闵祥参 范九伦 张雪锋
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0002
摘要 ( 240 ) PDF (3567 KB)( 347 )
Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication, a cancelable palmprint template generating algorithm is proposed, which is based on local Gabor directional pattern with adaptive threshold by mean (mLGDP), difference local Gabor directional pattern with adaptive threshold by mean (mDLGDP) and feature fusion of them. In this method, the feature code of the image is segmented and the fea-ture vectors are extracted and binarized. Then the Bloom filter is used to achieve many-to-one mapping and the location scrambling of palmprint image. Finally, the scrambling result matrix and the user key are irreversibly transformed by the convolution operation to obtain a revocable template of the palmprint image. Both theoretical and experimental results analysis show that, in the case of key loss, the method of feature fusion can enhance the diver-sity of the original palmprint template effectively, improve the recognition rate efficiently, and have better security.
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0013
摘要 ( 280 ) PDF (458 KB)( 311 )
Two-party certificateless authenticated key agreement（CL-AKA） protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed，which is of provable security and unforgeability in the extended Canetti-Krawczyk (eCK) security model based on the hardness assumption of the computational Diffie Hellman (CDH) problem. Compared with other similar protocols, it is more efficient and can satisfy security properties such as free of the centralized management of certificate and key, free of bilinear pairings, two-party authentication, resistant to unknown key-share attack, key compromise impersonation attacks, the man-in-the-middle-attack of key generation center (KGC), etc. These properties make the proposed protocol have better performance and adaptability for military communication.
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2018.0032
摘要 ( 205 ) PDF (456 KB)( 311 )
With the development and application of information technology, the problem of personal privacy leakage is becoming more and more serious. Most attribute-based broadcast encryption (ABBE) schemes focus on data security, while ignoring the protection of the personal privacy of users in access structure and identity. To address this problem, a privacy preserving ABBE scheme is proposed, which ensures the data confidentiality and protects personal privacy as well. In addition, the authenticity of encrypted data can be verified. It is proved that the proposed scheme achieves full security by dual system encryption.
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0004
摘要 ( 285 ) PDF (545 KB)( 370 )
Aiming at the problem that more popular network application and more complicated network traffic bring big challenge to current Trojan detecting technique, communication behavior of remote access Trojan (RAT) is analyzed, traffic features’ different performance in different communication sub-periods is discussed, and an integrated Trojan detecting model based on period feature statistics is presented. Feature statistics based on sub-periods and whole session （WS）respectively can increase the gap and classification ability of traffic features. The weighted integrated classifier can take full use of each base classifier’s advantage and compensate for each other’s weaknesses, therefore can strong system’s detecting and generalization capability. Experiment result shows that this system can recognize Trojan traffics from many kinds of normal traffic effectively.
徐春霞 齐小刚 刘立芳
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0005
摘要 ( 290 ) PDF (4063 KB)( 304 )
For complex networks, their effectiveness and invulnerability are extremely important. With the development of complex networks, how to evaluate the effectiveness and invulnerability of these networks becomes an important research topic. The relationship among many influencing factors is very complicated, so it is essential to confirm the weighting coefficient of these influencing factors. Principal component analysis (PCA) is proposed to evaluate the performance of complex networks. It can improve one-sidedness of the single evaluation index and select different evaluation models according to different complex networks, which make the evaluation result more accurate. Performance of complex networks can be predicted according to comprehensive evaluation model. To verify the rationality and validity of this method, several small-world networks with different probability values and scale-free network are chosen to evaluate the network performance. Finally, simulation results show that PCA can be applied to performance evaluation of complex networks.
许方敏 叶桓宇 崔绍华 赵成林 姚海鹏
中国邮电高校学报(英文版), 2019, 26 (1).
摘要 ( 265 ) PDF (5104 KB)( 300 )
敦书波 李斌 石国超 杨格亮
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0006
摘要 ( 260 ) PDF (2270 KB)( 302 )
This paper presents a wideband variable gain amplifier (VGA) featuring a decibel-linear gain control characteristic. The decibel-linear gain control function is realized using two VGA cells and a control signal converter. The bandwidth is extended using cascode architecture together with active inductive load. To achieve small parasitic and low area, direct current (DC) coupling is adopted in the circuit while a DC offset cancellation circuit (DCOC) is introduced to cancel the DC offset. Fabricated in a 0.18 μm complementary metal oxide semiconductor (CMOS) process, the chip occupies an area of 0.53 mm × 0.48 mm (including pads) and draws a total current of 9 mA from a 1.8 V supply. The measurement results show that the gain of the VGA varies from -40 dB to 18 dB while the control voltage varies from 0 to 1.8 V, resulting in a total gain control range of 58 dB. The 3 dB bandwidth of the VGA is larger than 260 MHz at maximum gain.
