首页 > 最新文献

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences最新文献

英文 中文
Dataset Distillation Using Parameter Pruning 使用参数修剪的数据集蒸馏
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eal2053
Guang LI, Ren TOGO, Takahiro OGAWA, Miki HASEYAMA
In this study, we propose a novel dataset distillation method based on parameter pruning. The proposed method can synthesize more robust distilled datasets and improve distillation performance by pruning difficult-to-match parameters during the distillation process. Experimental results on two benchmark datasets show the superiority of the proposed method.
在这项研究中,我们提出了一种新的基于参数修剪的数据集蒸馏方法。该方法通过对蒸馏过程中难以匹配的参数进行修剪,可以合成更鲁棒的蒸馏数据集,提高蒸馏性能。在两个基准数据集上的实验结果表明了该方法的优越性。
{"title":"Dataset Distillation Using Parameter Pruning","authors":"Guang LI, Ren TOGO, Takahiro OGAWA, Miki HASEYAMA","doi":"10.1587/transfun.2023eal2053","DOIUrl":"https://doi.org/10.1587/transfun.2023eal2053","url":null,"abstract":"In this study, we propose a novel dataset distillation method based on parameter pruning. The proposed method can synthesize more robust distilled datasets and improve distillation performance by pruning difficult-to-match parameters during the distillation process. Experimental results on two benchmark datasets show the superiority of the proposed method.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134889656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of parasitic elements on L-type LC/CL matching circuits 寄生元件对l型LC/CL匹配电路的影响
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023gcp0004
Satoshi Tanaka, Takeshi Yoshida, Minoru Fujishima
L-type LC/CL matching circuits are well known for their simple analytical solutions and have been applied to many radio-frequency (RF) circuits. When actually constructing a circuit, parasitic elements are added to inductors and capacitors. Therefore, each L and C element has a self-resonant frequency, which affects the characteristics of the matching circuit. In this paper, the parallel parasitic capacitance to the inductor and the series parasitic inductor to the capacitance are taken up as parasitic elements, and the details of the effects of the self-resonant frequency of each element on the S11, voltage standing wave ratio (VSWR) and S21 characteristics are reported. When a parasitic element is added, each characteristic basically tends to deteriorate as the self-resonant frequency decreases. However, as an interesting feature, we found that the combination of resonant frequencies determines the VSWR and passband characteristics, regardless of whether it is the inductor or the capacitor.
l型LC/CL匹配电路以其简单的解析解而闻名,并已应用于许多射频(RF)电路中。当实际构造电路时,寄生元件被添加到电感和电容器中。因此,每个L和C元件都有一个自谐振频率,影响匹配电路的特性。本文以电感并联寄生电容和电感串联寄生电容为寄生元件,详细报道了各元件的自谐振频率对S11、电压驻波比(VSWR)和S21特性的影响。当加入寄生元件时,随着自谐振频率的降低,各特性基本趋于恶化。然而,作为一个有趣的特征,我们发现谐振频率的组合决定了VSWR和通带特性,无论是电感还是电容。
{"title":"Effects of parasitic elements on L-type LC/CL matching circuits","authors":"Satoshi Tanaka, Takeshi Yoshida, Minoru Fujishima","doi":"10.1587/transfun.2023gcp0004","DOIUrl":"https://doi.org/10.1587/transfun.2023gcp0004","url":null,"abstract":"L-type LC/CL matching circuits are well known for their simple analytical solutions and have been applied to many radio-frequency (RF) circuits. When actually constructing a circuit, parasitic elements are added to inductors and capacitors. Therefore, each L and C element has a self-resonant frequency, which affects the characteristics of the matching circuit. In this paper, the parallel parasitic capacitance to the inductor and the series parasitic inductor to the capacitance are taken up as parasitic elements, and the details of the effects of the self-resonant frequency of each element on the S11, voltage standing wave ratio (VSWR) and S21 characteristics are reported. When a parasitic element is added, each characteristic basically tends to deteriorate as the self-resonant frequency decreases. However, as an interesting feature, we found that the combination of resonant frequencies determines the VSWR and passband characteristics, regardless of whether it is the inductor or the capacitor.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135447067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Constructions of Cross Z-Complementary Pairs with new lengths 具有新长度的交叉z互补对的新结构
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eap1075
Longye WANG, Chunlin CHEN, Xiaoli ZENG, Houshan LIU, Lingguo KONG, Qingping YU, Qingsong WANG
Spatial modulation (SM) is a type of multiple-input multiple-output (MIMO) technology that provides several benefits over traditional MIMO systems. SM-MIMO is characterized by its unique transmission principle, which results in lower costs, enhanced spectrum utilization, and reduced inter-channel interference. To optimize channel estimation performance over frequency-selective channels in the spatial modulation system, cross Z-complementary pairs (CZCPs) have been proposed as training sequences. The zero correlation zone (ZCZ) properties of CZCPs for auto-correlation sums and cross-correlation sums enable them to achieve optimal channel estimation performance. In this paper, we systematically construct CZCPs based on binary Gary complementary pairs and binary Gary complementary pairs via Turyn's method. We employ a special matrix operation and concatenation method to obtain CZCPs with new lengths 2M + N and 2(M + L), where M and L are the lengths of binary GCP, and N is the length of binary GCP via Turyn's method. Further, we obtain the perfect CZCP with new length 4N and extend the lengths of CZCPs.
