Beijing Safe Code Technology Co.

Beijing, China

Beijing Safe Code Technology Co.

Beijing, China

Time filter

Source Type

Zhe G.,Beijing University of Posts and Telecommunications | Dan L.,Beijing University of Posts and Telecommunications | Baoyu A.,Beijing University of Posts and Telecommunications | Yangxi O.,Beijing University of Posts and Telecommunications | And 2 more authors.
International Journal of Advancements in Computing Technology | Year: 2011

In recent years the ant colony clustering methods have emerged as a new kind of data mining schemes. The research of ant colony clustering methods is also an important direction for swarm intelligence. Today these methods have been deeply investigated and most of them show good performance. This paper will give an analysis of ant colony clustering methods from the perspective of models, algorithms and applications. First we introduce two important ant colony models: "foraging model"and "piling model", by which most ant colony clustering methods are inspired. Based on these two models, we present a survey on main ant colony clustering algorithms. Meanwhile, a classified summary of applications is given. We finally discuss our opinions on future research about ant colony clustering methods.


Zhe G.,Beijing University of Posts and Telecommunications | Baoyu A.,Beijing University of Posts and Telecommunications | Wei C.,Beijing University of Posts and Telecommunications | Yang X.,Beijing University of Posts and Telecommunications | And 4 more authors.
Advances in Information Sciences and Service Sciences | Year: 2012

In the Web2.0 age, user-generated content (UGC) behavior has evolved from the simple posting information into high interactive behaviors between users. Thus, social network analysis has become a hotspot, especially focusing on mining the relationship among people. The community detection technology in the complex networks research is highly significant to be applied in social networks analysis. This paper proposes a novel community-topic interacting model(CTIM). Based on this model, we can construct a user-topic bipartite network, and give a contribution weighted projection on it. Meanwhile a novel weighted modularity function is given and the community detection algorithm is presented. According to these steps, the weighted community detection approach based on CTIM (CD-CTIM) is introduced. The experimental results show that our approach has advantages and achieves satisfying results. We also finally discuss our opinions on future research about community detection on our proposed model. Advances in information Sciences and Service Sciences(AISS) Volume4, Number11, June 2012.


Qi L.,Beijing University of Posts and Telecommunications | Qi L.,Beijing Safe Code Technology Co. | Bin T.,Beijing University of Posts and Telecommunications | Bin T.,Beijing Safe Code Technology Co.
China Communications | Year: 2011

Recently, the Internet of Things (IoT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor networks is one of the most important applications for the Internet of Things. In practice, it is hard to get enough real-world samples to generate the classifiers for some special audio events (e.g., car-crashing in the smart traffic system). In this paper, we introduce a TrAdaBoost-based method to solve the above problem. By using the proposed approach, we can train a strong classifier by using only a tiny amount of real-world data and a large number of more easily colle cted samples (e.g., collected from TV programs), even when the real-world data is not sufficient to train a model alone. We deploy this approach in a smart traffic system to evaluate its performance, and the experiment evaluations demonstrate that our method can achieve satisfying results.


Zhe G.,Beijing University of Posts and Telecommunications | Dong L.,Beijing University of Posts and Telecommunications | Qi L.,Beijing University of Posts and Telecommunications | Jianyi Z.,Beijing University of Posts and Telecommunications | And 3 more authors.
Journal of Convergence Information Technology | Year: 2012

Recently, with an increasing number of major events spreading all over the Internet, the research for online hot topics detection system has been paid more and more attention. In this paper, we proposed an unsupervised and efficient hot topics detection approach, which is based on an improved ant colony text clustering (IACTC) algorithm. In view of the deficiencies of the basic ant colony text clustering (BACTC) method, the inverse tangent function is introduced into the proposed algorithm as a novel probability function, which could be flexibly adjusted. Meanwhile, in order to reduce ants' blinding movement, we add the memory organ to each ant, and we develop the concept of adaptive moving range. Additionally, we design a practical system framework with technical details to solve the problems involving in the real-time hot topics detection system (e.g., information collecting, web preprocessing and text processing). This system is also used to evaluate our proposed method.The experimental results show that our approach has numerous advantages and achieves satisfying results.


Sun M.-H.,Beijing University of Posts and Telecommunications | Luo S.-S.,Beijing University of Posts and Telecommunications | Luo S.-S.,Beijing Safe Code Technology Co. | Xin Y.,Beijing University of Posts and Telecommunications | Yang Y.-X.,Beijing University of Posts and Telecommunications
Tongxin Xuebao/Journal on Communications | Year: 2013

The model and framework of secure multi-party computational geometry were presented based on the existing protocols. The new framework has three dimensions, the math model, the security model and the communication model. Using the new model and framework, a secure two-party line segments intersection protocol based on Paillier homomorphic encryption scheme is proposed. This protocol solves the problem that the existing secure two party intersect-determination schemes of line segments cannot output the exact coordinates of the intersection. The security of the protocol is demonstrated using Goldreich method. The results show that this protocol has better efficiency than the existing ones. In addition, the secure two-party line segments intersection in malicious model is also designed. As an application, a privacy-preserving convex hull intersection protocol is proposed based on the O'Rourke scheme. This application makes up for the gap in privacy-preserving convex hull intersection protocol in the area of secure multi-party computational geometry.


