期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio
1
作者 瞿治国 何煌兴 李涛 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第1期267-277,共11页
As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an imp... As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit (LSQb) modification is proposed. Com- pared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some spe- cific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark. Finally, the simulation results including the values of audio waveforms and signal to noise ratios (SNR) prove that the new algorithm has good transparency, robustness, and security. 展开更多
关键词 quantum audio watermarking least significant qubit logical consistency and correlation quantumcircuits
下载PDF
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
2
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware Trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
Pruning Redundant Alarm Correlation Patterns
3
作者 CHEN Yue, LIN Qi ning, TU Zhi yun (Business Management School, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第2期45-48,共4页
Efficient methods exist for discovering association rules fromlarge collections of data. The number of discovered rules can,however, be so large. At the same time it is well known that manydiscovered associations are ... Efficient methods exist for discovering association rules fromlarge collections of data. The number of discovered rules can,however, be so large. At the same time it is well known that manydiscovered associations are redundant or minor variations of others.Their existence may simply be due to chance rather than truecorrelation. Thus, those spurious and insignificant rules should beremoved. In this paper, we propose a novel technique to over- Comethis problem. The technique firstly introduces the newconcept-structure rule cover, and then present a Quantitative methodto prune redundant correlation patterns. The user can now obtain acomplete picture of the do- Main without being overwhelmed by a hugenumber of rules. 展开更多
关键词 alarm correlation structural rule cover correlation logic minimumsupport
原文传递
Flexible optoelectronic neural transistors with broadband spectrum sensing and instant electrical processing for multimodal neuromorphic computing
4
作者 Yao Ni Lu Yang +3 位作者 Jiulong Feng Jiaqi Liu Lin Sun Wentao Xu 《SmartMat》 2023年第2期120-130,共11页
A flexible optoelectronic neural transistor(OENT)that consists of a one‐step spin‐coated tri‐blend film composed of 2,7‐dioctyl[1]benzothieno[3,2‐b][1]benzothiophene(C8‐BTBT),poly(3‐hexylthiophene‐2,5‐diyl)(P... A flexible optoelectronic neural transistor(OENT)that consists of a one‐step spin‐coated tri‐blend film composed of 2,7‐dioctyl[1]benzothieno[3,2‐b][1]benzothiophene(C8‐BTBT),poly(3‐hexylthiophene‐2,5‐diyl)(P3HT),and poly(methyl methacrylate)(PMMA)is demonstrated.The C8‐BTBT and P3HT phases in the film partially segregate into distinct domains,which combine to provide broadband spectrum sensing,and instant electrical‐processing capabilities dominated by C8‐BTBT.The OENT is sensitive to solar radiation from the near‐ultraviolet(NUV)and to visible(Vis)radiation from blue to red.When exposed to NUV radiation,the OENT responds sensitively and retains the memory of the exposure for over 10^(3 )s.The OENT provides a warning of excessive chronic exposure to harmful NUV.These properties allow high‐pass filtering with different cut‐off frequencies fc that can restrict the reception of blue,green,or red.These switchable fc enables sensitive image reconstruction and multitarget monitoring.The device combined with a chitosan gel achieves strictly defined short‐range plasticity of<1 s that can achieve diverse instant‐computing applications such as spatiotemporally correlated coding and logic functions.Stable real‐time signal processing facilitates the realization of a Morse‐code recognition system constructed using neuro‐morphological hardware,achieving highly accurate character recognition.This study provides a useful resource that can have applications in wearable biomedical electronics and multimodal neuromorphic computing. 展开更多
关键词 flexible optoelectronic neural transistor high‐pass filtering Morse‐code recognition system sensitive image reconstruction and multitarget monitoring spatiotemporally correlated coding and logic function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部