算法进行列表译码。 展开更多
关键词 含错学习问题 查询访问模型 隐藏数问题 傅里叶学习 列表译码
在线阅读 下载PDF
椭圆曲线Diffie-Hellman密钥交换协议的比特安全性研究 被引量:14
7
作者 魏伟 陈佳哲 +1 位作者 李丹 张宝峰 《电子与信息学报》 EI CSCD 北大核心 2020年第8期1820-1827,共8页
椭圆曲线Diffie-Hellman密钥交换协议与其他公钥密码体制相比,能够以较小的密钥尺寸来达到相同的安全强度,因此在实际应用中对带宽和存储的要求较低,从而在很多计算资源受限的环境中有更多应用价值。该文从理论和应用角度,评估该类型协... 椭圆曲线Diffie-Hellman密钥交换协议与其他公钥密码体制相比,能够以较小的密钥尺寸来达到相同的安全强度,因此在实际应用中对带宽和存储的要求较低,从而在很多计算资源受限的环境中有更多应用价值。该文从理论和应用角度,评估该类型协议共享密钥建立过程中的部分信息泄漏对安全性的威胁至关重要。基于隐藏数问题和格分析技术,该文讨论了椭圆曲线Diffie-Hellman密钥交换协议的比特安全性,启发式地证明了椭圆曲线Diffie-Hellman共享密钥的x坐标的中间11/12 bit的计算困难性近似于恢复整个密钥。进一步地,给出了信息泄露量与泄漏位置的显式关系式。该文的研究结果放松了对泄露比特位置的限制,更加符合应用场景,显著改进了以往工作中得出的结论。 展开更多
关键词 椭圆曲线Diffie-Hellman 比特安全 信息泄露 隐藏数问题
在线阅读 下载PDF
基于部分信息泄露的Hensel提升计算问题 被引量:1
8
作者 臧统政 吕克伟 《计算机工程》 CAS CSCD 2013年第8期38-43,54,共7页
针对传统隐藏数仅局限于模素数或模特定形式合数的问题,利用Hensel提升和格归约技术,提出一种隐藏数问题由模素数向模一般形式合数提升的方法。将隐藏数问题由模素数向模素数方幂提升,运用中国剩余定理得到模一般形式合数下的隐藏数问... 针对传统隐藏数仅局限于模素数或模特定形式合数的问题,利用Hensel提升和格归约技术,提出一种隐藏数问题由模素数向模一般形式合数提升的方法。将隐藏数问题由模素数向模素数方幂提升,运用中国剩余定理得到模一般形式合数下的隐藏数问题。利用该方法证明Hensel提升的离散对数计算,可归约到模素数情况下的隐藏数问题。 展开更多
关键词 隐藏数问题 Hensel提升 格归约 最大有意比特 离散对 中国剩余定理
在线阅读 下载PDF
RSA的比特安全性
9
作者 徐承波 《科学技术与工程》 2007年第8期1740-1741,共2页
Boneh和Venkatesan提出了一个多项式算法,用以恢复p个元素的有限域Fp的隐藏数α,在此基础上得到了许多推广及在某些密码系统的应用。文中把这些结果应用到RSA的比特安全性分析上.
关键词 比特安全性 RSA 隐藏数
在线阅读 下载PDF
基于深度学习的粉煤灰混凝土氯离子浓度预测 被引量:3
10
作者 章玉容 余威龙 +2 位作者 麻雪晴 骆天意 王京京 《北京工业大学学报》 CAS CSCD 北大核心 2023年第2期205-212,共8页
为研究深度学习方法在氯离子浓度预测中的应用,通过自然潮差环境下粉煤灰混凝土的长期暴露试验获取3150组自由氯离子浓度数据,建立不同激活函数、不同隐藏层层数的多层感知器(multi-layer perceptron,MLP)模型,开展考虑水灰比、暴露时... 为研究深度学习方法在氯离子浓度预测中的应用,通过自然潮差环境下粉煤灰混凝土的长期暴露试验获取3150组自由氯离子浓度数据,建立不同激活函数、不同隐藏层层数的多层感知器(multi-layer perceptron,MLP)模型,开展考虑水灰比、暴露时间、粉煤灰掺量、渗透深度4个输入参数影响的粉煤灰混凝土中的自由氯离子浓度预测研究.结果表明,采用ReLu函数及4层隐藏层构建MLP模型时,自由氯离子浓度的预测结果最优.同时,将构建的最优MLP模型开展基于未测参数的自由氯离子浓度预测,比基于菲克第二定律的预测结果更准确.因此,MLP模型具有精度高和适用范围广泛的特点,可作为氯盐环境下混凝土中自由氯离子浓度预测的新方法. 展开更多
关键词 自由氯离子浓度预测 深度学习 多层感知器 激活函 隐藏层层 粉煤灰混凝土
在线阅读 下载PDF
基于信息熵的DBN网络结构优化 被引量:2
11
作者 廖强 张杰 《信息通信》 2018年第1期44-48,共5页
对目前深度信念网络(Deep Belief Network,DBN)难以同时提取合适的网络深度和隐藏层神经元数的问题,在利用传统重构误差计算并判断网络深度的基础上,从信息表达的角度出发,分析了信息熵、输入层和隐藏层三者之间的内在联系,然后根据信... 对目前深度信念网络(Deep Belief Network,DBN)难以同时提取合适的网络深度和隐藏层神经元数的问题,在利用传统重构误差计算并判断网络深度的基础上,从信息表达的角度出发,分析了信息熵、输入层和隐藏层三者之间的内在联系,然后根据信息熵与隐藏层之间的关系,提出了一种基于信息熵确定隐藏层神经元数的优化方法,使DBN网络模型的的结构趋于更优。在手写数字识别上的实验结果表明,该方法能自组织地计算网络深度和隐藏层的神经元数量。与依据重构误差法确定网络深度的测试数据相比,平均误差减小了1.47%,有效地优化了DBN网络结构,降低了网络的训练时间,提高了网络精度和识别准确率。 展开更多
关键词 深度信念网络 DBN 信息熵 网络深度 隐藏层神经元
在线阅读 下载PDF
Ontology-based Knowledge Extraction from Hidden Web 被引量:1
12
作者 宋晖 马范援 刘晓强 《Journal of Donghua University(English Edition)》 EI CAS 2004年第5期73-78,共6页
Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not ref... Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly. 展开更多
关键词 knowledge service hidden web ONTOLOGY data extraction
在线阅读 下载PDF
Bottom-up mining of XML query patterns to improve XML querying
13
作者 Yi-jun BEI Gang CHEN +1 位作者 Jin-xiang DONG Ke CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期744-757,共14页
Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results... Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results of frequent queries. We discover frequent query patterns from user-issued queries using an efficient bottom-up mining approach called VBUXMiner. VBUXMiner consists of two main steps. First, all queries are merged into a summary structure named "compressed global tree guide" (CGTG). Second, a bottom-up traversal scheme based on the CGTG is employed to generate frequent query patterns. We use the frequent query patterns in a cache mechanism to improve the XML query performance. Experimental results show that our proposed mining approach outperforms the previous mining algorithms for XML queries, such as XQPMinerTID and FastXMiner, and that by caching the results of frequent query patterns, XML query performance can be dramatically improved. 展开更多
关键词 XML querying XML mining CACHING Data mining
在线阅读 下载PDF
Peculiar Quantum Phase Transitions and Hidden Supersymmetry in a Lipkin-Meshkov-Glick Model
14
作者 CHEN Gang LIANG Jiu-Qing 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第5期881-884,共4页
