As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an imp...As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit (LSQb) modification is proposed. Com- pared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some spe- cific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark. Finally, the simulation results including the values of audio waveforms and signal to noise ratios (SNR) prove that the new algorithm has good transparency, robustness, and security.展开更多
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith...To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.展开更多
Efficient methods exist for discovering association rules fromlarge collections of data. The number of discovered rules can,however, be so large. At the same time it is well known that manydiscovered associations are ...Efficient methods exist for discovering association rules fromlarge collections of data. The number of discovered rules can,however, be so large. At the same time it is well known that manydiscovered associations are redundant or minor variations of others.Their existence may simply be due to chance rather than truecorrelation. Thus, those spurious and insignificant rules should beremoved. In this paper, we propose a novel technique to over- Comethis problem. The technique firstly introduces the newconcept-structure rule cover, and then present a Quantitative methodto prune redundant correlation patterns. The user can now obtain acomplete picture of the do- Main without being overwhelmed by a hugenumber of rules.展开更多
A flexible optoelectronic neural transistor(OENT)that consists of a one‐step spin‐coated tri‐blend film composed of 2,7‐dioctyl[1]benzothieno[3,2‐b][1]benzothiophene(C8‐BTBT),poly(3‐hexylthiophene‐2,5‐diyl)(P...A flexible optoelectronic neural transistor(OENT)that consists of a one‐step spin‐coated tri‐blend film composed of 2,7‐dioctyl[1]benzothieno[3,2‐b][1]benzothiophene(C8‐BTBT),poly(3‐hexylthiophene‐2,5‐diyl)(P3HT),and poly(methyl methacrylate)(PMMA)is demonstrated.The C8‐BTBT and P3HT phases in the film partially segregate into distinct domains,which combine to provide broadband spectrum sensing,and instant electrical‐processing capabilities dominated by C8‐BTBT.The OENT is sensitive to solar radiation from the near‐ultraviolet(NUV)and to visible(Vis)radiation from blue to red.When exposed to NUV radiation,the OENT responds sensitively and retains the memory of the exposure for over 10^(3 )s.The OENT provides a warning of excessive chronic exposure to harmful NUV.These properties allow high‐pass filtering with different cut‐off frequencies fc that can restrict the reception of blue,green,or red.These switchable fc enables sensitive image reconstruction and multitarget monitoring.The device combined with a chitosan gel achieves strictly defined short‐range plasticity of<1 s that can achieve diverse instant‐computing applications such as spatiotemporally correlated coding and logic functions.Stable real‐time signal processing facilitates the realization of a Morse‐code recognition system constructed using neuro‐morphological hardware,achieving highly accurate character recognition.This study provides a useful resource that can have applications in wearable biomedical electronics and multimodal neuromorphic computing.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61373131,61303039,61232016,and 61501247)Sichuan Youth Science and Technique Foundation,China(Grant No.2017JQ0048)+1 种基金NUIST Research Foundation for Talented Scholars of China(Grant No.2015r014)PAPD and CICAEET Funds of China
文摘As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit (LSQb) modification is proposed. Com- pared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some spe- cific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark. Finally, the simulation results including the values of audio waveforms and signal to noise ratios (SNR) prove that the new algorithm has good transparency, robustness, and security.
文摘To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
文摘Efficient methods exist for discovering association rules fromlarge collections of data. The number of discovered rules can,however, be so large. At the same time it is well known that manydiscovered associations are redundant or minor variations of others.Their existence may simply be due to chance rather than truecorrelation. Thus, those spurious and insignificant rules should beremoved. In this paper, we propose a novel technique to over- Comethis problem. The technique firstly introduces the newconcept-structure rule cover, and then present a Quantitative methodto prune redundant correlation patterns. The user can now obtain acomplete picture of the do- Main without being overwhelmed by a hugenumber of rules.
基金supported by the National Science Fund for Distinguished Young Scholars of China(No.T2125005)the Tianjin Science Foundation for Distinguished Young Scholars(No.19JCJQJC61000)+1 种基金the Shenzhen Science and Technology Project(No.JCYJ20210324121002008)the Inter‐Governmental International Scientific and Technological Innovation Cooperation Key Projects(No.SQ2021YFE011099).
文摘A flexible optoelectronic neural transistor(OENT)that consists of a one‐step spin‐coated tri‐blend film composed of 2,7‐dioctyl[1]benzothieno[3,2‐b][1]benzothiophene(C8‐BTBT),poly(3‐hexylthiophene‐2,5‐diyl)(P3HT),and poly(methyl methacrylate)(PMMA)is demonstrated.The C8‐BTBT and P3HT phases in the film partially segregate into distinct domains,which combine to provide broadband spectrum sensing,and instant electrical‐processing capabilities dominated by C8‐BTBT.The OENT is sensitive to solar radiation from the near‐ultraviolet(NUV)and to visible(Vis)radiation from blue to red.When exposed to NUV radiation,the OENT responds sensitively and retains the memory of the exposure for over 10^(3 )s.The OENT provides a warning of excessive chronic exposure to harmful NUV.These properties allow high‐pass filtering with different cut‐off frequencies fc that can restrict the reception of blue,green,or red.These switchable fc enables sensitive image reconstruction and multitarget monitoring.The device combined with a chitosan gel achieves strictly defined short‐range plasticity of<1 s that can achieve diverse instant‐computing applications such as spatiotemporally correlated coding and logic functions.Stable real‐time signal processing facilitates the realization of a Morse‐code recognition system constructed using neuro‐morphological hardware,achieving highly accurate character recognition.This study provides a useful resource that can have applications in wearable biomedical electronics and multimodal neuromorphic computing.