2021 2nd International Conference on Computer Communication and Network Security (CCNS)最新文献

筛选
英文 中文
Design and implementation of panorama vehicle-mounted battlefield perception system based on multi-light fusion imaging technology 基于多光融合成像技术的全景车载战场感知系统设计与实现
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00024
Gao Qiang, Wan Zhen-Nan, Zhang Ming-Xing, Ma Wei-Qun
{"title":"Design and implementation of panorama vehicle-mounted battlefield perception system based on multi-light fusion imaging technology","authors":"Gao Qiang, Wan Zhen-Nan, Zhang Ming-Xing, Ma Wei-Qun","doi":"10.1109/CCNS53852.2021.00024","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00024","url":null,"abstract":"A new kind of vehicle-mounted battlefield perception system design and implementation scheme is presented, battlefield situation perception and target detection range can be extended by 360°panorama and multi-light fusion imaging technology; system imaging stability and reliability can be improved by multi-axis stabilized platform design; target recognition efficiency and detection and tracking accuracy in battlefield complex conditions can be realized by integrated target detection and tracking algorithm, land based mobile weapon platform battlefield perception ability is improved comprehensively.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FFUZZ: A Fast Fuzzing Test Method for Stateful Network Protocol Implementation 有状态网络协议实现的快速模糊测试方法
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00023
Wu Biao, Tang Chaojing, Zhang Bin
{"title":"FFUZZ: A Fast Fuzzing Test Method for Stateful Network Protocol Implementation","authors":"Wu Biao, Tang Chaojing, Zhang Bin","doi":"10.1109/CCNS53852.2021.00023","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00023","url":null,"abstract":"Fuzzing the network protocol implementation is difficult. One reason for that is the randomly generated network packet data cannot satisfy strict protocol specifications to reach the next state; the other reason is that due to the interaction between server and client, executing a test case assumes a large proportion of time on synchronizing both sides. This paper proposes a fuzzer FFuzz that can speed up the execution of test cases for server fuzzing and accurately mutate specific protocol fields through semantic mutation. By changing the way of sending data packets, multiple data packets are integrated and sent to the server to reduce the interaction time and use the Fork Server mechanism to speed up the fuzzing test. Experiment shows that compared with other state-of-the-art fuzzers, this method increases the execution speed of test cases by 70%, at the same time, code coverage has also been increased by at least 2%.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114795115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption 支持多比特加密的低噪声同态加密方案
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00036
Guangli Xiang, Can Shao
{"title":"Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption","authors":"Guangli Xiang, Can Shao","doi":"10.1109/CCNS53852.2021.00036","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00036","url":null,"abstract":"Fully homomorphic encryption (FHE) provides effective security assurance for privacy computing in cloud environments. But the existing FHE schemes are generally faced with challenges including using single-bit encryption and large ciphertext noise, which greatly affects the encryption efficiency and practicability. In this paper, a low-noise FHE scheme supporting multi-bit encryption is proposed based on the HAO scheme. The new scheme redesigns the encryption method without changing the system parameters and expands the plaintext space to support the encryption of integer matrices. In the process of noise reduction, we introduce a PNR method and use the subGaussian distribution theory to analyze the ciphertext noise. The security and the efficiency analysis show that the improved scheme can resist the chosen plaintext attack and effectively reduce the noise expansion rate. Comparative experiments show that the scheme has high encryption efficiency and is suitable for the privacy-preserving computation of integer matrices.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DW-Sketch: A Sketch-based scheme for realizing multi-network measurement tasks DW-Sketch:一种基于sketch实现多网络测量任务的方案
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00043
Deng Ya, Qin Bin, Nie Wei
{"title":"DW-Sketch: A Sketch-based scheme for realizing multi-network measurement tasks","authors":"Deng Ya, Qin Bin, Nie Wei","doi":"10.1109/CCNS53852.2021.00043","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00043","url":null,"abstract":"Network measurement includes many aspects of tasks including heavy flows detection, attack and anomaly detection, traffic statistics and so on. Under high-speed network traffic, in order to process huge data efficiently in real time for realizing network measurement, many sketch-based techniques with building a small data-structure to store all of flows have been proposed in related research. Existing sketch-based techniques were implemented by proposing complex algorithms customized to specific measurement task. Actually, Network administrators need to learn the network state from different perspectives, so it is necessary to build a general sketch architecture that can accomplish multiple measurement tasks in parallel. Based on this, this paper proposes DW-Sketch which realizes four network measurement tasks, including heavy hitter detection, heavy changer detection, flow size estimation and flow cardinality estimation. Compared with existing sketches for different measurement tasks with experiments, DW-Sketch is proved to be a multi-task network measurement technique with good measurement effect through certain evaluation indexes, such as precision, relative error, etc.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Dynamic Modeling and Simulation of Release Mechanism 释放机构动态建模与仿真研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00018
Jiliang Zhao, Hung-Jen Sun, Song Liu, Sheng Huang, Shuai Mei, Hongbo Li
{"title":"Research on Dynamic Modeling and Simulation of Release Mechanism","authors":"Jiliang Zhao, Hung-Jen Sun, Song Liu, Sheng Huang, Shuai Mei, Hongbo Li","doi":"10.1109/CCNS53852.2021.00018","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00018","url":null,"abstract":"Containment and release technology is an important technology to improve rocket launch reliability. The containment and release technology is studied based on the four-link release mechanism. The dynamic model of the release mechanism is verified by program calculation and Adams simulation, and it lays the foundation for further research on the containment and release technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Key Technologies of ship network security protection 船舶网络安全防护关键技术研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00026