In this paper we theoretically report an unconventional quantum phase transition of a simple Lipkin- Meshkow-Glick model: an interacting collective spin system without external magnetic field. It is shown that this m... In this paper we theoretically report an unconventional quantum phase transition of a simple Lipkin- Meshkow-Glick model: an interacting collective spin system without external magnetic field. It is shown that this model with integer-spin can exhibit a flrst-order quantum phase transition between different disordered phases, and more intriguingly, possesses a hidden supersymmetry at the critical point. However, for half-integer spin we predict another flrst-order quantum phase transition between two different long-range-ordered phases with a vanishing energy gap, which is induced by the destructive topological quantum interference between the intanton and anti-instanton tunneling paths and accompanies spontaneously breaking of supersymmetry at the same critical point. We also show that, when the total spin-value varies from half-integer to integer this model can exhibit an abrupt variation of Berry phase from π to zero. 展开更多
关键词 Lipkin-Meshkov-Glick model quantum phase transition supersylnmetry
在线阅读 下载PDF
Wavelet neural network based watermarking technology of 2D vector maps 被引量:4
15
作者 Sun Jianguo Men Chaoguang 《High Technology Letters》 EI CAS 2011年第3期259-262,共4页
A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by ad... A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision. 展开更多
关键词 information hiding digital watermarking vector map neural network
在线阅读 下载PDF
Data Mining and Visualization of Grid-Based City Emergency System
16
作者 薛京生 孙济洲 +2 位作者 刘牧星 张旭 何宏 《Transactions of Tianjin University》 EI CAS 2005年第2期125-128,共4页
A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing poi... A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing points and lines, which was not efficient enough in dealing with the geographic information in units of police areas. The proposed algorithm maps an event set stored as a point set to a grid unit set, utilizes the cluster algorithm based on grids to find out all the clusters, and shows the results in the method of visualization. The algorithm performs well when dealing with high dimensional data sets and immense data. It is suitable for the data mining based on geogra-(phic) information system and is supportive to decision-makings in the city emergency system. 展开更多
关键词 GRID EMERGENCY data mining VISUALIZATION
在线阅读 下载PDF
An Authentication Technique Based on Classification
17
作者 李钢 杨杰 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期103-106,共4页
We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different t... We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective. 展开更多
关键词 AUTHENTICATION data hiding fragile watermark CLASSIFICATION
在线阅读 下载PDF
Universal Steganalysis of Data Hiding in Grayscale Images
18
作者 黄继风 林家骏 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期85-89,共5页
This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images tha... This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy. 展开更多
关键词 STEGANALYSIS data hiding quantificationattack one-class SVM.
在线阅读 下载PDF
The Detection of Hidden Periodicities in EEG
19
作者 YOU Rong-yi 《Chinese Journal of Biomedical Engineering(English Edition)》 2007年第4期179-183,共5页
A novel method for detecting the hidden periodicities in EEG is proposed. By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the st... A novel method for detecting the hidden periodicities in EEG is proposed. By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain. 展开更多
关键词 electroencephalogram (EEG) PERIODICITY structure function
在线阅读 下载PDF
MobiGemini:Sensitive-Based Data and Resource Protection Framework for Mobile Device 被引量:1
20
作者 Shuangxi Hong Chuanchang Liu +2 位作者 Bo Cheng Bingfei Ren Junliang Chen 《China Communications》 SCIE CSCD 2017年第7期67-77,共11页
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I... With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption. 展开更多
关键词 mobile security privacy protection storage encryption deniable encryption
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部