Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Tie-ming CHEN"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 30-36 (2017)
A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed
Externí odkaz:
https://doaj.org/article/f84f96e99d6d42c39624b3a63c4f288e
Autor:
Yi-min YANG, Tie-ming CHEN
Publikováno v:
网络与信息安全学报, Vol 2, Pp 38-43 (2016)
An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features w
Externí odkaz:
https://doaj.org/article/da385f28db6b42938f49ff7e3cb1cd29
Publikováno v:
网络与信息安全学报, Vol 2, Pp 21-29 (2016)
As a widely used tool in social networks,microblog is definitely with short document,quick broadcasting and topic changeable,which results in big challenging for social topic detection and tracking.A new systematic framework for micro-blog topic dete
Externí odkaz:
https://doaj.org/article/5deb6fac038c4f1d86adf49631078466
Publikováno v:
Tongxin xuebao, Vol 36, Pp 259-265 (2015)
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they co
Externí odkaz:
https://doaj.org/article/29a22e63c33243479a0f86f475353b78
Autor:
Tie-ming CHEN, Liang GE
Publikováno v:
Tongxin xuebao, Vol 34, Pp 113-120 (2013)
As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a n
Externí odkaz:
https://doaj.org/article/c25bfde15b0049e69e728d9df006d279
Publikováno v:
Journal of Information Science & Engineering; Jul2021, Vol. 37 Issue 4, p959-974, 16p
Publikováno v:
Applied Mechanics and Materials. :2139-2143
Vertical partitioning is a process of generating fragments, each of which is composed of attributes with high affinity. It is widely used in the distributed database to improve the efficiency of system by reducing the connection between the table acc
Publikováno v:
Applied Mechanics and Materials. :2412-2415
The aim of dimensionality reduction is to construct a low-dimensional representation of high dimensional input data in such a way, that important parts of the structure of the input data are preserved. This paper proposes to apply the dimensionality
Publikováno v:
2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.
As the first step of the key management, identity authentication directly affects the security of WSN. However because of the limited-resources of WSN, traditional authentication protocol can't directly apply in WSN. To adapt to needs of it, we propo
Publikováno v:
2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
Identity cryptography is widely used in Security Authentication. This paper proposes a standard identity-based authentication scheme, and also proves the security of the scheme under passive attack. On the basis of ECC and Bilinear Maps, paper implem