相关期刊:《Clean Energy》《The Journal of China Universities of Posts and Telecommunications》《Visual Computing for Industry,Biomedicine,and Art》《Chinese Journal of Electronics》更多>>
supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
funded by the Catedra Sanitas de Salud y Medio Ambiente of Universidad de Navarra;funded by the Agencia Estatal de Investigatión under the project“Gemelo Digital de Nueva Generatión de Edificios Inteligentes”(DigiTwin)(ref.CPP2021-008909).
European directives advocate for end-users to be aware of their energy consumption.However,individual energy monitoring tools,such as energy meters or cost allocators,are not always affordable or technically feasible ...
The severity of climate change and global warming necessitates the need for a transition from traditional hydrocarbon-based energy sources to renewable energy sources.One intrinsic challenge with renewable energy sour...
National Natural Science Foundation of China (Grant No. 61972306);Song Shan Laboratory (Grant No. YYJC012022005);Zhejiang Laboratory (Grant No. 2021KD0AB03)。
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting...
The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirica...
supported by the Beijing Natural Science Foundation(4232034);the Fundamental Research Funds for the Central Universities(328202222);the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...
National Natural Science Foundation of China,No.61972458;Natural Science Foundation of Zhejiang Province,No.LZ23F020002.
Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classif...
supported by the National Key R&D Program of China (Grant No. 2017YFB0802000);National Natural Science Foundations of China (Grant Nos. 61672412, 61972457, 61902303, U19B2021);National Cryptography Development Fund of China (Grant Nos. MMJJ20170104, MMJJ20180219);China Scholarship Council (Grant No. 201806960067);Key Research and Development Program of Shaanxi (Grant No. 2020ZDLGY08-04);Natural Science Basic Research Program of Shaanxi (Grant No. 2020JQ-832)。
White-box cryptography aims to provide secure cryptographic primitives and implementations for the white-box attack model, which assumes that an adversary has full access to the implementation of the cryptographic alg...
Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,qua...
supported by the National Key Research and Development Program of China (2017YFB0802000);the National Natural Science Foundations of China (61672412,61972457);the National Cryptography Development Fund of China (MMJJ20170104, MMJJ20180219)。
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto...