supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
The University Grants Commission,Government of India,supported the research work in the form of a Junior Research Fellowship(190520461818).
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end cons...
supported by National Natural Science Foundation of China(Grant Nos.61731002,62271024)。
Size generalization is important for learning resource allocation policies in wireless systems with time-varying scales.If a neural network for learning a wireless policy is not generalizable to the size of its input,...
supported by the National Natural Science Foundation of China(61772547,61902428,61802438,61672031);the Foundation of Key Laboratory of National Defense Science and Technology(61421030107).
Recently, a new cryptographic primitive has been proposed called ForkCiphers. This paper aims at proposing new generic cryptanalysis against such constructions. We give a generic method to apply existing decomposition...
the National Natural Science Foundation of China(Grant No.62061014);the Provincial Natural Science Foundation of Liaoning(Grant No.2020-MS-274);the Basic Scientific Research Projects of Colleges and Universities of Liaoning Province,China(Grant No.LJKZ0545).
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam...
Universiti Sains Malaysia for Short Term Grant with Grant Number 304/PMATHS/6315390.
The effectiveness of the logic mining approach is strongly correlated to the quality of the induced logical representation that represent the behaviour of the data.Specifically,the optimum induced logical representati...
partially supported by the UIC Grants(Nos.R201810,R201912 and R202010);the Zhuhai Premier Discipline Grant.
Experimental design is an effective statistical tool that is extensively applied in modern industry,engineering,and science.It is proved that experimental design is a powerful and efficient means to screen the relatio...
This work was supported by Taif university Researchers Supporting Project Number(TURSP-2020/114),Taif University,Taif,Saudi Arabia.
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very ...
supported by the National Natural Science Foundation of China (Grant No. 61672124);the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203);the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013);the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103);the Jinan City 20-University Funding Projects for Introducing Innovation Team Program,China (Grant No. 2019GXRC031)。
The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSB...
Supported by the National Natural Science Foundation of China(No.61862003,61761006);the Natural Science Foundation of Guangxi of China(No.2018GXNSFDA281052,2017GXNSFAA198263)。
A new diagnosis method, called Double-Syndrome diagnostic, is proposed, which can identify faulty nodes by comparing 2 different syndromes. For the same system, the average number of faulty nodes identified correctly ...