2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
Analysis of multiple factors and electrode velocity effect on ESD in micro-air gap 微气隙中静电放电多因素及电极速度影响分析
Shunli Yao, F. Ruan, Xiaojin You, Ming Su, Xiaohong Yang, Jun Huang, Junhua Zhang
{"title":"Analysis of multiple factors and electrode velocity effect on ESD in micro-air gap","authors":"Shunli Yao, F. Ruan, Xiaojin You, Ming Su, Xiaohong Yang, Jun Huang, Junhua Zhang","doi":"10.1109/ICASID.2016.7873921","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873921","url":null,"abstract":"The critical characteristics of variation parameter in electrostatic discharge(ESD) were mainly affected by gas ionization condition, discharge gap length, electrode and discharge voltage. Humidity, pressure, temperature in atmosphere factors and electrode velocity have great impact on ESD process, which may lead to much distink low repeatability of results in parameter test process. We proposed a field source model to analyze the motion of electrons in an E-field, and discussed the influence on various parameters in discharge current. Using the newly invented ESD measurement system, we measured discharge current waveform under different conditions, with surface process and electron avalanche process in short-gap ESD model, we described appearance of discharge current transferring at 800v, and explained the reason of variation critical effect of electrode velocity on discharge parameters.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-security colour shift keying modulation scheme with chaos-based constellation rotation for VLC system 基于混沌旋转的VLC系统高安全性色移键控调制方案
Huaiyin Lu, Lin Zhang, Xingcheng Liu
{"title":"High-security colour shift keying modulation scheme with chaos-based constellation rotation for VLC system","authors":"Huaiyin Lu, Lin Zhang, Xingcheng Liu","doi":"10.1109/ICASID.2016.7873889","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873889","url":null,"abstract":"With the aid of broad-band visible light and colour shift keying(CSK), visible light communication (VLC) can construct high speed broadcast network in public scenarios. However, due to the broadcast property of light beam, the malicious eavesdroppers located in the same light beam as the legitimate receivers may capture the information. In order to improve the security of VLC systems, in this paper, we propose to apply a chaos-based constellation rotation (CCR) method to CSK modulation scheme. Specifically, the information is modulated at a rotated constellation, while the rotation rule of constellation is determined by the non-repeating chaotic sequences. Since chaotic sequences are non periodic and sensitive to the initial value, the rotation pattern changes dynamically and the eavesdroppers can not retrieve the information in real time in high speed VLC systems. Moreover, the theoretical information leakage analysis is performed for the CCR based CSK (CCR-CSK) modulation scheme. Simulations are performed and the results demonstrate that CCR-CSK scheme achieves the same bit error rate (BER) as original CSK scheme does, while providing much lower information leakage and higher security information transmission for the users.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting DNA-binding proteins using feature fusion and MSVM-RFE 利用特征融合和MSVM-RFE预测dna结合蛋白
Guoli Ji, Yang Lin, Qianmin Lin, Guangzao Huang, Wenbing Zhu, Wenjie You
{"title":"Predicting DNA-binding proteins using feature fusion and MSVM-RFE","authors":"Guoli Ji, Yang Lin, Qianmin Lin, Guangzao Huang, Wenbing Zhu, Wenjie You","doi":"10.1109/ICASID.2016.7873928","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873928","url":null,"abstract":"DNA-binding proteins play a vital important role in cell activities. Prediction of DNA-binding proteins is an important but not fairly solved problem. Currently prediction of DNA-binding proteins via calculation method is a research hotspot. In this paper, we adopt MSVM-RFE for feature selection to those high-dimensional features generated in multiclass feature fusion process and obtain a representative feature subset. The feature subset is evaluated by thirty times 10-fold cross-validation test. At last, we verified the effectiveness of this method compared with method DNA-Prot and other method through three typical datasets. The results demonstrate that this method of predicting DNA-binding proteins has better effect.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2676 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new variable step-Size LMS algorithm based on piecewise function 一种新的基于分段函数的变步长LMS算法
Yufei Han, Mingjiang Wang, Xiangbin Duan, Qiquan Zhang
{"title":"A new variable step-Size LMS algorithm based on piecewise function","authors":"Yufei Han, Mingjiang Wang, Xiangbin Duan, Qiquan Zhang","doi":"10.1109/ICASID.2016.7873929","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873929","url":null,"abstract":"In this paper, a new improved variable step size adaptive algorithm is proposed. The step size is devised to piecewise functions for increasing the performance of the algorithm. By using the characteristics of the each stage, the proposed algorithm can improve the convergence speed and decreases the steady state error. The proposed algorithm has simple formulation and easily setting parameters. The effect of different parameters in piecewise functions are discussed. The simulation results exhibit the proposed algorithm has good tracking ability, convergence rate and small steady state error.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic security enhancement of crypto ICs against fault injection attacks 加密ic对故障注入攻击的自动安全增强
C. Shao, Huiyun Li
