the National Natural Science Foundation of China(Nos.61071152 and 61271316);the National Basic Research Program(973)of China(Nos.2010CB731406 and 2013CB329605);the National"Twelfth Five-Year"Plan for Science&Technology Support(No.2012BAH38B04)
In this paper,we propose a mathematical model of aggregate co-channel interference over Rayleigh fading in cognitive networks.Unlike the statistical models in the literature that aim at finding the bound or approximat...
Supported by the National Natural Science Foundation of China(61271316);National Key Basic Research Program of China(973 Program)(2010CB731403);Opening Project of State Key Laboratory for Manufacturing Systems Engineering of Xi’an Jiaotong University(sklms2012005)
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl...
the National Natural Science Foundation of China(Nos.61071152 and 61271316);the National Basic Research Program (973) of China(Nos.2010CB731406 and 2013CB329605);the National "Twelfth Five-Year" Plan for Science&Technology Support(No.2012BAH38B04)
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression,...
the National Natural Science Foundation of China(Nos.61071152 and 61271316);the National Basic Research Program (973) of China (Nos.2010CB731403 and 2010CB731406);the National "Twelfth Five-Year" Plan for Science and Technology Support(No.2012BAH38 B04)
Copy-paste forgery is a very common type of forgery in JPEG images.The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation.This phenomenon in JPEG image forgeries is cal...
Supported by the National Natural Science Foundation of China(61071152,61271316);the National Basic Research Program of China(2010CB731403,2010CB731406);the National Twelfth Five-Year Plan for Science&Technology Support(2012BAH38B04).
Detecting an overlapping and hierarchical community structure can give a significant insight into structural and functional properties in complex networks.We propose a micro-community structure merging model to detect...