空间调制(SM)是一种多输入多输出(MIMO)技术,与传统的MIMO系统相比具有许多优点。SM-MIMO以其独特的传输原理为特点,降低了成本,提高了频谱利用率,减少了信道间干扰。为了优化空间调制系统在频率选择信道上的信道估计性能,提出了交叉z互补对(CZCPs)作为训练序列。对于自相关和互相关和,czcp的零相关区(ZCZ)特性使它们能够获得最佳的信道估计性能。本文利用Turyn方法系统地构造了基于二进制Gary互补对和二进制Gary互补对的czcp。我们采用特殊的矩阵运算和串接方法得到了新的长度为2M + N和2(M + L)的czcp,其中M和L为二进制GCP的长度,N为二进制GCP的长度。进一步,我们得到了新长度为4N的完美CZCP,并扩展了CZCP的长度。
{"title":"Novel Constructions of Cross Z-Complementary Pairs with new lengths","authors":"Longye WANG, Chunlin CHEN, Xiaoli ZENG, Houshan LIU, Lingguo KONG, Qingping YU, Qingsong WANG","doi":"10.1587/transfun.2023eap1075","DOIUrl":"https://doi.org/10.1587/transfun.2023eap1075","url":null,"abstract":"Spatial modulation (SM) is a type of multiple-input multiple-output (MIMO) technology that provides several benefits over traditional MIMO systems. SM-MIMO is characterized by its unique transmission principle, which results in lower costs, enhanced spectrum utilization, and reduced inter-channel interference. To optimize channel estimation performance over frequency-selective channels in the spatial modulation system, cross Z-complementary pairs (CZCPs) have been proposed as training sequences. The zero correlation zone (ZCZ) properties of CZCPs for auto-correlation sums and cross-correlation sums enable them to achieve optimal channel estimation performance. In this paper, we systematically construct CZCPs based on binary Gary complementary pairs and binary Gary complementary pairs via Turyn's method. We employ a special matrix operation and concatenation method to obtain CZCPs with new lengths 2M + N and 2(M + L), where M and L are the lengths of binary GCP, and N is the length of binary GCP via Turyn's method. Further, we obtain the perfect CZCP with new length 4N and extend the lengths of CZCPs.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136053322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of optimal ternary cyclic codes with minimum distance four 最小距离为4的两类最优三元循环码
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eal2055
Chao HE, Xiaoqiong RAN, Rong LUO
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Let C(t,e) denote the cyclic code with two nonzero αt and αe, where α is a generator of 𝔽*3m. In this letter, we investigate the ternary cyclic codes with parameters [3m-1, 3m-1-2m, 4] based on some results proposed by Ding and Helleseth in 2013. Two new classes of optimal ternary cyclic codes C(t,e) are presented by choosing the proper t and e and determining the solutions of certain equations over 𝔽3m.