{"title":"Automatic security enhancement of crypto ICs against fault injection attacks","authors":"C. Shao, Huiyun Li","doi":"10.1109/ICASID.2016.7873887","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873887","url":null,"abstract":"Fault injection attacks have become a serious threat against cryptographic ICs. The existing countermeasures rely on error detection and correction, which brings a large area and power overhead. This paper proposes a security enhancement design method against fault injection attacks, which selectively protects or detects only the vulnerable logic cells in a cryptographic circuit. These vulnerable cells of the cryptographic ICs can be accurately identified on the system level and the security enhancement will be conducted only on these cells on the circuit level. This security enhancement design method has the advantages of smaller area and power overheads, transparency to the IC designers and compatibility to the common electronic design automation (EDA) tools.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal link control of WSN considering the network activity interference with stochastic geometry theory 基于随机几何理论考虑网络活动干扰的WSN最优链路控制
Jie Chen, B. Kan
{"title":"Optimal link control of WSN considering the network activity interference with stochastic geometry theory","authors":"Jie Chen, B. Kan","doi":"10.1109/ICASID.2016.7873930","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873930","url":null,"abstract":"Wireless Sensor Network(WSN) has become a hot topic in recent years. However, WSN's application areas still been limited beacase of the constrained energy. Traditionally, using the minimal transmitting power of sensor node by k-hop interference model is a popular way. However, network activity was not considered. In this paper, we derived a normal transmitted power level using network activity aware interference with stochastic geometry theory. For network performance improvement, active nodes with the enhanced transmitted power dynamically select suitable values of data-rate relying on channel state information (CSI). Experiments results show that our proposed strategy can improve the energy efficiency of WSNs.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128895823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive noise cancellation and classification of lung sounds under practical environment 实际环境下肺音的自适应消噪与分类
Lin Li, Wenhao Xu, Q. Hong, F. Tong, Jinzhun Wu
{"title":"Adaptive noise cancellation and classification of lung sounds under practical environment","authors":"Lin Li, Wenhao Xu, Q. Hong, F. Tong, Jinzhun Wu","doi":"10.1109/ICASID.2016.7873913","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873913","url":null,"abstract":"Lung sound (LS) offers an effective way to detect and discriminate the respiratory disease. However, in practical environments an LS record is subject to serious noise contamination which may be addressed by adaptive noise cancellation (ANC). A least mean square (LMS) algorithm based ANC method is presented by this paper for signal enhancement of LS under practical noisy environment. Based on the hidden Markov model (HMM), minimum classification error (MCE) is adopted to further improve the discriminative performance of LS. Experimental results confirm the effectiveness of the ANC, and the HMM-MCE based lung sounds recognition approach outperforms the traditional HMM-ML(maximum likelihood) method.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Humming note segmentation method in Query-by-Humming 按哼音查询中的哼音分割方法
Shaojing Zhou, Zhijun Zhao, Ping Shi
{"title":"Humming note segmentation method in Query-by-Humming","authors":"Shaojing Zhou, Zhijun Zhao, Ping Shi","doi":"10.1109/ICASID.2016.7873890","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873890","url":null,"abstract":"Humming note segmentation is an important step in Query-by-Humming (QBH) and the accuracy of note segmentation plays an important role in improving the accuracy of the melody matching in music retrieval system. According to the properties that the voice was not stable, a note segmentation method based on dynamic threshold was put forward in this paper to improve the accuracy of the humming note segmentation. The experiment results showed that the dynamic threshold method can effectively improve the accuracy of retrieval, and it provides an idea to improve the effect of QBH.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel mapping implementation of AES for Coarse-Grained Reconfigurable Block Encryption Array 面向粗粒度可重构块加密阵列的AES并行映射实现
Yuhang Yang, Wei Li, Jinfu Xu, H. Ni
{"title":"Parallel mapping implementation of AES for Coarse-Grained Reconfigurable Block Encryption Array","authors":"Yuhang Yang, Wei Li, Jinfu Xu, H. Ni","doi":"10.1109/ICASID.2016.7873919","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873919","url":null,"abstract":"In this paper, we explore different parallel mapping implementations of Advanced Encryption Standard (AES) on the Coarse-Grained Reconfigurable Block Encryption Array(RBEA). To improve performance and resource efficiency of the direct mapping implementation, we propose 8 modified implementations based on merger, task duplication and loop unrolling methods. Experimental results show that the improved implementations increase the throughput from 1023.99 Mbps to 13643.96 Mbps and the performance-area ratio from 63.99 Mbps/FB to 309.62 Mbps/FB, developing the superiority of array's computing resources. Compared with other platforms, our work has 1.16–13.34 times higher throughput and 3.55–11.73 times higher throughput per unit of array area.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved MLS policy model 改进的MLS策略模型
Hangtian Liu, Z. Dai, Junwei Li, Yi Zhou
{"title":"An improved MLS policy model","authors":"Hangtian Liu, Z. Dai, Junwei Li, Yi Zhou","doi":"10.1109/ICASID.2016.7873915","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873915","url":null,"abstract":"Bell-LaPadula model is able to provide excellent protection for confidentiality, but is short of integrity policy. Moreover, its trusted subjects are endowed too much privilege to be conformed with the principle of least privilege. In order to resolve these problems, a new hybrid model called CIUSM is proposed, which takes Bell-LaPadula as the initial model. CIUSM organically absorbs ideas of well-formed transaction in Clark-Wilson model and domain separation in DTE model, which effectively remedy the loss of integrity policy and limit the accessible range of trusted subjects. Finally, safety of CIUSM and Bell-LaPadula are quantitatively estimated and compared based on security entropy theory. Research shows that CIUSM has higher security strength than BLP, being able to meet security requirements for both confidentiality and integrity.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信