首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net 基于Petri网的无线传感器网络安全协议的形式化证明
Yingjiu Guo, Xuemei Liu, Xiufeng Shao
In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.
本文采用安全Petri网模型对无线传感器网络领域的安全协议进行形式化证明。分析的结果是发现了中间人攻击,并提出了协议的改进版本。结果表明,安全Petri网模型是证明安全协议安全性的一种简单有效的方法。
{"title":"Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net","authors":"Yingjiu Guo, Xuemei Liu, Xiufeng Shao","doi":"10.1109/CIS.2013.146","DOIUrl":"https://doi.org/10.1109/CIS.2013.146","url":null,"abstract":"In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Image Matching Algorithm Based on SIFT and Improved LTP 基于SIFT和改进LTP的图像匹配算法
Yi-Ming Liu, Lifang Chen, Yuan Liu, Hao-Tian Wu
SIFT is one of the most robust and widely used image matching algorithms based on local features. But the key-points descriptor of SIFT algorithm have 128 dimensions. Aiming to the problem of its high dimension and complexity, a novel image matching algorithm is proposed. The descriptors of SIFT key-points are constructed by the rotation invariant LTP, city-block distance is also employed to reduce calculation of key-points matching. The experiment is achieved through different lighting, blur changes and rotation of images, the results show that this method can reduce the processing time and raise image matching efficiency.
SIFT是一种鲁棒性最好、应用最广泛的基于局部特征的图像匹配算法。而SIFT算法的关键点描述符有128维。针对图像匹配的高维数和复杂度问题,提出了一种新的图像匹配算法。SIFT的关键点描述符由旋转不变量LTP构造,并采用城市街区距离来减少关键点匹配的计算。实验通过不同的光照、模糊变化和图像旋转来实现,结果表明该方法可以减少处理时间,提高图像匹配效率。
{"title":"An Image Matching Algorithm Based on SIFT and Improved LTP","authors":"Yi-Ming Liu, Lifang Chen, Yuan Liu, Hao-Tian Wu","doi":"10.1109/CIS.2013.98","DOIUrl":"https://doi.org/10.1109/CIS.2013.98","url":null,"abstract":"SIFT is one of the most robust and widely used image matching algorithms based on local features. But the key-points descriptor of SIFT algorithm have 128 dimensions. Aiming to the problem of its high dimension and complexity, a novel image matching algorithm is proposed. The descriptors of SIFT key-points are constructed by the rotation invariant LTP, city-block distance is also employed to reduce calculation of key-points matching. The experiment is achieved through different lighting, blur changes and rotation of images, the results show that this method can reduce the processing time and raise image matching efficiency.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors 基于神经元- mos晶体管的差分边触发触发器
G. Hang, Xiaohui Hu, Hongli Zhu, X. You
Novel differential flip-flops using neuron-MOS transistors are presented, including single edge-triggered flipflop and double edge-triggered flip-flop. In the new differential flip-flops, a pair of n-channel multiple-input neuron-MOS pull down logic networks is used to replace the nMOS logic tree in the conventional differential flip-flops. The construction of the circuits has been simplified by employing the multiple-input neuron-MOS transistors. HSPICE simulations using TSMC 0.35μm 2-ploy 4-metal CMOS technology have verified the effectiveness of the proposed design scheme. The simulated results of propagation delay and power dissipation are also given.
提出了基于神经元- mos晶体管的新型差分触发器,包括单沿触发触发器和双沿触发触发器。在新型差分触发器中,采用一对n通道多输入神经元- mos下拉逻辑网络来取代传统差分触发器中的nMOS逻辑树。采用多输入神经元- mos晶体管简化了电路的结构。采用台积电0.35μm 2-ploy 4金属CMOS技术进行HSPICE仿真,验证了该设计方案的有效性。给出了传输延迟和功耗的仿真结果。
{"title":"Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors","authors":"G. Hang, Xiaohui Hu, Hongli Zhu, X. You","doi":"10.1109/CIS.2013.73","DOIUrl":"https://doi.org/10.1109/CIS.2013.73","url":null,"abstract":"Novel differential flip-flops using neuron-MOS transistors are presented, including single edge-triggered flipflop and double edge-triggered flip-flop. In the new differential flip-flops, a pair of n-channel multiple-input neuron-MOS pull down logic networks is used to replace the nMOS logic tree in the conventional differential flip-flops. The construction of the circuits has been simplified by employing the multiple-input neuron-MOS transistors. HSPICE simulations using TSMC 0.35μm 2-ploy 4-metal CMOS technology have verified the effectiveness of the proposed design scheme. The simulated results of propagation delay and power dissipation are also given.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133444437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chinese Discourse Relation Recognition Using Parallel Corpus 基于平行语料库的汉语篇章关系识别
Yifeng Xu, Yunfang Wu
Though an important task in natural language processing, discourse relation recognition has not until recently received as much attention as it deserves, maybe due to its complexity. In Chinese, discourse relations are mostly implicit, making the task even harder. There are more explicit discourse relations in English than Chinese. In this paper, we propose a new approach to Chinese discourse relation recognition, which utilizes English-Chinese alignment corpus to discover implicit Chinese discourse relations. Results show our method achieves 60% accuracy in argument detection and 40% accuracy in discourse relation recognition.