循环码是线性码的一个子类,由于具有高效的编码和解码算法,因此在消费电子、数据存储系统和通信系统中都有应用。设C(t,e)表示具有两个非零αt和αe的循环码,其中α是一个生成函数。本文基于Ding和Helleseth在2013年提出的一些结果,研究了参数为[3m- 1,3m -1-2m, 4]的三元循环码。通过选择合适的t和e,确定𝔽3m上若干方程的解,给出了两类新的最优三元循环码C(t,e)。
{"title":"Two classes of optimal ternary cyclic codes with minimum distance four","authors":"Chao HE, Xiaoqiong RAN, Rong LUO","doi":"10.1587/transfun.2023eal2055","DOIUrl":"https://doi.org/10.1587/transfun.2023eal2055","url":null,"abstract":"Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Let C(t,e) denote the cyclic code with two nonzero αt and αe, where α is a generator of 𝔽*3m. In this letter, we investigate the ternary cyclic codes with parameters [3m-1, 3m-1-2m, 4] based on some results proposed by Ding and Helleseth in 2013. Two new classes of optimal ternary cyclic codes C(t,e) are presented by choosing the proper t and e and determining the solutions of certain equations over 𝔽3m.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136367970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Properties of <i>k</i>-bit Delay Decodable Codes &lt;i&gt;k&lt;/i&gt;-位延迟可解码码的性质
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023tap0016
Kengo HASHIMOTO, Ken-ichi IWATA
The class of k-bit delay decodable codes, source codes allowing decoding delay of at most k bits for k ≥ 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general properties of the class of k-bit delay decodable codes with a finite number of code tables and proves two theorems which enable us to limit the scope of codes to be considered when discussing optimal k-bit delay decodable codes.
k位延迟可解码码,即在k≥0时允许最多k位解码延迟的源代码,可以获得比霍夫曼码更短的平均码字长度。本文讨论了具有有限码表的k位延迟可解码码的一般性质,并证明了两个定理,使我们在讨论最优k位延迟可解码码时能够限制所考虑的码的范围。
{"title":"Properties of &lt;i&gt;k&lt;/i&gt;-bit Delay Decodable Codes","authors":"Kengo HASHIMOTO, Ken-ichi IWATA","doi":"10.1587/transfun.2023tap0016","DOIUrl":"https://doi.org/10.1587/transfun.2023tap0016","url":null,"abstract":"The class of k-bit delay decodable codes, source codes allowing decoding delay of at most k bits for k ≥ 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general properties of the class of k-bit delay decodable codes with a finite number of code tables and proves two theorems which enable us to limit the scope of codes to be considered when discussing optimal k-bit delay decodable codes.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134966845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Observation of Human-operated Accesses using Remote Management Device Honeypot 远程管理设备蜜罐对人工操作访问的观察
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023cip0018
Takayuki SASAKI, Mami KAWAGUCHI, Takuhiro KUMAGAI, Katsunari YOSHIOKA, Tsutomu MATSUMOTO
In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.
近年来,针对基础设施的网络攻击日益严重。不幸的是,据报道,基础设施具有易受攻击的远程管理设备,允许攻击者控制基础设施。针对基础设施的目标攻击是由人类攻击者手动执行的,而不是由自动化脚本执行的。在这里,有待解决的问题是针对此类基础设施的攻击发生的频率,以及攻击者在入侵后做了什么。在本实证研究中,我们使用定制的基础设施蜜罐来观察访问,包括攻击和安全调查活动。提议的蜜罐包括(1)一个可以轻松部署真实设备作为蜜罐的平台,(2)一个通过更改每个蜜罐实例在web上显示的设施名称来增加虚拟设施数量的机制,(3)一个与访问者的交互机制,以推断其目的,以及(4)跟踪机制,以识别长期活动的访问者。我们用了31个月的时间来实施和部署蜜罐。我们的蜜罐观察到关键操作,例如更改远程管理设备的配置。我们还观察到蜜罐的web和Telnet服务的长期访问。
{"title":"Observation of Human-operated Accesses using Remote Management Device Honeypot","authors":"Takayuki SASAKI, Mami KAWAGUCHI, Takuhiro KUMAGAI, Katsunari YOSHIOKA, Tsutomu MATSUMOTO","doi":"10.1587/transfun.2023cip0018","DOIUrl":"https://doi.org/10.1587/transfun.2023cip0018","url":null,"abstract":"In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Malware Classifier considering PE Section Information 考虑PE截面信息的集成恶意软件分类器
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023cip0024
Ren TAKEUCHI, Rikima MITSUHASHI, Masakatsu NISHIGAKI, Tetsushi OHKI
The war between cyber attackers and security analysts is gradually intensifying. Owing to the ease of obtaining and creating support tools, recent malware continues to diversify into variants and new species. This increases the burden on security analysts and hinders quick analysis. Identifying malware families is crucial for efficiently analyzing diversified malware; thus, numerous low-cost, general-purpose, deep-learning-based classification techniques have been proposed in recent years. Among these methods, malware images that represent binary features as images are often used. However, no models or architectures specific to malware classification have been proposed in previous studies. Herein, we conduct a detailed analysis of the behavior and structure of malware and focus on PE sections that capture the unique characteristics of malware. First, we validate the features of each PE section that can distinguish malware families. Then, we identify PE sections that contain adequate features to classify families. Further, we propose an ensemble learning-based classification method that combines features of highly discriminative PE sections to improve classification accuracy. The validation of two datasets confirms that the proposed method improves accuracy over the baseline, thereby emphasizing its importance.