邵晶波 赵月 刘晓晓
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0007
摘要 ( 275 ) PDF (1140 KB)( 408 )
The ever-increasing complexity of on-chip interconnection poses great challenges for the architecture of conventional system-on-chip (SoC) in semiconductor industry. The rapid development of process technology enables the creation of stacked 3-dimensional (3D) SoC by means of through-silicon-via (TSV). Stacked 3D SoC testing consists of two major issues, test architecture optimization and test scheduling. This paper proposed game theory based optimization of test scheduling and test architecture to achieve win-win result as well as individual rationality for each player in a game. Game theory helps to achieve equilibrium between two correlated sides to find an optimal solution. Experimental results on handcrafted 3D SoCs built from ITC’2 benchmarks demonstrate that the proposed approach achieves comparable or better test times at negligible computing time.
苏志斌 钱亚红 谷雨 任慧
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0008
摘要 ( 342 ) PDF (1181 KB)( 296 )
The premise of image emotion recognition is to determine its representative emotional adjectives and establish the quantifiable emotion space. In this paper, focusing on aroused emotion from film and television （TV） scene images, a method of selecting emotional adjectives and establishing the emotion space based on subjective perception experiment is proposed. Firstly, a special data set about film and TV scene images was established and a set of initial emotional adjectives was collected. Then the subjective perception experiment was designed to let subjects to evaluate the affection of all the initial adjectives during watching these scene images. Then the method of principal basis analysis was used for variable selection. Finally, the factor analysis was applied to accomplish the second dimension reduction to form a 5-dimensional（5D）orthogonal emotion space. The optimized emotion space can explain more than 94% of original emotional adjectives, which greatly reduces the dimension of emotional adjectives and lays a foundation for the further research on image content and emotion recognition.
李鑫 谢刚 高锦春
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0009
摘要 ( 332 ) PDF (1826 KB)( 337 )
Auction was widely used to tackle spectrum allocation and sharing in the secondary market under the condition of spectrum scarcity. In real communication system, such as broadband communication, the utilization of spectrum resource is various because of different requirements and complex application scenarios. So, these schemes cannot be directly applied to the above wireless communication system. To solve this problem, a new model where sellers/buyers can sell/buy multi-unit for heterogeneous spectrum was proposed and a truthful multi-unit double auction framework was designed for heterogeneous spectrum trading. A valuation function is first applied to represent the buyer’s true valuation of the sub-band and reflect the buyer’s satisfaction degree and a novel concept termed ‘virtual player’ was introduced. Then the buyer group was constructed based on the conflict graph to reuse the same spectrum among interference-free buyers in both spatial and temporal domains. The winner determination strategy and algorithm of clearing price were designed elaborately. According to the theoretical analysis, the scheme can satisfy three critical economic properties: truthfulness, individual rationality, and budget balance. Finally, simulation results show that the proposed scheme can achieve better user satisfaction, auction efficiency and spectrum reuse rate for the real communication system. The proposed auction framework is practical and effective.
闫丹凤 柯楠 顾超 Cui Jianfei, Ding Yiqi
中国邮电高校学报(英文版), 2019, 26 (1). doi： 10.19682/j.cnki.1005-8885.2019.0001
摘要 ( 333 ) PDF (748 KB)( 326 )
Text classification means to assign a document to one or more classes or categories according to content. Text classification provides convenience for users to obtain data. Because of the polysemy of text data, multi-label classification can handle text data more comprehensively. Multi-label text classification become the key problem in the data mining. To improve the performances of multi-label text classification, semantic analysis is embedded into the classification model to complete label correlation analysis, and the structure, objective function and optimization strategy of this model is designed. Then, the convolution neural network (CNN) model based on semantic embedding is introduced. In the end, Zhihu dataset is used for evaluation. The result shows that this model outperforms the related work in terms of recall and area under curve (AUC) metrics.