语篇关系识别虽然是自然语言处理中的一项重要任务,但可能由于其复杂性,直到最近才得到应有的重视。在汉语中,话语关系大多是隐含的,这使得任务更加困难。英语的显性语篇关系多于汉语。本文提出了一种新的汉语语篇关系识别方法,即利用英汉对齐语料库来发现隐含的汉语语篇关系。结果表明,该方法的论点检测准确率达到60%,话语关系识别准确率达到40%。
{"title":"Chinese Discourse Relation Recognition Using Parallel Corpus","authors":"Yifeng Xu, Yunfang Wu","doi":"10.1109/CIS.2013.96","DOIUrl":"https://doi.org/10.1109/CIS.2013.96","url":null,"abstract":"Though an important task in natural language processing, discourse relation recognition has not until recently received as much attention as it deserves, maybe due to its complexity. In Chinese, discourse relations are mostly implicit, making the task even harder. There are more explicit discourse relations in English than Chinese. In this paper, we propose a new approach to Chinese discourse relation recognition, which utilizes English-Chinese alignment corpus to discover implicit Chinese discourse relations. Results show our method achieves 60% accuracy in argument detection and 40% accuracy in discourse relation recognition.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125180581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card 银行IC卡中3DES密码引擎故障攻击的有效对策
Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo
As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus considerable countermeasures are involved to meet the overall requirements and facilitate the intended application for bank IC cards. In this paper, countermeasures against fault attacks for 3DES (Triple Data Encryption Algorithm) which is one of the widely used block ciphers in the bank IC cards are designed and implemented. Those countermeasures in our paper are based on the symmetry structure of DES block and we try to dig the efficiency in it. The basic countermeasure reduces the time latency from 100% to 1/n × 100% for n round block cipher. On the basis of this, an optimized countermeasure lowers the redundancy rate from 1/4 to 1/16. Another optimization reduces the area cost of duplication than the second method, which has the same latency. The countermeasures are designed for the 3DES algorithm in RTL level, implemented and verified in FPGA board. The fault attack platform successfully injected clock glitch into the DES engine and demonstrated the validity of the countermeasure. Over 1000 3DES calculations are tested and the successful detection rate is 100%.
随着芯片银行IC卡的广泛应用,其安全性变得越来越重要。故障攻击的目的是在计算过程中向芯片注入故障,是对芯片信息安全的严重威胁。因此,需要采取相当多的对策来满足总体要求并促进银行IC卡的预期应用。本文设计并实现了针对银行IC卡中应用最广泛的分组密码之一3DES (Triple Data Encryption Algorithm)的故障攻击对策。本文的对策都是基于DES块的对称结构,并试图挖掘其效率。基本对策将n轮分组密码的时间延迟从100%降低到1/n × 100%。在此基础上,优化对策将冗余率从1/4降低到1/16。另一种优化比第二种方法减少了重复的面积成本,后者具有相同的延迟。针对RTL级的3DES算法设计了相应的对策,并在FPGA板上进行了实现和验证。故障攻击平台成功地将时钟故障注入到DES引擎中,验证了对策的有效性。测试了1000多个3DES计算,成功检出率为100%。
{"title":"Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card","authors":"Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo","doi":"10.1109/CIS.2013.159","DOIUrl":"https://doi.org/10.1109/CIS.2013.159","url":null,"abstract":"As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus considerable countermeasures are involved to meet the overall requirements and facilitate the intended application for bank IC cards. In this paper, countermeasures against fault attacks for 3DES (Triple Data Encryption Algorithm) which is one of the widely used block ciphers in the bank IC cards are designed and implemented. Those countermeasures in our paper are based on the symmetry structure of DES block and we try to dig the efficiency in it. The basic countermeasure reduces the time latency from 100% to 1/n × 100% for n round block cipher. On the basis of this, an optimized countermeasure lowers the redundancy rate from 1/4 to 1/16. Another optimization reduces the area cost of duplication than the second method, which has the same latency. The countermeasures are designed for the 3DES algorithm in RTL level, implemented and verified in FPGA board. The fault attack platform successfully injected clock glitch into the DES engine and demonstrated the validity of the countermeasure. Over 1000 3DES calculations are tested and the successful detection rate is 100%.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FENOC: An Ensemble One-Class Learning Framework for Malware Detection FENOC:一个集成的一类恶意软件检测学习框架
