Time filter

Source Type

Jing H.,China Academy of Telecommunication Research of MIIT
Communications in Computer and Information Science | Year: 2015

To deal with the threat of over the top (OTT) applications, many operators launch their own rich communication services over LTE. China Mobile also declares the overall commercial of rich communication services in 2015. The rich communication services integrate abundant multimedia, media and social characteristics into the traditional telecom services. While these characteristics provide a superior user experience, they also attract the scammers to utilize these services as the new channel of spreading digital misinformation, launching mass events, phishing and so on. Besides these, the LTE/SAE network and user terminals also pose much security challenges to the RCS services. In this paper, we firstly and systematically assess the security risk of rich communication services based on their three-tier architecture, which aims at improving the security of rich communication services. © Springer-Verlag Berlin Heidelberg 2015.

Jing H.,China Academy of Telecommunication Research of MIIT
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2015

In this paper, we propose an alternative salient object detection method based on maximum saliency region and density. The proposed approach can automatically detect the salient object with a well-defined boundary. Saliency region and density maximization is used as the quality function to find the optimal window containing a salient object. And for efficiently executing window search, a branch-and-bound search algorithm based on saliency region and density is proposed. Then the located window is used to initialize the GrabCut method, and the salient object with a well- defined boundary is extracted through applying GrabCut. Experimental results show that the proposed salient object detection approach outperforms the state-of-the-art methods. © 2015 SPIE.

Liu X.,Beihang University | He J.,Columbia University | Liu D.,China Academy of Telecommunication Research of MIIT | Lang B.,Beihang University
MM 2012 - Proceedings of the 20th ACM International Conference on Multimedia | Year: 2012

Hashing methods, which generate binary codes to preserve certain similarity, recently have become attractive in many applications like large scale visual search. However, most of state-of-the-art hashing methods only utilize single feature type, while combining multiple features has been proved very helpful in image search. In this paper we propose a novel hashing approach that utilizes the information conveyed by different features. The multiple feature hashing can be formulated as a similarity preserving problem with optimal linearly-combined multiple kernels. Such formulation is not only compatible with general types of data and diverse types of similarities indicated by different visual features, but also helpful to achieve fast training and search. We present an efficient alternating optimization to learn the hashing functions and the optimal kernel combination. Experimental results on two well-known benchmarks CIFAR-10 and NUS-WIDE show that the proposed method can achieve 11% and 34% performance gains over state-of-the-art methods. © 2012 ACM.

Ji S.,China Academy of Telecommunication Research of MIIT
World Information on Earthquake Engineering | Year: 2012

Anti-seismic studies can not be ignored in the communication industry. This article compares and analyzes the required response spectrum based on the seismic test standards of communication equipment in the United States, Japan and Europe, discusses the special performance requirements of shaking table for the communications equipment's seismic test and finally presents the suitable performance indices. It will help the research staff to select the shaking table for the seismic test of the communication equipments reasonably.

Li W.,China Academy of Telecommunication Research of MIIT | Cao F.,China Academy of Telecommunication Research of MIIT
Communications in Computer and Information Science | Year: 2015

In recent years, cloud computing service is used widespread for information systems. The significant thing for costumers is distinguishing trusted cloud. However, since this new technology covers Internet, CT and IT fields how to defines and assessment trusted cloud is very complicated. Many organizations have offered metrics for evaluating cloud, while few of them is accepted as standard, let alone those for trusted cloud. This paper proposes a new framework including 17 indicators in terms of data security, service quality and rights protection, to evaluate trusted cloud service. Additionally, this framework has been the standard of China Communication Standard Alliance, and applied in Trusted Cloud Certification of China. © Springer-Verlag Berlin Heidelberg 2015.

Xu H.,University of Science and Technology Beijing | Lin R.,China Academy of Telecommunication Research of MIIT
China Communications | Year: 2016

In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, including response cost and response negative cost. The whole assessment process is considered as a differential game for optimal resource control. The proposed scheme can be obtained through the Nash Equilibrium. It is proved that the game theory based algorithm is applicable and the optimal resource level can be achieved based on the proposed algorithm. © 2013 IEEE.

Cai W.,China Academy of Telecommunication Research of MIIT
IET Conference Publications | Year: 2012

The industry convergence of mobile networks and the Internet produces the mobile Internet. The form of mobile Internet competition has changed, which is no longer a competition between individual enterprises, but a competition between the business ecosystems. This paper builds the competitive advantage model of mobile Internet ecosystem based on the user needs. Then we, using this model, analyze the three major mobile Internet ecosystems: terminal operators, service providers and network operators. We also believe that value innovation is the specific means to achieve system competitive advantage. At last we build a set of evaluation index system of system competitive advantage, and evaluate the three major ecosystems.

Luo Z.,China Academy of Telecommunication Research of MIIT
IEEE Transactions on Information Theory | Year: 2011

In this paper, a novel iterative soft joint detection algorithm for orthogonal frequency division multiplexing (OFDM) systems is proposed. Without the need of channel estimation, it directly generates the a posteriori probabilities (APPs) of data symbols by very efficient computation. With the increase of iterations, the proposed algorithm gradually achieves near-optimal performance, while its complexity is only linear in the number of subcarriers. © 2011 IEEE.

Yang P.,China Academy of Telecommunication Research of MIIT | Bao X.,Chongqing University | Zhao H.,Chongqing University
Proceedings - 2013 Wireless and Optical Communications Conference, WOCC 2013 | Year: 2013

In this paper, we propose an algorithm for removing short-cycles in Quasi-Cyclic (QC) Low-density parity-check (LDPC) codes. First using an algorithm with lower computational complexity, all the cycles in the parity check matrix H are found. Then following a ruler, we adjust the shift value of circulant permutation matrix (CPM) to remove the short-cycles. This algorithm could ensure that the code after cycle removal process preserves the quasi-cyclic structure. Simulation results show that: comparing with the codes (504,252) and (1008, 504), we achieve 0.1dB improvement both. © 2013 IEEE.

Liu Y.,Security First | Feng S.,China Academy of Telecommunication Research of MIIT
Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014 | Year: 2015

Lots of wireless devices, like mobile phones or RFID tags, could be traced by an adversary. Therefore, privacy-preserving authentication protocols prevail recently. To improve the efficiency, several protocols have been proposed, like tree-based, group-based or key-shared protocols. However, most of these protocols are vulnerable to compromise attacks, resynchronization attacks or traceability. This paper presents a scalable privacy-preserving authentication protocol using hash functions. In the proposed protocol, the authentication server could find out the identifier of a device in constant time irrespective of the total number of devices. In addition, each authentication parameter is changed in every new authentication process to avoid tracing. Also, a challenge-response approach is performed to overcome cloning and replay attacks. Furthermore, the proposed protocol is secure against compromise attacks, resynchronization attacks and other common attacks. © 2014 IEEE.

Loading China Academy of Telecommunication Research of MIIT collaborators
Loading China Academy of Telecommunication Research of MIIT collaborators