supported by the National Natural Science Foundation of China(61971120,62171285).
A modified Prandtl-Ishlinskii(PI)model with rate-dependent thresholds for describing the hysteresis characteristics of piezoelectric actuators is proposed.Based on the classical PI model,a novel threshold depending on...
supported by National Key Research and Development Program of China(2018YFB0904900,2018YFB0904901).
Side-channel attack(SCA)and fault attack(FA)are two classical physical attacks against cryptographic implementation.In order to resist them,we present a combined countermeasure scheme which can resist both SCA and FA....
the National Key Research and Development Plan(No.2016YFA0200504);the National Natural Science Foundation of China(No.61927901)。
As the physical size of metal-oxide-semiconductor field effect transistor approaches the end of scaling down,the effect of process-induced variations such as gate edge roughness on device performance cannot be neglect...
This work is supported by the National Natural Science Foundation of China(No.61305053,No.61273328,No.71203135).
Named entity recognition is a fundamental and crucial issue of biomedical data mining.For effectively solving this issue,we propose a novel approach based on Deep belief network(DBN).We select nine entity features,and...
supported by the National Natural Science Foundation of China(No.61671141,No.61501038,No.61501038,No.91438177,No.91538202)
Catering to the public nature of Ad hoc network in open channel and data communication being easily eavesdropped,this paper proposed an antieavesdropping algorithm which is based on network coding.The algorithm is bas...
supported by New Century Excellent Talents in University of Ministry of Education(No.NCET-12-0358);Technology Innovation Research Program in Shanghai Municipal Education Commission(No.12ZZ019);Supporting Program of the Twelfth Five-year Plan for Sci. and Tech. Research of China(No.2011BAK13B05,No.2014BAK06B00);the National Natural Sciences Foundation of China(No.61572028);the Foundation for Distinguished Young Teachers in Higher Education of Guangdong(No.Yq2013051);the Project of Science and Technology New Star of Guangzhou Pearl River(No.2014J2200006);the Natural Science Foundation of Guangdong(No.2014A030313439)
The threshold implementation method of Substitution box(S-box) has been proposed by Nikova et al. for resisting first-order Differential power attacks with glitches. To lower the time complexity for a threshold implem...
supported in part by the National Natural Science Foundation of China(No.61262057,No.61063041,No.61163038);the Young Teachers’Scientific Research Ability Promotion Program of Northwest Normal University(No.NWNU-LKQN-10-22)
To improve the performance of threshold proxy re-signatures, the notion of on-line/off-line threshold proxy re-signatures is introduced. The bulk of re-signature computation can be done in the off-line phase before th...
supported by the National Natural Science Foundation of China(No.61170298);Natural Science Fund for Colleges and Universities in Jiangsu Province(No.12KJD520007)
Verifiable secret sharing (VSS) is an impor- tant technique which has been used as a basic tool in dis- tributed cryptosystems, secure multi-party computations, as well as safe guarding some confidential information...
This work is supported by the Excellent Youth Foundation of He'nan Scientific Committee (No.104100510025) and the National Natural Science Foundation of China (No.60633020).
The design of threshold based distributed Certification authority (CA) has been proposed to provide secure and efficient key management service in Mobile ad hoc networks (MANETs), but most of previous work ig- nor...
This work is supported by the National Natural Science Foundation of China (No.61101077).
Coherent integration and non-coherent ac- cumulation have been developed to acquire weak Global position system (GPS) signals. The threshold of acquisi- tion algorithm is fixed, and is determined by the weak- est si...