Search scope:
排序: Display mode:
Post-quantum blind signcryption scheme from lattice Research Articles
Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 6, Pages 891-901 doi: 10.1631/FITEE.2000099
Keywords: 格密码系统;盲签密;抗量子计算;带错误学习问题;最短向量问题
High-payload completely reversible data hiding in encrypted images by an interpolation technique Article
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1732-1743 doi: 10.1631/FITEE.1601067
Keywords: Encrypted image Data hiding Image recovery Real reversibility Interpolation
Low-computation certificateless hybrid signcryption scheme Article
Hui-fang YU, Bo YANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 928-940 doi: 10.1631/FITEE.1601054
Keywords: Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems
Xiong Yilan,Li Guangzeng
Strategic Study of CAE 2007, Volume 9, Issue 5, Pages 42-45
Utilizing the orthogonal feature of space time block coding ( STBC) , a simple and feasible algorithm based on constant modulus (CM) criterion is proposed for blind multi-user detection in STBC MC - CDMA systems. The algorithm proposed in the paper as a simplified version of the algorithm based on the least square constant modulus algorithm(LSCMA) has the advantage of half taps and therefore considerable reduced computation at the cost of a certain loss in performance.
Keywords: space time block code MC-CDMA constant modulus algorithm blind multi_user detection
DE-CMA:An Improved Blind Equalization Algorithm Used in3G Connection Systems
Wang Ji,Hu Aiqun,Song Yubo
Strategic Study of CAE 2007, Volume 9, Issue 2, Pages 54-57
The convergence of the Constant-modulus algorithm widely used in DVB system is a complex problem.Firstly,some influencing factors such as cost function,iterative equation and filter coefficients are considered;then,in this paper,an ameliorative algorithm with time-delay estimate is proposed,which can avoid converging to the ill solution by correcting the position of main path.Simulation results demonstrate the proposed algorithm can highly improve the convergence performance of the primary one.Besides,its simplicity and efficiency make it feasible in the high-rate 3G connection application.
Keywords: blind equalization CMA ill-convergence time-delay-estimate
Amultimodal dense convolution network for blind image quality assessment Research Article
Nandhini CHOCKALINGAM, Brindha MURUGAN
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 11, Pages 1601-1615 doi: 10.1631/FITEE.2200534
Keywords: No-reference image quality assessment (NR-IQA) Blind image quality assessment Multimodal dense convolution network (MDSC-Net) Deep learning Visual quality Perceptual quality
Liu Liansheng,Liang Longhua,Wu Jiyang, Jiao Yongbin,Lu Zhexiang
Strategic Study of CAE 2014, Volume 16, Issue 11, Pages 107-112
Application of transient electromagnetic method, carries on the cavern blasting blind detection and recognition of feasibility study. Test to establish the electromagnetic background field, and then in the cavern preset benign conductor and measured after eliminating the background field, in the electromagnetic field transient to do the electromagnetic measurement again after blasting. Benign comparison before and after blasting preset the change of the conductive body eddy current field, realizes the cavern blasting blind shot detection and identification of purpose. The test results show that the target when the aluminum box buried depth of no more than 30 m, transient electromagnetic method can clearly identify the position of the aluminum box; When the aluminum box buried depth after more than 30 m, aluminum box formation of the secondary vortex field level, not sure the deep buried depth and position of the aluminum box.
Keywords: Transient electromagnetic methods Chamber blasting Misfire detection and identification Eddy current field Target。
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction Research Article
Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1156-1168 doi: 10.1631/FITEE.2200501
Keywords: Adaptive quadtree partitioning Adaptive most significant bit (MSB) prediction Reversible data hiding in encrypted images (RDH-EI) High embedding capacity
Space-frequency Joint Blind Multi-user Detection Algorithm in Smart Antenna MC-CDMA System
Fu Hongliang,Feng Guangzeng
Strategic Study of CAE 2006, Volume 8, Issue 2, Pages 34-38
A space-frequency joint blind multi-user adaptive detection algorithm in smart antenna MC-CDMA system is proposed in this paper. It combines the receiving beam-forming in space-domain with combinational detection in frequency-domain and optimizes the detector simultaneously in two dimensions. It can enhance the performance of detection of the system. The bit error probability of the proposed algorithm is also analyzed in this paper. The proposed algorithm is simulated and compared with the two-step algorithm in which the adaptive beam-forming is used first and then the combination in frequency-domain is carried out. Simulation results show that the proposed algorithm is superior to the latter.