网络攻击者和安全分析师之间的战争正在逐渐加剧。由于易于获取和创建支持工具,最近的恶意软件继续向变体和新物种多样化。这增加了安全分析人员的负担,阻碍了快速分析。识别恶意软件家族是有效分析各种恶意软件的关键;因此,近年来提出了许多低成本、通用、基于深度学习的分类技术。在这些方法中,经常使用将二进制特征表示为图像的恶意软件映像。然而,在以往的研究中,并没有提出针对恶意软件分类的模型或架构。在这里,我们对恶意软件的行为和结构进行了详细的分析,并专注于捕获恶意软件独特特征的PE部分。首先,我们验证了每个PE部分可以区分恶意软件家族的特征。然后,我们确定PE部分包含足够的特征来分类家庭。此外,我们提出了一种基于集成学习的分类方法,该方法结合了高判别性PE截面的特征来提高分类精度。两个数据集的验证证实了所提出的方法比基线提高了精度,从而强调了它的重要性。
{"title":"Ensemble Malware Classifier considering PE Section Information","authors":"Ren TAKEUCHI, Rikima MITSUHASHI, Masakatsu NISHIGAKI, Tetsushi OHKI","doi":"10.1587/transfun.2023cip0024","DOIUrl":"https://doi.org/10.1587/transfun.2023cip0024","url":null,"abstract":"The war between cyber attackers and security analysts is gradually intensifying. Owing to the ease of obtaining and creating support tools, recent malware continues to diversify into variants and new species. This increases the burden on security analysts and hinders quick analysis. Identifying malware families is crucial for efficiently analyzing diversified malware; thus, numerous low-cost, general-purpose, deep-learning-based classification techniques have been proposed in recent years. Among these methods, malware images that represent binary features as images are often used. However, no models or architectures specific to malware classification have been proposed in previous studies. Herein, we conduct a detailed analysis of the behavior and structure of malware and focus on PE sections that capture the unique characteristics of malware. First, we validate the features of each PE section that can distinguish malware families. Then, we identify PE sections that contain adequate features to classify families. Further, we propose an ensemble learning-based classification method that combines features of highly discriminative PE sections to improve classification accuracy. The validation of two datasets confirms that the proposed method improves accuracy over the baseline, thereby emphasizing its importance.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-quality Aware Incentive Mechanism based on Stackelberg Game in Mobile Edge Computing 移动边缘计算中基于Stackelberg博弈的数据质量感知激励机制
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eap1022
Shuyun LUO, Wushuang WANG, Yifei LI, Jian HOU, Lu ZHANG
Crowdsourcing becomes a popular data-collection method to relieve the burden of high cost and latency for data-gathering. Since the involved users in crowdsourcing are volunteers, need incentives to encourage them to provide data. However, the current incentive mechanisms mostly pay attention to the data quantity, while ignoring the data quality. In this paper, we design a Data-quality awaRe IncentiVe mEchanism (DRIVE) for collaborative tasks based on the Stackelberg game to motivate users with high quality, the highlight of which is the dynamic reward allocation scheme based on the proposed data quality evaluation method. In order to guarantee the data quality evaluation response in real-time, we introduce the mobile edge computing framework. Finally, one case study is given and its real-data experiments demonstrate the superior performance of DRIVE.
