Supported by National Key Basic Research Program of China under Grand(2013CB834204);National Natural Science Foundation of China under Grand(61902276)。
supported by the National Basic Research Program of China(2013CB834204);the National Natural Science Foundation of China(61571243);the Fundamental Research Funds for the Central Universities of China;the Ph.D.Candidate Research Innovation Fund of Nankai University(91822144)
The compressed sensing matrices based on affine symplectic space are constructed. Meanwhile, a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. Mor...
supported by the National Key Basic Research Program of China (No. 2013CB834204);the National Natural Science Foundation of China (Nos. 61672300 and 61772291);the Natural Science Foundation of Tianjin, China (Nos. 16JCYBJC15500 and 17JCZDJC30500);the Open Project Foundation of Information Security Evaluation Center of Civil Aviation, and Civil Aviation University of China (No. CAACISECCA-201702)
The leakage of sensitive data occurs on a large scale and with increasingly serious impact. It may cause privacy disclosure or even property damage. Password leakage is one of the fundamental reasons for information l...
the National Key Basic Research Program of China (Grant: 2013CB834204);the National Natural Science Foundation of China (Grant: 61300242, 61772291);the Tianjin Research Program of Application Foundation and Advanced Technology (Grant: 15JCQNJC41500, 17JCZDJC30500);the Open Project Foundation of Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China (Grant: CAAC-ISECCA- 201701, CAAC-ISECCA-201702)
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution...
supported by the National Key Basic Research Program of China(No.2013CB834204);the National Natural Science Foundation of China(No.61171082,No.61301137)
This paper is devoted to the study of quadratics residue codes and their extended codes over a finite non-chain ring. A class of Gray maps preserving the self-duality from the ring to the finite field are introduced.S...
supported in part by the National Key Basic Research Program of China(No.2013CB834204);the National Natural Science Foundation of China(No.61171082);A Project of Shandong Province Higher Educational Science and Technology Program(No.J14LI56)
For an odd prime p which is congruent to 3 module 4 and an odd integer k,we investigate the upper bound on the magnitude of cross correlation values of a p-ary m-sequence s(t) and its decimated sequences s(dt + l) for...