Bin T.,Beijing University of Posts and Telecommunications | Xi O.,Beijing University of Posts and Telecommunications | Dong L.,Beijing University of Posts and Telecommunications | Shoushan L.,Beijing University of Posts and Telecommunications | And 2 more authors.
Advances in Information Sciences and Service Sciences | Year: 2012

Wireless sensor networks (WSNs) have been widely used in general and military scenarios. And these lead to a need for more security. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. WSNs are, therefore, susceptible vulnerable to attack and compromise. The intent of this paper is to investigate attacks and countermeasure in wireless sensor networks. We identify the attacks to sensor networks and summarize the defense and detection methods based on the stage of data acquisition. Then, we introduce the primary attacks in the state-of-the-art in wireless sensor networks. Various types of attacks are discussed and their countermeasures are presented. At finally, we discuss the existing solutions and possible future research.


Li D.,Beijing University of Posts and Telecommunications | An W.,Beijing University of Posts and Telecommunications | Gong Z.,Beijing University of Posts and Telecommunications | Luo S.,Beijing University of Posts and Telecommunications | And 3 more authors.
Advances in Information Sciences and Service Sciences | Year: 2012

As the development of network applications, old technologies like identifying traffic based on "well-known" TCP or UDP port numbers or based on the payload inspection were already inaccurate or wasteful of time and storage space. To get over the challenges that referred above, statistical technology and machine learning (ML) are introduced to traffic classification. The paper focuses on emerging hybrid research - blend of network and data mining techniques. We summarize ML approaches briefly, review significant works that cover the period from 2004 TO 2010 and categorize them by ML methods and major contribution. Considered data stream characteristics of network traffic flow, we proposed a Traffic Classification Scheme based on Data Stream Clustering Techniques, which has the capability to achieve real-time traffic classification, application clusters evolution analysis, and outline analysis for massive, high-speed, dynamic traffic flows. As an expansion, further research in this field is discussed at the end.


Zhang J.,Beijing University of Posts and Telecommunications | Li Q.,Beijing University of Posts and Telecommunications | Wang Q.,Beijing University of Posts and Telecommunications | Geng T.,Beijing University of Posts and Telecommunications | And 2 more authors.
Journal of Information and Computational Science | Year: 2012

Phishing is a semantic attack that impersonates a trusted website to gain the user's sensitive data. In order to cope with the semantic attacks launched by the phishers, in this paper, we present a novel method to detect the phishing webpages semantically. According to the linguistic characteristics that appeared in the phishing pages, we first propose the phishing domain ontology and its corresponding description model, Phishing Descriptive Model (PDM). Then the PDM is defined by Semantic Element (SE) and Semantic Relationship (SR). After that, we introduce the mechanism for the detection of the phishing pages based on the PDM. Furthermore, we utilize three different description methods followed by the principle of PDM and a statistical algorithm to demonstrate the detection mechanism. We, thereafter, introduce a series of experiments to evaluate the efficiency and the performance of these detection methods. The results demonstrate that our proposed method could achieve better than 97% accuracy with a satisfied processing speed in the phishing identification and therefore prove that a phishing attacks could be detected in the semantic level. © 2012 by Binary Information Press.


Maohua S.,Beijing University of Posts and Telecommunications | Shoushan L.,National Engineering Laboratory for Disaster Backup and Recovery | Lei P.,Beijing University of Posts and Telecommunications | Zhe J.,Beijing University of Posts and Telecommunications | Yang X.,Beijing Safe Code Technology Co Ltd.
International Journal of Advancements in Computing Technology | Year: 2012

With the rapid growth of the internet and the progress of the society, people need to share more and more information with others. How to ensure the authorized persons to get the information is a big problem now. Secret sharing is a widely used tool to solve this problem. In this paper, the related work and the framework of secret sharing is demonstrated. We also develop the relationship between secret sharing and secure multi-party computation, and introduce how to build the privacy-preserving secret sharing scheme. At the same time, future works of secret sharing are proposed in the end.


Pang L.,Post University | Jia Z.,Post University | Luo S.,National Engineering Laboratory for Disaster Backup and Recovery | Wang B.,Post University | Xin Y.,Beijing Safe code Technology Co Ltd
International Journal of Advancements in Computing Technology | Year: 2011

With the development of all types of electronic auction, the study of designing secure electronic auction has become an important issue. This paper deals with (M+1)-st price auction. We present a secure protocol without auctioneer, taking advantage of the homomorphic lemma of threshold ElGamal encryption. The bidders can compute the result by themselves without leaking own messages. The correctness and security are also analyzed. In the phase of opening bid, the offline of the unsuccessful bidder may cause the price can't be calculated. This protocol can deal with the problem.

Loading Beijing Safe Code Technology Co. collaborators
Loading Beijing Safe Code Technology Co. collaborators