IEICE Trans. Fundam. Electron. Commun. Comput. Sci.最新文献

筛选
英文 中文
A Study on AM-AM/PM Characteristics of a Single-Stage HBT Power Amplifier 单级HBT功率放大器AM-AM/PM特性研究
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020GCP0010
Satoshi Tanaka
{"title":"A Study on AM-AM/PM Characteristics of a Single-Stage HBT Power Amplifier","authors":"Satoshi Tanaka","doi":"10.1587/TRANSFUN.2020GCP0010","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020GCP0010","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sequences with Low Partial-Period Autocorrelation Sidelobes Constructed via Optimization Method 用优化方法构造低偏周期自相关副瓣序列
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020SDP0004
Mingxing Zhang, Zhengchun Zhou, Meng Yang, Haode Yan
{"title":"Sequences with Low Partial-Period Autocorrelation Sidelobes Constructed via Optimization Method","authors":"Mingxing Zhang, Zhengchun Zhou, Meng Yang, Haode Yan","doi":"10.1587/TRANSFUN.2020SDP0004","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020SDP0004","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133573022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness and Limitation of Blockchain in Distributed Optimization: Applications to Energy Management Systems 区块链在分布式优化中的有效性和局限性:在能源管理系统中的应用
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020MAI0001
Daiki Ogawa, Koichi Kobayashi, Y. Yamashita
{"title":"Effectiveness and Limitation of Blockchain in Distributed Optimization: Applications to Energy Management Systems","authors":"Daiki Ogawa, Koichi Kobayashi, Y. Yamashita","doi":"10.1587/TRANSFUN.2020MAI0001","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020MAI0001","url":null,"abstract":"A blockchain, which is well known as one of the distributed ledgers, has attracted in many research fields. In this paper, we discuss the effectiveness and limitation of a blockchain in distributed optimization. In distributed optimization, the original problem is decomposed, and the local problems are solved by multiple agents. In this paper, ADMM (Alternating Direction Method of Multipliers) is utilized as one of the powerful methods in distributed optimization. In ADMM, an aggregator is basically required for collecting the computation result in each agent. Using blockchains, the function of an aggregator can be contained in a distributed ledger, and an aggregator may not be required. As a result, tampering from attackers can be prevented. As an application, we consider energy management systems (EMSs). By numerical experiments, the effectiveness and limitation of blockchain-based distributed optimization are clarified. key words: ADMM, blockchains, distributed optimization, EMS","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Supervisors for Bisimilarity Control of Partially Observed Nondeterministic Discrete Event Systems with Deterministic Specifications 具有确定规范的部分观测不确定离散事件系统的双相似控制的确定性监督器
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020MAP0004
Kohei Shimatani, S. Takai
{"title":"Deterministic Supervisors for Bisimilarity Control of Partially Observed Nondeterministic Discrete Event Systems with Deterministic Specifications","authors":"Kohei Shimatani, S. Takai","doi":"10.1587/TRANSFUN.2020MAP0004","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020MAP0004","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A 26-GHz-Band High Back-Off Efficiency Stacked-FET Power Amplifier IC with Adaptively Controlled Bias and Load Circuits in 45-nm CMOS SOI 45纳米CMOS SOI中具有自适应控制偏置和负载电路的26ghz波段高背退效率堆叠fet功率放大器IC
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020GCP0012
T. Yoshimasu, Mengchu Fang, T. Sugiura
{"title":"A 26-GHz-Band High Back-Off Efficiency Stacked-FET Power Amplifier IC with Adaptively Controlled Bias and Load Circuits in 45-nm CMOS SOI","authors":"T. Yoshimasu, Mengchu Fang, T. Sugiura","doi":"10.1587/TRANSFUN.2020GCP0012","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020GCP0012","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123895665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Regret Analysis for Event-Triggered Distributed Online Optimization Algorithm 事件触发分布式在线优化算法的动态后悔分析
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-02-01 DOI: 10.1587/TRANSFUN.2020MAP0003
M. Yamashita, N. Hayashi, S. Takai
{"title":"Dynamic Regret Analysis for Event-Triggered Distributed Online Optimization Algorithm","authors":"M. Yamashita, N. Hayashi, S. Takai","doi":"10.1587/TRANSFUN.2020MAP0003","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020MAP0003","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions 针对可重复CCA的非延展性和其他rcca安全概念之间的等价性
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020cip0015
Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura
{"title":"Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions","authors":"Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura","doi":"10.1587/transfun.2020cip0015","DOIUrl":"https://doi.org/10.1587/transfun.2020cip0015","url":null,"abstract":"Replayable chosen ciphertext (RCCA) security was introduced by Canetti, Krawczyk, and Nielsen (CRYPTO 03) in order to handle an encryption scheme that is “non-malleable except tampering which preserves the plaintext”. RCCA security is a relaxation of CCA security and a useful security notion for many practical applications such as authentication and key exchange. Canetti et al. defined non-malleability against RCCA (NM-RCCA), indistinguishability against RCCA (IND-RCCA), and universal composability against RCCA (UC-RCCA). Moreover, they proved that these three security notions are equivalent when considering a PKE scheme whose plaintext space is super-polynomially large. Among these three security notions, NM-RCCA seems to play the central role since RCCA security was introduced in order to capture “non-malleability except tampering which preserves the plaintext.” However, their definition of NM-RCCA is not a natural extension of that of classical non-malleability, and it is not clear whether their NM-RCCA captures the requirement of classical non-malleability. In this paper, we propose definitions of indistinguishability-based and simulation-based non-malleability against RCCA by extending definitions of classical non-malleability. We then prove that these two notions of non-malleability and IND-RCCA are equivalent regardless of the size of plaintext space of PKE schemes.","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices 求解一般理想格上SVP的快速旋转高斯筛
