- Advanced Malware Detection Techniques
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Distributed and Parallel Computing Systems
- Real-Time Systems Scheduling
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Security and Verification in Computing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Steganography and Watermarking Techniques
- Cloud Computing and Resource Management
- Vehicular Ad Hoc Networks (VANETs)
- Access Control and Trust
- China's Ethnic Minorities and Relations
- Cloud Data Security Solutions
- Technology and Security Systems
- Metal-Organic Frameworks: Synthesis and Applications
- Synthesis and Characterization of Heterocyclic Compounds
- Embedded Systems and FPGA Design
- Advanced Authentication Protocols Security
- Network Packet Processing and Optimization
- Biometric Identification and Security
- Mobile Agent-Based Network Management
Zhengzhou University
2010-2024
State Key Laboratory of Cryptology
2023
Yichun University
2011-2022
Xi'an University of Technology
2020
Harbin Institute of Technology
2018
PLA Information Engineering University
2008-2018
National University of Defense Technology
2015
Louisiana State University
2014
Beijing University of Posts and Telecommunications
2009
China United Network Communications Group (China)
2006
A convolutional neural network-based multiobject detection and tracking algorithm can be applied to vehicle traffic flow statistics, thus enabling smart transportation. Aiming at the problems of high computational complexity algorithms, a large number model parameters, difficulty in achieving throughput with low power consumption edge devices, we design implement low-power, low-latency, high-precision, configurable detector based on field programmable gate array (FPGA) YOLOv3...
As a distributed database mapping the domain name and IP address, DNS makes it easier to access Internet However, relies on resolution of root server, which is hierarchical network topology centered root. It vulnerable single points failure data tampered, affects normal service seriously. To solve this problem, we proposed new blockchain-based decentralization storage method by studying principle characteristics blockchain. And implement system DecDNS establish multiple parallel nodes, store...
Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems blockchains to varying degrees. As an important component blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order improve calculation performance function,...
In lattice-based postquantum cryptography (PQC), polynomial multiplication is complex and time-consuming, which affects the overall computational efficiency. addition, parameters of different algorithms require number theoretic transform (NTT) structures, limits versatility hardware design. To this end, article proposes scalable parallel optimization NTT based on a field-programmable gate array (FPGA). By analyzing algorithm flow NTT, inverse (INTT), pointwise (PWM), an FPGA loosely coupled...
Job-shop scheduling, a typical NP-complete problem, is an important step in planning and manufacturing control of CIMS environments. Researches on job-shop scheduling focus knowledge-based approaches heuristic searching which are useful apart from the difficulty obtaining knowledge. Genetic algorithms optimization methods use ideas evolution nature. Simple as genetic are, they efficient. Three novel models, such decimal idle time coding (DITCGA), binary (BITCGA), adaptive (AITCGA), presented...
With the rapid development of Internet, increasingly more attention has been paid to network security problems. A defense technology become a very important research field. Currently, most equipment transmits data in plaintext at link layer, which exposes information, such as IP addresses, port numbers, and application protocols, an attacker provides opportunity for attacks. To protect against attacks ensure its security, this paper proposes mimic encryption system security. Based on...
With the rapid development of Internet, security network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic (CMD) approaches provide a new way to solve this problem. To enhance data, paper proposes encryption box for security. can directly access where device is located, automatically complete negotiation, safe convenient services, effectively prevent attacks. According principles dynamization, diversification, randomization, uses...
In recent years, single-ISA heterogeneous chip multiprocessors (CMP) consisting of big high-performance cores and small power-saving on the same die have been proposed for exploration high energy-efficiency. On such platforms, an appropriate runtime scheduling policy lies at heart program executions to benefit from processor heterogeneity. To date, most prior works addressing this problem concentrate performance enhancement; however, they lack detailed justification energy consumption do not...
Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether device being control-flow hijacked by launching challenge-response process. In the growing landscape of Internet Things, more and peer devices need to communicate share sensed data conduct inter-operations without involvement trusted center. Toward scalability CFA mechanisms mitigating single-point failure, it important design decentralized schema. This...
Cryptography algorithms are crucial technologies in today's network security, playing important roles areas such as cloud data, digital currencies, and blockchain. In this paper, based on the FPGA platform, we propose a high-performance hybrid encryption scheme by integrating mimic defense with multiple algorithms. Firstly, optimize 3DES, ZUC, ChaCha20 using pipelining approach incorporate them heterogeneous execution units architecture, achieving high-speed of data. Secondly, generate...
Cryptographic algorithms are widely used in information security fields such as network protocol authentication and commercial encryption software.Password recovery based on the hash algorithm is an important means of electronic forensics, encrypted restoration, illegal filtering, maintenance.The traditional password system mainly CPU GPU has a low energy efficiency ratio cracking cannot meet high-performance computing requirements.To further improve computational application flexibility...
In recent years, the adversarial example has become a non-trivial threat to deep learning model. It harms availability and integrity of as inconspicuous perturbation is hard be distinguished by human observer. Among mitigation strategies, those schemes using moving target defense methodology defend examples proclaims satisfactory performance in black-box context. As for protecting models from white-box adversaries, however, only scheduling model candidate set randomly handle these stronger...
With the rapid development of Internet Vehicles (IoV), demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an SM9 aggregate scheme implemented on Field-Programmable Gate Array (FPGA). The includes both fault-tolerant non-fault-tolerant modes, which are designed to address challenges in various network environments. We provide security proofs these two modes based a K-ary Computational Additive Diffie-Hellman (K-CAA) difficult...
Transport MPLS (T-MPLS) is regarded as one of the most important transport technologies in next generation network (NGN). It a connection-oriented packet technology that developed from techniques and now defined by ITU-T SG13 & SG15. In this paper, we analyze architecture T-MPLS networks. Also building blocks for modular design common wireless equipment are introduced. And based on functional blocks, four-layer simulation model developed. A cascaded transfer scheme proposed to save bandwidth...
The optimal allocation of resources is great significance to improve the efficiency and reduce cost equipment manufacturing.For shortage traditional Hungary algorithm that cannot solve resource scheduling problem containing parallel jobs, an improved proposed in this paper.The converts a typical assignment by replacing link with virtual job.And then, optimizing it classical determining realizability job based on result.Finally, scheme will be got through iterative searching.In addition,...
A current research trend is to combine multimedia data with artificial intelligence and process them on cloud servers. In this context, ensuring the security of servers critical, cyber mimic defence (CMD) technology a promising approach end. CMD, which an innovative active developed in China, can be applied many scenarios. However, although mathematical model key component universally acceptable for theoretical CMD has not been established yet. work, attack problems modelling difficulties...
To strengthen the security of edge network data and reduce latency, in this paper, we combine an advanced reduced instruction set computing machine (ARM) a field programmable gate array (FPGA) to propose lightweight ARM-FPGA architecture for protection acceleration. Firstly, access control lists are through FPGA authorize filter illegal data, thereby reducing transmission processing invalid on network. Secondly, based principles dynamization, diversification, randomization, initial random...
Code randomization, aka software diversification, is an effective way to mitigate code-reuse attacks. This mechanism diversifies the target into heterogeneous variants, making a specific attack chain unfeasible for transformed variants. Enhancing heterogeneity of these variants important this method reach its expected security level. Additionally, limiting their execution overhead necessary ensure availability protection. However, finding optimal subset among large number diversified...