Entity

Time filter

Source Type


Guo R.,Institute of North Electronic Equipment
Proceedings of the 2012 2nd International Conference on Instrumentation and Measurement, Computer, Communication and Control, IMCCC 2012 | Year: 2012

With the popularity of social network, the study of information spreading in network has become an important issue. The information spreading ability is different between different topology network. In this paper, through evaluate influence of nodes the social network model is proposed. The process of information spread is introduced by defining social influence, and social network information dissemination process is discussed also based on different model. © 2012 IEEE. Source


Pan J.,Lanzhou University | Lan W.,Lanzhou University | Liu H.,Institute of North Electronic Equipment | Sheng Y.,Lanzhou University | And 3 more authors.
Journal of Materials Science: Materials in Electronics | Year: 2014

N-doped CuAlO2 films were prepared by RF magnetron sputtering on quartz substrates using N2O as the N source. N concentration in the films is detected by Auger electron spectroscopy in detail, which confirms that N is indeed incorporated into the films. The optical and electrical properties of transparent conductive N-doped CuAlO2 films are modulated by the N2O flow ratio in sputtering gas. The N-doped films have a visible transmittance of 60-70 % and a high infrared transmittance of ~85 %. The film deposited by using 15 % N2O flow ratio with the optimal crystalline is provided with a conductivity of 3.75 × 10-2 S cm -1 at room temperature, which improves over one order of magnitude compared with the undoped film. The enhanced conductive property is mainly originated from the ionization of acceptor impurities. © 2014 Springer Science+Business Media New York. Source


Chen T.,University of Electronic Science and Technology of China | Zhang X.-S.,University of Electronic Science and Technology of China | Guo S.-Z.,Institute of North Electronic Equipment | Li H.-Y.,University of Electronic Science and Technology of China | Wu Y.,University of Electronic Science and Technology of China
Future Generation Computer Systems | Year: 2013

Dynamic symbolic execution for automated test generation consists of instrumenting and running a program while collecting path constraint on inputs from predicates encountered in branch instructions, and of deriving new inputs from a previous path constraint by an SMT (Satisfiability Modulo Theories) solver in order to steer next executions toward new program paths. It has been introduced into several applications, such as automated test generation, automated filter generation and malware analysis mainly for its two intrinsic properties: low false positives and high code-coverage. In this paper, we focus on the topics that are closely related to automated test generation. Our contributions are five-fold. First, we summarize the theoretical foundation of dynamic symbolic execution. Second, we highlight the challenges when turning ideas into reality. Besides, we describe the state-of-the-art solutions including advantages and disadvantages for those challenges. In addition, twelve typical tools are analyzed and many properties of those tools are censused. Finally, we outline the prospects of this research field in detail. © 2012 Elsevier B.V. All rights reserved. Source


Zhang Y.,National University of Defense Technology | Wang S.,Institute of North Electronic Equipment | Li J.,National University of Defense Technology
Journal of Systems Engineering and Electronics | Year: 2016

This paper improves the resampling step of particle filtering (PF) based on a broad interactive genetic algorithm to resolve particle degeneration and particle shortage. For target tracking in image processing, this paper uses the information coming from the particles of the previous fame image and new observation data to self-adaptively determine the selecting range of particles in current fame image. The improved selecting operator with jam gene is used to ensure the diversity of particles in mathematics, and the absolute arithmetical crossing operator whose feasible solution space being close about crossing operation, and non-uniform mutation operator is used to capture all kinds of mutation in this paper. The result of simulating experiment shows that the algorithm of this paper has better iterative estimating capability than extended Kalman filtering (EKF), PF, regularized partide filtering (RPF), and genetic algorithm (GA)-PF. © 2016 Beijing Institute of Aerospace Information. Source


Zhao X.,Ordnance Engineering College | Zhang F.,University of Connecticut | Guo S.,Institute of North Electronic Equipment | Wang T.,Ordnance Engineering College | And 3 more authors.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

Algebraic side-channel attack (ASCA) is a powerful cryptanalysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the first time, we show that ASCA can exploit cache leakage models. We analyze the attacks and estimate the minimal amount of leakages required for a successful ASCA on AES under different leakage models. In addition, we apply MDASCA to attack AES on an 8-bit microcontroller under Hamming weight leakage model, on two typical microprocessors under access driven cache leakage model, and on a 32-bit ARM microprocessor under trace driven cache leakage model. Many better results are achieved compared to the previous work. The results are also consistent with the theoretical analysis. Our work shows that MDASCA poses great threats with its excellence in error tolerance and new leakage model exploitation. © 2012 Springer-Verlag. Source

Discover hidden collaborations