Entity

Time filter

Source Type


Wang J.,Tongji University | Chen B.,Tongji University | Chen B.,The 3rd Research Institute of Ministry of Public Security | Tan C.X.,Tongji University
Advanced Materials Research | Year: 2013

This paper presents an algorithm of network topology discovery based on OSPF protocol and introduces the implementation. It is different than the traditional topology discovery algorithms which are mostly based on SNMP and ICMP protocols. The test results show that it has made an efficient and useful solution to network topology discovery. © (2013) Trans Tech Publications, Switzerland. Source


Hong G.,A+ Network | Yin Z.,The 3rd Research Institute of Ministry of Public Security
Advanced Materials Research | Year: 2013

With the rapid development of digital multimedia technology, digital signal processing increased the potential for economically and efficiently editing and manipulating recorded audio material, which reduced the reliability of the audio evidence. This paper discusses the "authenticity" of audio forensic, analyzes several major methods of audio authenticity identification, and finally prospects the future direction of audio authenticity identification. © (2013) Trans Tech Publications, Switzerland. Source


Jiang F.,Shanghai University | Jia L.,The 3rd Research Institute of Ministry of Public Security | Sheng X.,Tongji University | Sheng X.,The 3rd Research Institute of Ministry of Public Security | LeMieux R.,Kansas State University
Neural Computing and Applications | Year: 2015

Structured output prediction aims to learn a predictor to predict a structured output from a input data vector. The structured outputs include vector, tree, sequence, etc. We usually assume that we have a training set of input–output pairs to train the predictor. However, in many real-world applications, it is difficult to obtain the output for a input, and thus for many training input data points, the structured outputs are missing. In this paper, we discuss how to learn from a training set composed of some input–output pairs and some input data points without outputs. This problem is called semi-supervised structured output prediction. We propose a novel method for this problem by constructing a nearest neighbor graph from the input space to present the manifold structure and use it to regularize the structured output space directly. We define a slack structured output for each training data point and propose to predict it by learning a structured output predictor. The learning of both slack structured outputs and the predictor are unified within one single minimization problem. In this problem, we propose to minimize the structured loss between the slack structured outputs of neighboring data points and the prediction error measured by the structured loss. The problem is optimized by an iterative algorithm. Experiment results over three benchmark data sets show its advantage. © 2015 The Natural Computing Applications Forum Source


Chen B.,The 3rd Research Institute of Ministry of Public Security | Chen B.,Tongji University | Dai Y.,The 3rd Research Institute of Ministry of Public Security | Jin B.,The 3rd Research Institute of Ministry of Public Security | And 2 more authors.
Journal of Convergence Information Technology | Year: 2011

With the rapid development of the Internet of Things, the personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. Thus, the paper presents the comprehensive electronic identity security system of the Internet of Things to achieve the efficient security administration of the personal network identities, and designs the implementation framework of the strong and pervasive security system, and discusses the key technology including security authentication for electronic identity cards, super high frequency RFID with IC cards, and security isolation and single-oriented transmission, and it can broadly apply to the personal identity management with virtual roles of citizens in all kinds of circumstances of the Internet of Things such as E-Government and E-Business, and the electronic identity security system has been primary implemented and achieved good effects in actual applications. Source


Chen B.,The 3rd Research Institute of Ministry of Public Security | Chen B.,A+ Network | Chen B.,Tongji University | Tan C.,Tongji University | And 3 more authors.
Journal of Networks | Year: 2012

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyber personal identity, and designs and realizes a strong and pervasive security cloud service platform, and discusses key technology including security authentication mechanism for the electronic identity card, super high frequency RFID with eID cards, multilevel privacy protection mechanism, security cloud service, security isolation and single-oriented transmission, and boundary security gateway protection, and it can well apply to personal identity management with virtual roles of citizens in cyberspace such as E-Government and E-Business, and the electronic identity security platform has been primary implemented and achieved good effects in actual applications. © 2012 ACADEMY PUBLISHER. Source

Discover hidden collaborations