{"title":"Non-Quantization Keys-Based Physical Layer Secure Transmission Scheme Using One-Time Pad","authors":"Meng Wang, Kaizhi Huang, Zheng Wan, Xiaoli Sun, Zengchao Geng, Kai Zhao","doi":"10.1109/ASID56930.2022.9996019","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9996019","url":null,"abstract":"The Non-Reconciled Keys-based One-Time Pad (NRK-OTP) secure transmission scheme has attracted widespread attention since it reduces communication cost and computational complexity caused by information reconciliation. However, this scheme utilizes quantization to convert the analog channel estimates into binary sequences, which results in channel estimation errors being amplified. To address the problem, this letter proposes a Non-Quantization Keys-based One-Time Pad (NQK-OTP) secure transmission scheme. First, the uniformly distributed keys are generated from the wireless channel without quantization. Novel encryption and decryption algorithms are then presented to encrypt and decrypt modulated signals via OTP. Analytical and simulation results demonstrate that the proposed scheme can realize perfect secrecy and defend against symbol detection attacks. Compared with the NRK-OTP secure transmission scheme, the proposed scheme can achieve significant performance improvement in terms of Bit Error Rate (BER).","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Zhang, Chongfei Shen, Lang Tan, Zhiyuan Gao, Zhijie Chen, Xu Liu, Peiyuan Wan
{"title":"A QSPI Interface Supporting ‘Bits-Decoding’ for High-Speed Access to Flash","authors":"Yu Zhang, Chongfei Shen, Lang Tan, Zhiyuan Gao, Zhijie Chen, Xu Liu, Peiyuan Wan","doi":"10.1109/ASID56930.2022.9995778","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995778","url":null,"abstract":"A QSPI interface is proposed for accessing QSPI flash in this paper. This proposed QSPI interface transmission information for the master supports access to 3 types of flash by using the Bit-decoding algorithm, that is, the data is received from MSB to LSB in order into the master. This QSPI interface includes SPI mode, DSPI mode and QSPI mode. The SPI mode has 4 clock modes to switch, for receiving and transmitting the information. The DSPI mode and QSPI mode is utilized when needed for high-speed access to flash. Based on the QSPI transmission protocol, a finite state machine is used in this QSPI interface design, which to control the transmission timing. The design is verified through RTL simulation. The simulation result shows the correct functions and transports stable data.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Attention Cascade Multi-View Stereo Network","authors":"Weiqiang Liu, Rongshan Chen, Huarong Xu, Lifen Weng","doi":"10.1109/ASID56930.2022.9995975","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995975","url":null,"abstract":"The multi-view stereo reconstruction method based on deep learning is usually affected by the weak-textured area or occlusion in the real scene. Therefore we propose a multi-view stereo reconstruction network method with a hybrid attention mechanism. A hybrid attention module is added to the feature extractor to improve the performance in weak-textured regions. In order to reduce occlusion effects a module is used to adjust the view weights. We find adding depth-adaptive partitioning will improve the performance of our method. Our method is trained and tested on the DTU and Tanks and Temples datasets, the results show that our method has good results in terms of reconstruction accuracy and completeness.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Root Cause Detection for LTE Network Fault Based on Machine Learning","authors":"Junyi Tang, Shouliang Li","doi":"10.1109/ASID56930.2022.9995909","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995909","url":null,"abstract":"With the Long-Term Evolution (LTE) of mobile networks, the types of network fault have become more complex and diverse. In order to ensure reliable and safe run of the network, it is increasingly difficult for traditional manual administration and maintenance to cope with the complicated and heavy network faults. The super machine learning ability of artificial intelligence can well realize intelligent prediction and processing of network faults by sorting and analyzing a large amount of Key Performance Indicator (KPI) data on network operation and maintenance. In the face of complex network fault types, the number of labeled KPI samples used for training the model is very limited and it is difficult to obtain the samples. This paper proposes a multiclass classification algorithm based on semi-supervised transductive support vector machine for fault root cause detection in LTE networks, and compares its performance with supervised learning and unsupervised learning algorithms. Theoretical analysis and achieved results show that the algorithm proposed in this paper achieves a good learning effect on the mixed sample training set composed of a small number of labeled samples and a large number of unlabeled samples, and has a high classification accuracy for unlabeled samples.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Higher Performance Accelerator for Resource-Limited FPGA to Deploy Deeper Object Detection Networks","authors":"Hao Yu, Sizhao Li","doi":"10.1109/ASID56930.2022.9995953","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995953","url":null,"abstract":"Nowdays, CNN models become more and more popular in lots of fields due to its high performance. Unfortuna-tely, the complexity of the model increases along with accuracy, which limited its applications in some fields. Until now, a lot of researches are focused on some shallow networks such as Alexnet, VGG16. The state of art models in computer vision has over one hundred layers using ResNet structure. Besides, the power consumption of the model and latency of inference also leads to the difficulties to use AI models in reality. To solve the problem, we proposed an accelerator structure to apply yolov5 model to FPGA boards. Two types of parallelisms and pipeline structure are applied. Besides, to eliminate the time of loading and saving to off-chip buffer, ping-pong buffer are used. We improve the pipeline performance by rescheduling the mac operation. Eventually, we test the performance of accelerator on ZC702. So it can be easily implemented on some resource-limited boards. The acc-elerator can speed up the inference 6 times than CPU, 17.4 times than ARM CPU on ZC702. And the throughput of single DSP outperforms the previous works.