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020cip0014
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, S. Kiyomoto
{"title":"Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices","authors":"Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, S. Kiyomoto","doi":"10.1587/transfun.2020cip0014","DOIUrl":"https://doi.org/10.1587/transfun.2020cip0014","url":null,"abstract":"The hardness in solving the shortest vector problem (SVP) is a fundamental assumption for the security of lattice-based cryptographic algorithms. In 2010, Micciancio and Voulgaris proposed an algorithm named the Gauss Sieve, which is a fast and heuristic algorithm for solving the SVP. Schneider presented another algorithm named the Ideal Gauss Sieve in 2011, which is applicable to a special class of lattices, called ideal lattices. The Ideal Gauss Sieve speeds up the Gauss Sieve by using some properties of the ideal lattices. However, the algorithm is applicable only if the dimension of the ideal lattice n is a power of two or n + 1 is a prime. Ishiguro et al. proposed an extension to the Ideal Gauss Sieve algorithm in 2014, which is applicable only if the prime factor of n is 2 or 3. In this paper, we first generalize the dimensions that can be applied to the ideal lattice properties to when the prime factor of n is derived from 2, p or q for two primes p and q. To the best of our knowledge, no algorithm using ideal lattice properties has been proposed so far with dimensions such as: 20, 44, 80, 84, and 92. Then we present an algorithm that speeds up the Gauss Sieve for these dimensions. Our experiments show that our proposed algorithm is 10 times faster than the original Gauss Sieve in solving an 80dimensional SVP problem. Moreover, we propose a rotation-based Gauss Sieve that is approximately 1.5 times faster than the Ideal Gauss Sieve. key words: shortest vector problem, Gauss Sieve, ideal lattice, generalization","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Range-Spread Target in Spatially Correlated Weibull Clutter Based on AR Spectral Estimation 基于AR谱估计的空间相关威布尔杂波中距离扩展目标检测
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2026
Jian Bai, Lu Ma
{"title":"Detection of Range-Spread Target in Spatially Correlated Weibull Clutter Based on AR Spectral Estimation","authors":"Jian Bai, Lu Ma","doi":"10.1587/transfun.2020eal2026","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2026","url":null,"abstract":"In high range resolution radar systems, the detection of range-spread target under correlated non-Gaussian clutter faces many problems. In this paper, a novel detector employing an autoregressive (AR) model is proposed to improve the detection performance. The algorithm is elaborately designed and analyzed considering the clutter characteristics. Numerical simulations and measurement data verify the effectiveness and advantages of the proposed detector for the range-spread target in spatially correlated non-Gaussian clutter. key words: high range resolution, range-spread target, spatially correlated non-Gaussian, AR model, CFAR","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114953763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Reverse-Engineering Attack against Systolic-Array-Based DNN Accelerator Using Correlation Power Analysis 基于相关功率分析的收缩阵列DNN加速器模型逆向工程攻击
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020cip0024
Kota Yoshida, M. Shiozaki, S. Okura, Takaya Kubota, T. Fujino
{"title":"Model Reverse-Engineering Attack against Systolic-Array-Based DNN Accelerator Using Correlation Power Analysis","authors":"Kota Yoshida, M. Shiozaki, S. Okura, Takaya Kubota, T. Fujino","doi":"10.1587/transfun.2020cip0024","DOIUrl":"https://doi.org/10.1587/transfun.2020cip0024","url":null,"abstract":"SUMMARY A model extraction attack is a security issue in deep neural networks (DNNs). Information on a trained DNN model is an attractive target for an adversary not only in terms of intellectual property but also of security. Thus, an adversary tries to reveal the sensitive information contained in the trained DNN model from machine-learning services. Previous studies on model extraction attacks assumed that the victim provides a machine-learning cloud service and the adversary accesses the service through formal queries. However, when a DNN model is implemented on an edge device, adversaries can physically access the device and try to reveal the sensitive information contained in the implemented DNN model. We call these physical model extraction attacks model reverse-engineering (MRE) attacks to distinguish them from attacks on cloud services. Power side-channel analyses are often used in MRE attacks to reveal the internal operation from power consumption or electromagnetic leakage. Previous studies, including ours, evaluated MRE attacks against several types of DNN processors with power side-channel analyses. In this paper, information leakage from a systolic array which is used for the matrix multiplication unit in the DNN processors is evaluated. We utilized correlation power analysis (CPA) for the MRE attack and reveal weight parameters of a DNN model from the systolic array. Two types of the systolic array were implemented on field-programmable gate array (FPGA) to demonstrate that CPA reveals weight parameters from those systolic arrays. In addition, we applied an extended analysis approach called “chain CPA” for robust CPA analysis against the systolic arrays. Our experimental results indicate that an adversary can reveal trained model parameters from a DNN accelerator even if the DNN model parameters in the o ff -chip bus are protected with data encryption. Countermeasures against side-channel leaks will be important for implementing a DNN accelerator on a FPGA or application-specific integrated circuit (ASIC).","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126768378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信