众包成为一种流行的数据收集方法,以减轻数据收集的高成本和延迟负担。由于参与众包的用户是志愿者,所以需要激励措施来鼓励他们提供数据。然而,目前的激励机制大多关注数据的数量,而忽略了数据的质量。本文设计了一种基于Stackelberg博弈的协同任务数据质量感知激励机制(data -quality awaRe IncentiVe mEchanism, DRIVE),以激励高质量用户,其中重点是基于所提出的数据质量评价方法的动态奖励分配方案。为了保证数据质量评估响应的实时性,我们引入了移动边缘计算框架。最后,给出了一个实例,其实际数据实验证明了DRIVE的优越性能。
{"title":"Data-quality Aware Incentive Mechanism based on Stackelberg Game in Mobile Edge Computing","authors":"Shuyun LUO, Wushuang WANG, Yifei LI, Jian HOU, Lu ZHANG","doi":"10.1587/transfun.2023eap1022","DOIUrl":"https://doi.org/10.1587/transfun.2023eap1022","url":null,"abstract":"Crowdsourcing becomes a popular data-collection method to relieve the burden of high cost and latency for data-gathering. Since the involved users in crowdsourcing are volunteers, need incentives to encourage them to provide data. However, the current incentive mechanisms mostly pay attention to the data quantity, while ignoring the data quality. In this paper, we design a Data-quality awaRe IncentiVe mEchanism (DRIVE) for collaborative tasks based on the Stackelberg game to motivate users with high quality, the highlight of which is the dynamic reward allocation scheme based on the proposed data quality evaluation method. In order to guarantee the data quality evaluation response in real-time, we introduce the mobile edge computing framework. Finally, one case study is given and its real-data experiments demonstrate the superior performance of DRIVE.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135404430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited 带关键字搜索的公钥认证加密的通用构造
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023cip0005
Keita EMURA
Public key authenticated encryption with keyword search (PAEKS) has been proposed, where a sender's secret key is required for encryption, and a trapdoor is associated with not only a keyword but also the sender. This setting allows us to prevent information leakage of keyword from trapdoors. Liu et al. (ASIACCS 2022) proposed a generic construction of PAEKS based on word-independent smooth projective hash functions (SPHFs) and PEKS. In this paper, we propose a new generic construction of PAEKS, which is more efficient than Liu et al.'s in the sense that we only use one SPHF, but Liu et al. used two SPHFs. In addition, for consistency we considered a security model that is stronger than Liu et al.'s. Briefly, Liu et al. considered only keywords even though a trapdoor is associated with not only a keyword but also a sender. Thus, a trapdoor associated with a sender should not work against ciphertexts generated by the secret key of another sender, even if the same keyword is associated. That is, in the previous definitions, there is room for a ciphertext to be searchable even though the sender was not specified when the trapdoor is generated, that violates the authenticity of PAKES. Our consistency definition considers a multi-sender setting and captures this case. In addition, for indistinguishability against chosen keyword attack (IND-CKA) and indistinguishability against inside keyword guessing attack (IND-IKGA), we use a stronger security model defined by Qin et al. (ProvSec 2021), where an adversary is allowed to query challenge keywords to the encryption and trapdoor oracles. We also highlight several issues associated with the Liu et al. construction in terms of hash functions, e.g., their construction does not satisfy the consistency that they claimed to hold.
