Many heated debates have taken place recently upon the economic security brought about by foreign acquisitions.This should be a good sign,as different views are being aired in contrast to the one uniform voice and has...Many heated debates have taken place recently upon the economic security brought about by foreign acquisitions.This should be a good sign,as different views are being aired in contrast to the one uniform voice and hasty generalization has been replaced by ever-intensifying debate,which is indeed historical progress.展开更多
State regulator tightens supervision over state overseas assets NEW measures to supervise overseas assets of centrally administered state-owned enterprises(SOEs) have been announced by the State-Owned Assets Supervisi...State regulator tightens supervision over state overseas assets NEW measures to supervise overseas assets of centrally administered state-owned enterprises(SOEs) have been announced by the State-Owned Assets Supervision and Administration Commission(SASAC), coming about amid what it termed "increasing complexities." The newly announced pair of regula-展开更多
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.展开更多
The maximum punishment for holding large amounts of property with unidentified sources, currently five years’ imprison-ment, is set to double if a draft amendment to the Criminal Law is adopted.
A public debate on the bystander effect,prompted by a viral video of a fatal traffic accident,has highlighted continued gaps in China’s'Good Samaritan'laws—legal protections for those who volunteer to help v...A public debate on the bystander effect,prompted by a viral video of a fatal traffic accident,has highlighted continued gaps in China’s'Good Samaritan'laws—legal protections for those who volunteer to help victims.The 94-second video from Zhumadian,Henan,recorded in April but circulated in mid-June,showed a展开更多
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel...Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.展开更多
The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a ph...The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations.展开更多
In order to penalize the acceptance of bribes by non-state functionaries who abuse public power, the anti-corruption system of China's criminal law has undergone successive transformations: from punishing non-state ...In order to penalize the acceptance of bribes by non-state functionaries who abuse public power, the anti-corruption system of China's criminal law has undergone successive transformations: from punishing non-state functionaries who accept bribes in accordance with the joint crime model to punishing them in accordance with the model for a single crime, and from seeking the rules of punishment in judicial interpretations to having the criminal code directly prescribe the criteria for determining a charge. Judicial interpretations have been particularly concerned with the punishment of non-state functionaries who have a relationship of common interests with a state functionary. The crime of accepting bribes given in return for trading in influence was established to solve the problem of the judicial vacuum created by judicial interpretations, but new legal obstacles have emerged. To generalize the class of offenders who accept bribes in return for using their influence is the route future improvement should take.展开更多
文摘Many heated debates have taken place recently upon the economic security brought about by foreign acquisitions.This should be a good sign,as different views are being aired in contrast to the one uniform voice and hasty generalization has been replaced by ever-intensifying debate,which is indeed historical progress.
文摘State regulator tightens supervision over state overseas assets NEW measures to supervise overseas assets of centrally administered state-owned enterprises(SOEs) have been announced by the State-Owned Assets Supervision and Administration Commission(SASAC), coming about amid what it termed "increasing complexities." The newly announced pair of regula-
基金Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134)the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30)+1 种基金the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01)the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
文摘In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.
文摘The maximum punishment for holding large amounts of property with unidentified sources, currently five years’ imprison-ment, is set to double if a draft amendment to the Criminal Law is adopted.
文摘A public debate on the bystander effect,prompted by a viral video of a fatal traffic accident,has highlighted continued gaps in China’s'Good Samaritan'laws—legal protections for those who volunteer to help victims.The 94-second video from Zhumadian,Henan,recorded in April but circulated in mid-June,showed a
基金partly supported by National Natural Science Foundation of China (NSFC grant numbers: 61202110 and 61502205)the project of Jiangsu provincial Six Talent Peaks (Grant numbers: XYDXXJS-016)
文摘Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.
基金Supported by National Natural Science Foundation of China(NSFC)under Grant Nos.11274010,11374085,and 61370090Anhui Provincial Natural Science Foundation under Grant Nos.1408085MA20 and 1408085MA16the Key Program of Domestic Visiting of Anhui Province under Grant No.gxfxZD2016192
文摘The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations.
文摘In order to penalize the acceptance of bribes by non-state functionaries who abuse public power, the anti-corruption system of China's criminal law has undergone successive transformations: from punishing non-state functionaries who accept bribes in accordance with the joint crime model to punishing them in accordance with the model for a single crime, and from seeking the rules of punishment in judicial interpretations to having the criminal code directly prescribe the criteria for determining a charge. Judicial interpretations have been particularly concerned with the punishment of non-state functionaries who have a relationship of common interests with a state functionary. The crime of accepting bribes given in return for trading in influence was established to solve the problem of the judicial vacuum created by judicial interpretations, but new legal obstacles have emerged. To generalize the class of offenders who accept bribes in return for using their influence is the route future improvement should take.