Jiachen Liu, Jianfeng Song, Qiguang Miao, Ying Cao
Nowadays, machine learning based methods are among the most popular ones for malware detection. However, most of the previous works use a single type of features, dynamic or static, and take them to build a binary classification model. These methods have limited ability to depict characteristic malware behaviors and suffer from insufficiently sampled benign samples and extremely imbalanced training dataset. In this paper, we present FENOC, an ensemble one-class learning framework for malware detection. FENOC uses hybrid features from multiple semantic layers to ensure comprehensive insights of analyzed programs, and constructs detection model via CosTOC (Cost-sensitive Twin One-class Classifier), a novel one-class learning algorithm, which uses a pair of one-class classifiers to describe malware class and benign program class respectively. CosTOC is more flexible and robust when handling malware detection problems, which is imbalanced and need low false positive rate. Meanwhile, a random subspace ensemble method is used to enhance the generalization ability of CosTOC. Experimental results show that to detect unknown malware, FENOC has a higher detection rate and a lower false positive rate, especially in the situations that training datasets are imbalanced.
如今,基于机器学习的方法是最流行的恶意软件检测方法之一。然而,以往的工作大多是使用单一类型的特征,动态的或静态的,并以此来构建一个二元分类模型。这些方法描述恶意软件特征行为的能力有限,并且存在良性样本采样不足和训练数据极不平衡的问题。本文提出了一种用于恶意软件检测的集成单类学习框架FENOC。FENOC利用来自多个语义层的混合特征来确保对被分析程序的全面洞察,并通过一种新的单类学习算法CosTOC (Cost-sensitive Twin One-class Classifier)构建检测模型,该算法使用一对单类分类器分别描述恶意程序类和良性程序类。CosTOC在处理恶意软件检测问题时更灵活,鲁棒性更强,具有不平衡性和低误报率的特点。同时,采用随机子空间集成方法增强了CosTOC的泛化能力。实验结果表明,在检测未知恶意软件时,FENOC具有较高的检测率和较低的误报率,特别是在训练数据集不平衡的情况下。
{"title":"FENOC: An Ensemble One-Class Learning Framework for Malware Detection","authors":"Jiachen Liu, Jianfeng Song, Qiguang Miao, Ying Cao","doi":"10.1109/CIS.2013.116","DOIUrl":"https://doi.org/10.1109/CIS.2013.116","url":null,"abstract":"Nowadays, machine learning based methods are among the most popular ones for malware detection. However, most of the previous works use a single type of features, dynamic or static, and take them to build a binary classification model. These methods have limited ability to depict characteristic malware behaviors and suffer from insufficiently sampled benign samples and extremely imbalanced training dataset. In this paper, we present FENOC, an ensemble one-class learning framework for malware detection. FENOC uses hybrid features from multiple semantic layers to ensure comprehensive insights of analyzed programs, and constructs detection model via CosTOC (Cost-sensitive Twin One-class Classifier), a novel one-class learning algorithm, which uses a pair of one-class classifiers to describe malware class and benign program class respectively. CosTOC is more flexible and robust when handling malware detection problems, which is imbalanced and need low false positive rate. Meanwhile, a random subspace ensemble method is used to enhance the generalization ability of CosTOC. Experimental results show that to detect unknown malware, FENOC has a higher detection rate and a lower false positive rate, especially in the situations that training datasets are imbalanced.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems 线性双层规划问题的两种变异策略微分演化
Hong Li, Li Zhang
An improved constraint handling technique based on a comparison mechanism is presented, and then it is combined with selection operator in differential evolution to fulfill constraint handling and selection simultaneously. A differential evolution with two mutation strategies based on this new constraint handling technique is developed to solve the linear bilevel programming problems. The simulation results show that the proposed algorithm can find global optimal solutions with less computation burden.