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PCA Based SVM Hardware Trojan Detection Approach","authors":"Peng Liu, Liji Wu, Zhenhui Zhang, Dehang Xiao, Xiangmin Zhang, Lili Wang","doi":"10.1109/ASID56930.2022.9995991","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995991","url":null,"abstract":"In recent years, with the globalization of semiconductor processing and manufacturing, integrated circuits have gradually become vulnerable to malicious attackers. In order to detect Hardware Trojans (HTs) hidden in integrated circuits, it has become one of the hottest issues in the field of hardware security. In this paper, we propose to apply Principal Component Analysis (PCA) and Support Vector Machine (SVM) to hardware Trojan detection, using PCA algorithm to extract features from small differences in side channel information, and then obtain the principal components. The SVM detection model is optimized by means of cross-validation and logarithmic interval. Finally, it is determined whether the original circuit contains a hardware Trojan. In the experiment, we use the SAKURA-G FPGA board, Agilent oscilloscope, and ISE simulation software to complete the experimental work. The test results of five different HTs show that the average True Positive Rate (TPR) of the proposed method for HTs can reach 99.48%, along with an average True Negative Rate (TNR) of 99.2%, and an average detection time of 9.66s.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Recognition of Standard Liver Sections Based on Vision-Transformer","authors":"Jiansong Zhang, Yongjian Chen, Peizhong Liu","doi":"10.1109/ASID56930.2022.9995936","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995936","url":null,"abstract":"Acquisition of ultrasound standard views is a prerequisite for performing ultrasound diagnosis. With the aim of solving the clinical imaging challenge that adult liver standard sections have long been constrained by physicians' subjective experience, this paper collects 12 common liver ultrasound standard sections from the Second Hospital of Fujian Medical University and investigates and discusses the adaptability of the Vision-Transformer(ViT)-based deep learning automatic recognition method in liver ultrasound standard sections. Using a regional pixel set segmentation operation on liver ultrasound images, we found that the ViT model achieved recognition accuracy of 92.9% in the available ultrasound dataset when the basic segmentation module was 16*16 and the depth was 12. We also compared other mainstream deep learning frameworks based on convolutional neural networks, and the ViT model outperformed all other methods, guided by the features of the visual attention mechanism. The work in this paper provides a rich research base for deep learning of liver ultrasound based on the visual attention mechanism, and to a certain extent standardises the medical examination of the liver in adults by ultrasound-based means.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116709640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GIDL Analysis of 1T1C Structure for Sub-20nm DRAM Cell","authors":"Yalin Zheng, Danfeng Chen, Shan He, Donghui Guo","doi":"10.1109/ASID56930.2022.9995836","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995836","url":null,"abstract":"In this paper, we propose a low off-current and easily integrated MOSFET suitable for sub-20nm Dynamic Random Access Memory (DRAM). And the electrical parameters of MOS are extracted by 3D device simulation. In the same condition, the off current for the structure proposed is three orders of magnitude lower than the Partial Isolation Type Buried Channel Array Transistor(Pi-BCAT). In addition, the TCAD tool is used to construct the 3D cylinder stacked capacitor with high-k materials so that the capacitance can be more than 25fF/cell. Finally, we use the mixed mode simulation to verify the feasibility of MOSFET and the capacitor as the DRAM cell for refreshing operation.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixed Wave-Front Signal Model for 5G Indoor Passive Sounding and Channel Parameter Estimation","authors":"Jialin Shi, Xuemin Hong, Ao Peng","doi":"10.1109/ASID56930.2022.9995791","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995791","url":null,"abstract":"Due to the universal coverage of the 5thGeneration (5G) mobile communication networks, indoor positioning based on 5G radio signal has attracted significant research and industrial interests. Accurate signal propagation models are beneficial to 5G communications and high precision 5G positioning. However, in the sub-6GHz frequency band of 5G networks, the traditional plane wave-front and spherical wave-front signal models are no longer fully applicable for indoor environments. In this paper, we propose a mixed wave-front signal model by combining the plane wave-front signal model with the spherical wave-front signal model. Simulation results show that when applied with the classic Space-Alternating Generalized Expectation-maximization (SAGE) algorithm, the proposed mixed model can yield better results in channel parameter estimation.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Novel Anomaly Detection Method for Tiny Defects on Translucent Glass","authors":"Die Hu, X. Liu, Lei Wang","doi":"10.1109/ASID56930.2022.9995999","DOIUrl":"https://doi.org/10.1109/ASID56930.2022.9995999","url":null,"abstract":"Translucent glass is widely used in advanced touch panel display devices. But its defects are more difficult to be found because of variances of the transparency and shape. In this paper, we propose an novel CFLOW-based unsupervised anomaly detection method. We improved the multi-scale aggregation strategy by introducing deeper layer and shallow layer likelihood differences into the final anomaly map. This method reduces the defect detection area on translucent glass from hundreds of pixels to less than 10 pixels. Finally, our method improves the average area under the receiver operating characteristic curve to 96.74% at the image level and 98.96% at the pixel level, which is satisfactory for industrial applications.","PeriodicalId":183908,"journal":{"name":"2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128838977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}