Keywords: smart antenna multi-carrier CDMA joint detection
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
In this paper, it is pointed out that the block cipher proposed in “Design of Block Cipher substitution network on chaos” can be broken by attack with known plaintext and attack with ciphertext only, and the key of this cipher can be found by the divide-and-conquer attack with the encipher transformation. Furthermore, the mutual restriction between the successive values of the chaos sequences based on the Logistic mapping, and the property that the frontal values of the chaos sequences are not sensitive to the bits on the lower po-sitions of the initial value are also pointed out.
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article
Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1354-1368 doi: 10.1631/FITEE.2100518
Keywords: Power Internet of Things Cloud-fog cooperation Elliptic curve Random oracle model Certificateless aggregate signcryption
Study on Intelligent Decision - making Support System for Water Saving Irrigation Management
Wang Zhinong,Lü Hongxing,Wang Mixia,Xiong Yunzhang,Ma Xiaoyi
Strategic Study of CAE 2001, Volume 3, Issue 7, Pages 48-53
By using the techniques of expert system of artificial intelligence, three different water saving irrigation management decision-making support systems have been developed and integrated, namely Irrigation forecast and decision making of water saving irrigation, planning water use and water distribution in an irrigation district, and management system reform in irrigation district. Meanwhile, the theoretic basis, systems structures and practica applications and the crop drought decision making in Shanxi Province are introduced. The research, development, spread and application of water saving irrigation management intelligent decision-making support system will promote the transfer of the traditional agriculture to modern one, and open a new way for sending the high and advanced agricultural technology to hundreds of millions of farmers.
Keywords: irrigation forecast water saving irrigation irrigation management intelligent decision-making support system
Zhang Wanjun,Guo Yuwen,Wang Doutian,Zhang Minsheng,Huang Mingyong
Strategic Study of CAE 2001, Volume 3, Issue 5, Pages 79-85
Considering the conditions that TEDA used to be hungriness area without vegetation and without agriculture, forestry, livestock farming, etc. , to rely on, the new conception “allowable depth”, established in coastal area of TEDA with shallow groundwater and silt soft foundation, and the new techniques on water drainage by “shallow-dense type” underground level pipes were introduced. Technical constituent, advantage and implementation of the new techniques were discussed. From the view of sustainable development of afforestation ,technical measures for comprehensive tackling and control of the wilderness areas such as salt affected soils and their application in practice were introduced.
Keywords: saltern shallow groundwater and silt soft foundation level underground pipe draining critical depth allowable depth shallow-dense type
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel impulse response
Title Author Date Type Operation
Post-quantum blind signcryption scheme from lattice
Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn
Journal Article
High-payload completely reversible data hiding in encrypted images by an interpolation technique
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Journal Article
Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems
Xiong Yilan,Li Guangzeng
Journal Article
DE-CMA:An Improved Blind Equalization Algorithm Used in3G Connection Systems
Wang Ji,Hu Aiqun,Song Yubo
Journal Article
Amultimodal dense convolution network for blind image quality assessment
Nandhini CHOCKALINGAM, Brindha MURUGAN
Journal Article
Feasibility study of the transient electromagnetic method for chamber blasting misfire detection and recognition
Liu Liansheng,Liang Longhua,Wu Jiyang, Jiao Yongbin,Lu Zhexiang
Journal Article
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction
Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com
Journal Article
Space-frequency Joint Blind Multi-user Detection Algorithm in Smart Antenna MC-CDMA System
Fu Hongliang,Feng Guangzeng
Journal Article
A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU
Journal Article
Study on Intelligent Decision - making Support System for Water Saving Irrigation Management
Wang Zhinong,Lü Hongxing,Wang Mixia,Xiong Yunzhang,Ma Xiaoyi
Journal Article
The Discussion and Research on the Technologies of Afforestation and Salt Draining Engineering in Coastal Wasteland
Zhang Wanjun,Guo Yuwen,Wang Doutian,Zhang Minsheng,Huang Mingyong
Journal Article