提出了一种改进的基于比较机制的约束处理技术,并将其与差分进化中的选择算子相结合,实现约束处理和选择同时进行。基于这种新的约束处理技术,提出了一种具有两种突变策略的微分进化方法来解决线性双层规划问题。仿真结果表明,该算法能够以较小的计算量找到全局最优解。
{"title":"A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems","authors":"Hong Li, Li Zhang","doi":"10.1109/CIS.2013.19","DOIUrl":"https://doi.org/10.1109/CIS.2013.19","url":null,"abstract":"An improved constraint handling technique based on a comparison mechanism is presented, and then it is combined with selection operator in differential evolution to fulfill constraint handling and selection simultaneously. A differential evolution with two mutation strategies based on this new constraint handling technique is developed to solve the linear bilevel programming problems. The simulation results show that the proposed algorithm can find global optimal solutions with less computation burden.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121596881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System 基于混沌贝克映射和洛伦兹系统的对称图像加密方案
Chong Fu, Wenjun Li, Zhao-yu Meng, Tao Wang, Pei-Xuan Li
Chaos-based image encryption techniques have recently been extensively studied due to their superior properties in efficiency. However, many of the proposed schemes suffer from known/chosen plaintext attacks as the key stream used in diffusion stage is usually solely determined by the key. This paper suggests a chaos-based symmetric image cipher with a plaintext-related key stream generation mechanism. In the diffusion stage, the state variables of Lorenz system are selected according to the plain pixel. As a result, the quantified key stream is related to both the key and the plain image, which makes known/chosen plaintext attack practically infeasible. Moreover, compared with 1D chaotic maps that commonly employed in existing ciphers, the Lorenz system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security tests are carried out with detailed analysis, demonstrating the high security of the new scheme.
基于混沌的图像加密技术由于其优越的效率,近年来得到了广泛的研究。然而,由于扩散阶段使用的密钥流通常仅由密钥决定,因此许多提出的方案遭受已知/选择明文攻击。提出了一种基于混沌的对称图像密码,该密码具有与明文相关的密钥流生成机制。在扩散阶段,根据平面像素选择洛伦兹系统的状态变量。因此,量化的密钥流既与密钥相关,也与明文图像相关,这使得已知/选择明文攻击实际上是不可行的。此外,与现有密码中常用的一维混沌映射相比,Lorenz系统具有更复杂的动态特性和更多的状态变量,进一步提高了密码系统的安全性。进行了全面的安全测试,并进行了详细的分析,证明了新方案的高安全性。
{"title":"A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System","authors":"Chong Fu, Wenjun Li, Zhao-yu Meng, Tao Wang, Pei-Xuan Li","doi":"10.1109/CIS.2013.158","DOIUrl":"https://doi.org/10.1109/CIS.2013.158","url":null,"abstract":"Chaos-based image encryption techniques have recently been extensively studied due to their superior properties in efficiency. However, many of the proposed schemes suffer from known/chosen plaintext attacks as the key stream used in diffusion stage is usually solely determined by the key. This paper suggests a chaos-based symmetric image cipher with a plaintext-related key stream generation mechanism. In the diffusion stage, the state variables of Lorenz system are selected according to the plain pixel. As a result, the quantified key stream is related to both the key and the plain image, which makes known/chosen plaintext attack practically infeasible. Moreover, compared with 1D chaotic maps that commonly employed in existing ciphers, the Lorenz system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security tests are carried out with detailed analysis, demonstrating the high security of the new scheme.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Efficient Genetic Algorithm for Interval Linear Bilevel Programming Problems 区间线性双层规划问题的一种高效遗传算法
Hecheng Li, Lei Fang
This paper deals with a class of interval linear bilevel programming problems, in which some or all of the leader's and follower's objective function coefficients are specified in terms of intervals. The focus of solving this class of problems is on determining the optimal value range when different coefficients of objectives are taken in intervals given. In order to obtain the best and the worst optimal solutions to this class of problems, an efficient genetic algorithm is developed. Firstly, the objective coefficients of the lower level are encoded as individuals using real coding scheme, and the relative intervals are taken as the search space of the genetic algorithm. Secondly, for each encoded individual, a simplified interval linear bilevel program is obtained, in which interval coefficients are simply in the upper level objective function. Finally, the simplified problem is further divided into two linear bilevel programs without interval coefficients and solved by using the optimality theory of linear programming. The optimal values are taken as fitness values, by which the best and the worst optimal solutions can be obtained. In order to illustrate the efficiency of the proposed algorithm, two examples are solved and the results show that the algorithm is feasible and robust.
