From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relation...From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.展开更多
The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was...The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.展开更多
On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of Ch...On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.展开更多
On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-Presid...On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.展开更多
At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,vis...At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.展开更多
In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances ...In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.展开更多
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c...Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.展开更多
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform...Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.展开更多
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security...New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.展开更多
The influences of biological,chemical,and flow processes on soil structure through microbially induced carbonate precipitation(MICP)are not yet fully understood.In this study,we use a multi-level thresholding segmenta...The influences of biological,chemical,and flow processes on soil structure through microbially induced carbonate precipitation(MICP)are not yet fully understood.In this study,we use a multi-level thresholding segmentation algorithm,genetic algorithm(GA)enhanced Kapur entropy(KE)(GAE-KE),to accomplish quantitative characterization of sandy soil structure altered by MICP cementation.A sandy soil sample was treated using MICP method and scanned by the synchrotron radiation(SR)micro-CT with a resolution of 6.5 mm.After validation,tri-level thresholding segmentation using GAE-KE successfully separated the precipitated calcium carbonate crystals from sand particles and pores.The spatial distributions of porosity,pore structure parameters,and flow characteristics were calculated for quantitative characterization.The results offer pore-scale insights into the MICP treatment effect,and the quantitative understanding confirms the feasibility of the GAE-KE multi-level thresholding segmentation algorithm.展开更多
Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional ...Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional attention schemes have not considered the impact of lesion type differences on grading,resulting in unreasonable extraction of important lesion features.Therefore,this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator(MPAG)and a lesion localization module(LLM).Firstly,MPAGis used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained in the patches,fully considering the impact of lesion type differences on grading,solving the problem that the attention maps of lesions cannot be further refined and then adapted to the final DR diagnosis task.Secondly,the LLM generates a global attention map based on localization.Finally,the weighted attention map and global attention map are weighted with the fundus map to fully explore effective DR lesion information and increase the attention of the classification network to lesion details.This paper demonstrates the effectiveness of the proposed method through extensive experiments on the public DDR dataset,obtaining an accuracy of 0.8064.展开更多
At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Spe...At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Speaker of the Hungarian National Assembly visited China on June 17-20,2015.In Beijing,Mr.Qi Xuchun,Vice-Chairman of展开更多
At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deput...At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deputy Secretary-General Liu Kaiyang accompanied the delegation to Chengdu.As a CAFIU staff member,I had the honor to accompany the展开更多
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro...To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.展开更多
At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu J...On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.展开更多
At the invitation of the Chinese Association for International Understanding(CAFIU),a 6-member delegation of Civic Association "Polish House",headed by the Secretary of its Board Mr.Tadeusz Gajewski,visited ...At the invitation of the Chinese Association for International Understanding(CAFIU),a 6-member delegation of Civic Association "Polish House",headed by the Secretary of its Board Mr.Tadeusz Gajewski,visited Beijing and Hunan Province from December 1 to 6.展开更多
文摘From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.
文摘The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.
文摘On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.
文摘On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.
文摘At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.
文摘In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
基金supported by the National Science Council under Grant No. NSC100-2410-H-005-046
文摘Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
文摘Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.
基金Project (No. 602032) supported by the Natural Science Foundationof Zhejiang Province, China
文摘New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.
基金supported by the National Natural Science Foundation of China(Grant Nos.42077232 and 42077235)the Key Research and Development Plan of Jiangsu Province(Grant No.BE2022156).
文摘The influences of biological,chemical,and flow processes on soil structure through microbially induced carbonate precipitation(MICP)are not yet fully understood.In this study,we use a multi-level thresholding segmentation algorithm,genetic algorithm(GA)enhanced Kapur entropy(KE)(GAE-KE),to accomplish quantitative characterization of sandy soil structure altered by MICP cementation.A sandy soil sample was treated using MICP method and scanned by the synchrotron radiation(SR)micro-CT with a resolution of 6.5 mm.After validation,tri-level thresholding segmentation using GAE-KE successfully separated the precipitated calcium carbonate crystals from sand particles and pores.The spatial distributions of porosity,pore structure parameters,and flow characteristics were calculated for quantitative characterization.The results offer pore-scale insights into the MICP treatment effect,and the quantitative understanding confirms the feasibility of the GAE-KE multi-level thresholding segmentation algorithm.
基金supported in part by the Research on the Application of Multimodal Artificial Intelligence in Diagnosis and Treatment of Type 2 Diabetes under Grant No.2020SK50910in part by the Hunan Provincial Natural Science Foundation of China under Grant 2023JJ60020.
文摘Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional attention schemes have not considered the impact of lesion type differences on grading,resulting in unreasonable extraction of important lesion features.Therefore,this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator(MPAG)and a lesion localization module(LLM).Firstly,MPAGis used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained in the patches,fully considering the impact of lesion type differences on grading,solving the problem that the attention maps of lesions cannot be further refined and then adapted to the final DR diagnosis task.Secondly,the LLM generates a global attention map based on localization.Finally,the weighted attention map and global attention map are weighted with the fundus map to fully explore effective DR lesion information and increase the attention of the classification network to lesion details.This paper demonstrates the effectiveness of the proposed method through extensive experiments on the public DDR dataset,obtaining an accuracy of 0.8064.
文摘At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Speaker of the Hungarian National Assembly visited China on June 17-20,2015.In Beijing,Mr.Qi Xuchun,Vice-Chairman of
文摘At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deputy Secretary-General Liu Kaiyang accompanied the delegation to Chengdu.As a CAFIU staff member,I had the honor to accompany the
基金Supported by the National Basic Research Program of China(No.2012CB315905)the National Natural Science Foundation of China(No.61272501)the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China(No.J2013-31,Q2014-48)
文摘To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.
文摘At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
文摘On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.
文摘At the invitation of the Chinese Association for International Understanding(CAFIU),a 6-member delegation of Civic Association "Polish House",headed by the Secretary of its Board Mr.Tadeusz Gajewski,visited Beijing and Hunan Province from December 1 to 6.