Maopu Wu, Xinyu Liu
{"title":"Research on Key Technologies of ship network security protection","authors":"Maopu Wu, Xinyu Liu","doi":"10.1109/CCNS53852.2021.00026","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00026","url":null,"abstract":"With the improvement of smart ship, control system of ship, communication and navigation system, information management system and equipment are gradually interconnected through the network, and the ship has more and more frequent contact with the outside world. However, more and more ships are “online”, which leads to the increasingly serious problem of network security. In order to comprehensively improve the ship’s network security protection capability, this paper fully investigates the latest scientific research achievements and industry practical experience in the field of ship network security. Aiming at the hidden dangers of network security in ship key information systems, the research on the overall protection route of ship network security has been carried out. Based on the research of key technologies such as ship network boundary protection technology and ship data security encryption technology, a multi-level security protection system of ship network is constructed, and a complete and popularized ship network security protection solution is formed.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the influence of CAN bus encryption and decryption on real time performance CAN总线加解密对实时性能的影响分析
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00016
Tonghong Chong, Tianyu Liu, Yanan Zhang, Chao Ma, Xianfeng Jia, Zhi Wu
{"title":"Analysis of the influence of CAN bus encryption and decryption on real time performance","authors":"Tonghong Chong, Tianyu Liu, Yanan Zhang, Chao Ma, Xianfeng Jia, Zhi Wu","doi":"10.1109/CCNS53852.2021.00016","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00016","url":null,"abstract":"With the rapid development of intelligent network connected vehicle, information security has been paid more and more attention. In order to solve the problem that the vehicle bus information is transmitted directly without encryption, which is easy to be illegally monitored and maliciously cracked, it is planned to encrypt the vehicle bus information before transmission. Sender and receiver use the same encryption algorithm and key. The sender encrypts the data before sending the message, while the receiver decrypts the data after receiving it. In order to study the influence of CAN bus encryption and decryption on transmission efficiency, taking TC299 chip as an example, different encryption and decryption algorithms are used to encrypt and decrypt data with different lengths. The research shows that the time of symmetric encryption is much less than that of asymmetric encryption; With the increase of the length of the data to be encrypted and decrypted, the time required for encryption and decryption also increases; The time of encryption and decryption is microseconds, which will not affect the real-time performance of the bus.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind classification for linear and non-linear modulations based on the fusion of multiple features 基于多特征融合的线性和非线性调制盲分类
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00013
Guowei Lei, Qiang Shu, Wenliang Liao
{"title":"Blind classification for linear and non-linear modulations based on the fusion of multiple features","authors":"Guowei Lei, Qiang Shu, Wenliang Liao","doi":"10.1109/CCNS53852.2021.00013","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00013","url":null,"abstract":"Blind identification for modulations is an important issue in signal processing and wireless communications. The role of modulation identification is to find out which type of modulations for the signals received. To investigate the classification for both linear and non-linear modulations, the fusion of multiple features is studied in terms of the cumulants, approximate entropy and kurtosis. The features are combined as the input vector of back propagation neural network, which is designed to discriminate multiple modulations. Training and test are verified via simulations finally.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125702418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Influencing Factors of MOBA Mobile Games Based on Factor Analysis 基于因子分析的MOBA手游影响因素研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00014
Shen Qi, Wu Shu-Ming, Chen Chun-Chih, Huang Chia-Hui
{"title":"Research on Influencing Factors of MOBA Mobile Games Based on Factor Analysis","authors":"Shen Qi, Wu Shu-Ming, Chen Chun-Chih, Huang Chia-Hui","doi":"10.1109/CCNS53852.2021.00014","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00014","url":null,"abstract":"The objective of this study is to identify the attractive quality factors affecting MOBA game design, thus meeting consumers’ requirements and effectively improving their satisfaction. The factor analysis was carried out based on the results of 116 subjects’ evaluation of various quality attributes. According to the principal components analysis, the coefficient values of gameplay factor, usability factor, sociability factor, and sensuality factor were 0.302, 0.347, 0.442, and 0.345 respectively, and had a positive effect on satisfaction. Among these factors, sociability factor had slightly higher satisfaction evaluation than other factors. With Arena of Valor as the object of research, the application feasibility of the study was explored and verified by case study.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"550 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenges and opportunities of blockchain systems 区块链系统的挑战与机遇
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00025
Yiming Wang
{"title":"The challenges and opportunities of blockchain systems","authors":"Yiming Wang","doi":"10.1109/CCNS53852.2021.00025","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00025","url":null,"abstract":"Blockchain technology is another technological innovation under the background of the new epoch. It boosts the development of sharing economy and leads to the continuous reformation of technology and industry. As brand-new information technology, blockchain plays an unparalleled role in promoting individuals, society, and the nation. It is significant to study the social popularization of blockchain technology in this context. This paper first reviews the birth and the development of blockchain technology, including Bitcoin, the application prospect, and the value of blockchain technology. And then, this paper discusses the risk factors that constrain the social popularization of blockchain technology. Finally, this paper puts forward some practical strategies to regulate them and makes countermeasures and prospects in the future regarding blockchain technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信