本文研究一类区间线性双层规划问题,其中领导者和追随者的部分或全部目标函数系数用区间表示。求解这类问题的重点是在给定的区间内取不同目标系数时,确定最优取值范围。为了得到这类问题的最优解和最差最优解,提出了一种高效的遗传算法。首先,采用实数编码方案将下层客观系数编码为个体,并以相对区间作为遗传算法的搜索空间;其次,对于每个编码个体,得到一个简化的区间线性双层规划,其中区间系数简单地表示为上层目标函数;最后,将简化后的问题进一步分解为两个不带区间系数的线性双层规划,利用线性规划的最优性理论进行求解。将最优值作为适应度值,得到最佳和最差最优解。为了说明所提算法的有效性,算例表明了该算法的可行性和鲁棒性。
{"title":"An Efficient Genetic Algorithm for Interval Linear Bilevel Programming Problems","authors":"Hecheng Li, Lei Fang","doi":"10.1109/CIS.2013.16","DOIUrl":"https://doi.org/10.1109/CIS.2013.16","url":null,"abstract":"This paper deals with a class of interval linear bilevel programming problems, in which some or all of the leader's and follower's objective function coefficients are specified in terms of intervals. The focus of solving this class of problems is on determining the optimal value range when different coefficients of objectives are taken in intervals given. In order to obtain the best and the worst optimal solutions to this class of problems, an efficient genetic algorithm is developed. Firstly, the objective coefficients of the lower level are encoded as individuals using real coding scheme, and the relative intervals are taken as the search space of the genetic algorithm. Secondly, for each encoded individual, a simplified interval linear bilevel program is obtained, in which interval coefficients are simply in the upper level objective function. Finally, the simplified problem is further divided into two linear bilevel programs without interval coefficients and solved by using the optimality theory of linear programming. The optimal values are taken as fitness values, by which the best and the worst optimal solutions can be obtained. In order to illustrate the efficiency of the proposed algorithm, two examples are solved and the results show that the algorithm is feasible and robust.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on Pseudorandomness of Some Pseudorandom Number Generators with Application 几种伪随机数生成器的伪随机性及其应用研究
L. Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang
Pseudo random numbers are important in various applications. Pseudo random number generators (PRNGs) have been used widely to provide ideal pseudo random number generating sources. Recently the researches on chaos-based PRNGs have also attracted much attention. Based on Li-York's chaotic map criteria, this paper introduces a novel piecewise linear chaotic map (PLCM). Combining the PLCM with the logistic map designs a chaotic PRNG (CPRNG). Using the FIPS 140-2 test suit tests the randomness of two 1000 key streams consisting of 20000 bits and 220 bits, respectively. The results show that for the 1000 key streams consisting of 20000 bits, the statistical properties of the randomness of the sequences generated via the CPRNG and an m-sequence PRNG do not have significant differences. As applications, image encryption examples via the CPRNG and the m-Sequence based PRNG are given.
伪随机数在各种应用中都很重要。伪随机数发生器(prng)作为一种理想的伪随机数生成源得到了广泛的应用。近年来,基于混沌的prng的研究也备受关注。基于Li-York混沌映射准则,提出一种新的分段线性混沌映射(PLCM)。将PLCM与logistic映射相结合,设计了一种混沌PRNG (CPRNG)。使用FIPS 140-2测试套装分别测试由20000位和220位组成的两个1000个密钥流的随机性。结果表明,对于由20000位组成的1000个密钥流,CPRNG和m序列PRNG生成的序列的随机性统计特性没有显著差异。作为应用,给出了基于CPRNG和基于m序列的PRNG的图像加密实例。
{"title":"Study on Pseudorandomness of Some Pseudorandom Number Generators with Application","authors":"L. Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang","doi":"10.1109/CIS.2013.126","DOIUrl":"https://doi.org/10.1109/CIS.2013.126","url":null,"abstract":"Pseudo random numbers are important in various applications. Pseudo random number generators (PRNGs) have been used widely to provide ideal pseudo random number generating sources. Recently the researches on chaos-based PRNGs have also attracted much attention. Based on Li-York's chaotic map criteria, this paper introduces a novel piecewise linear chaotic map (PLCM). Combining the PLCM with the logistic map designs a chaotic PRNG (CPRNG). Using the FIPS 140-2 test suit tests the randomness of two 1000 key streams consisting of 20000 bits and 220 bits, respectively. The results show that for the 1000 key streams consisting of 20000 bits, the statistical properties of the randomness of the sequences generated via the CPRNG and an m-sequence PRNG do not have significant differences. As applications, image encryption examples via the CPRNG and the m-Sequence based PRNG are given.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"14 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1