提出了使用关键字搜索的公钥认证加密(PAEKS),其中加密需要发送方的秘密密钥,并且陷阱门不仅与关键字关联,而且与发送方关联。此设置可以防止活板门的关键字信息泄露。Liu等人(ASIACCS 2022)提出了一种基于词无关光滑投影哈希函数(SPHFs)和PEKS的泛型paek构造方法。在本文中,我们提出了一种新的泛型PAEKS结构,它比Liu等人的方法更高效,因为我们只使用了一个SPHF,而Liu等人使用了两个SPHF。此外,为了一致性,我们考虑了一个比Liu等人的更强的安全模型。简而言之,Liu等人只考虑关键字,尽管活板门不仅与关键字有关,而且与发送方有关。因此,与发送方关联的活板门不应该对由另一个发送方的密钥生成的密文起作用,即使关联了相同的关键字。也就是说,在前面的定义中,即使在生成陷阱门时没有指定发送方,也存在可搜索密文的空间,这违反了PAKES的真实性。我们的一致性定义考虑了多发送方设置并捕获了这种情况。此外,为了对所选关键字攻击(IND-CKA)和对内部关键字猜测攻击(IND-IKGA)的不可区分性,我们使用了秦等人(ProvSec 2021)定义的更强的安全模型,其中允许攻击者查询加密和陷阱门预言的挑战关键字。我们还强调了与Liu等人在哈希函数方面的构造相关的几个问题,例如,他们的构造不满足他们声称持有的一致性。
{"title":"Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited","authors":"Keita EMURA","doi":"10.1587/transfun.2023cip0005","DOIUrl":"https://doi.org/10.1587/transfun.2023cip0005","url":null,"abstract":"Public key authenticated encryption with keyword search (PAEKS) has been proposed, where a sender's secret key is required for encryption, and a trapdoor is associated with not only a keyword but also the sender. This setting allows us to prevent information leakage of keyword from trapdoors. Liu et al. (ASIACCS 2022) proposed a generic construction of PAEKS based on word-independent smooth projective hash functions (SPHFs) and PEKS. In this paper, we propose a new generic construction of PAEKS, which is more efficient than Liu et al.'s in the sense that we only use one SPHF, but Liu et al. used two SPHFs. In addition, for consistency we considered a security model that is stronger than Liu et al.'s. Briefly, Liu et al. considered only keywords even though a trapdoor is associated with not only a keyword but also a sender. Thus, a trapdoor associated with a sender should not work against ciphertexts generated by the secret key of another sender, even if the same keyword is associated. That is, in the previous definitions, there is room for a ciphertext to be searchable even though the sender was not specified when the trapdoor is generated, that violates the authenticity of PAKES. Our consistency definition considers a multi-sender setting and captures this case. In addition, for indistinguishability against chosen keyword attack (IND-CKA) and indistinguishability against inside keyword guessing attack (IND-IKGA), we use a stronger security model defined by Qin et al. (ProvSec 2021), where an adversary is allowed to query challenge keywords to the encryption and trapdoor oracles. We also highlight several issues associated with the Liu et al. construction in terms of hash functions, e.g., their construction does not satisfy the consistency that they claimed to hold.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135358919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Construct Huffman Sequences With Low PAPR 一种构造低PAPR霍夫曼序列的新方法
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eap1062
Wenjian WANG, Zhi GU, Avik RANJAN ADHIKARY, Rong LUO
The auto-correlation property of Huffman sequence makes it a good candidate for its application in radar and communication systems. However, high peak-to-average power ratio (PAPR) of Huffman sequence severely limits its application value. In this paper, we propose a novel algorithm to construct Huffman sequences with low PAPR. We have used the roots of the polynomials corresponding to Huffman sequences of length M + 1 to construct Huffman sequences of length 2M + 1, with low PAPR.
霍夫曼序列的自相关特性使其在雷达和通信系统中有很好的应用前景。然而,霍夫曼序列的高峰均功率比(PAPR)严重限制了其应用价值。本文提出了一种构造低PAPR霍夫曼序列的新算法。我们利用长度为M + 1的霍夫曼序列对应的多项式的根构造了长度为2M + 1的霍夫曼序列,具有低PAPR。
{"title":"A Novel Approach to Construct Huffman Sequences With Low PAPR","authors":"Wenjian WANG, Zhi GU, Avik RANJAN ADHIKARY, Rong LUO","doi":"10.1587/transfun.2023eap1062","DOIUrl":"https://doi.org/10.1587/transfun.2023eap1062","url":null,"abstract":"The auto-correlation property of Huffman sequence makes it a good candidate for its application in radar and communication systems. However, high peak-to-average power ratio (PAPR) of Huffman sequence severely limits its application value. In this paper, we propose a novel algorithm to construct Huffman sequences with low PAPR. We have used the roots of the polynomials corresponding to Huffman sequences of length M + 1 to construct Huffman sequences of length 2M + 1, with low PAPR.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135260759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1