Background:The analysis of communication tools used in advocacy is currently a topical research problem in the context of dynamic information communication in the sociopolitical space.Aims and Objectives:The aim of th...Background:The analysis of communication tools used in advocacy is currently a topical research problem in the context of dynamic information communication in the sociopolitical space.Aims and Objectives:The aim of the study was to analyze the attorney’s request as a means of obtaining information by attorneys to carry out their professional activity.Materials and Methods:The research was conducted with the help of numerous methods,the method of expert interviews being the leading one.It was used to single out the procedural characteristics and prospects of the attorney’s request in presentday Ukraine.Results:Attention is drawn to a number of issues that complicate the process of submitting attorney’s request and a proper use of this mechanism and procedure by an attorney.The ratification of the EU-Ukraine Association Agreement opens up new prospects not only for Ukrainian and European producers but also provides for interesting objectives for attorneys to consult the private sector in the process of building new markets.Conclusion:In this article,it was suggested to compare and analyze the issue of the attorney’s request in Ukrainian and Polish legal framework.As a result of the research,problems were identified,and proposals were made for a simplified procedure for submitting an attorney’s request as a communication instrument in advocacy.展开更多
The identification of load model parameters from practical measurement data has become an essential method to build load models for power system simulation,analysis and control.In practical situations,the accuracy of ...The identification of load model parameters from practical measurement data has become an essential method to build load models for power system simulation,analysis and control.In practical situations,the accuracy of the load model parameters identification results is impacted by data quality and measurement accuracy,which leads to the problem of identifiability.In this paper,an identifiability analysis methodology of load model parameters,by estimating the confidential intervals(CIs)of the parameters,is proposed.The load model structure and the combined optimization and regression method to identify the parameters are first introduced.Then,the definition and analysis method of identifiability are discussed.The CIs of the parameters are estimated through the profile likelihood method,based on which a practical identifiability index(PII)is defined to quantitatively evaluate identifiability.Finally,the effectiveness of the proposed analysis approach is validated by the case study results in a practical provincial power grid.The results show that the impact of various disturbance magnitudes,measurement errors and data length can all be reflected by the proposed PII.Furthermore,the proposed PII can provide guidance in data length selection in practical load model identification situations.展开更多
In this paper, algorithms of automatic identification of persons on the basis of their photographs are considered. For identification of persons, the comparative analysis of control systems by bases of images created ...In this paper, algorithms of automatic identification of persons on the basis of their photographs are considered. For identification of persons, the comparative analysis of control systems by bases of images created in the different periods is carried out and their applied possibilities are shown.展开更多
In recent years, a growing number of foreign companies and individuals were involved in geodata violations in China. The Chinese government is facing greater pressure to protect confidential geodata within its territo...In recent years, a growing number of foreign companies and individuals were involved in geodata violations in China. The Chinese government is facing greater pressure to protect confidential geodata within its territory. Geodata violations occurred in the course of illegal mapping and surveying, geographical and geological data collection and transactions. Although China has reformed laws and regulations to refine some aspects of confidential geodata management, existing rules remain ambiguous and controversial. This article aims to address the liability concerns raised among foreign companies from geodata violations. After defining the three most significant concepts, geological data, mapping and surveying, and state secrets, this article reviews the status quo, reasons for and impacts of geodata violations in China, to find out how big the problem is and why it matters. It then explores the legislative framework of state secrets protection in the context of geodata management; special focus is put on liability issues and problems of the current system. As a response to existing arguments, possible ways to improve confidential geodata protection and some practical tips for foreign businesses are offered.展开更多
This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the defi...This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future.展开更多
Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a...Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a variety of confidential computing technology routes,with significant differences in the principles and interfaces of implementation.There is an urgent need to develop relevant standards and specifications and guide the design,development,deployment and application of confidential computing related products.This paper introduces the development progress of the national standard project“Information security techniques—General framework for the confidential computing”and its pilot application scenarios across various industries.Additionally,it proposes suggestions on modifying and improving the standard to promote the healthy development of the confidential computing industry ecosystem.展开更多
As a more trackable performance metric for secrecy capacity,the secure degrees of freedom(SDoF)are widely studied for most multiuser networks in the high signal to noise ratio(SNR)region.However,the SDoF for these net...As a more trackable performance metric for secrecy capacity,the secure degrees of freedom(SDoF)are widely studied for most multiuser networks in the high signal to noise ratio(SNR)region.However,the SDoF for these networks under rank-deficiency and arbitrary antenna configurations have not yet been determined.In this paper,the SDoF of two-user general multiple-input multiple-output(MIMO)interference channel with confidential messages(ICCM)under rank-deficiency are derived.For the two-user rank-deficient MIMO ICCM,the model is generalized to fully asymmetric settings,where the transmitters and receivers are equipped with arbitrary antennas.The outer bound of SDoF is the union of three outer bounds that are based on the Fano’s inequality and the secrecy constraints,the secrecy penalty lemma and the role of a helper lemma,and the transmitters cooperation,respectively.The SDoF region is subdivided into five regions according to the number of transceivers antennas,and each region has an achievability scheme with designed null space transmission and alignment techniques.Numerical results indicate that the SDoF increase at first and then decrease as the rank of the channel matrix decreases.The SDoF improve by increasing the transmitting antenna or reducing receiving antenna,but the effect of the transmitting antenna is greater.展开更多
In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a...In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified.展开更多
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo...With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)for scalable processing or collaborative learning.Thus,sensitive data and models are in danger of unauthorized access,misuse,and privacy compromises.A relatively new body of research confidentially trains machine learning models on protected data to address these concerns.In this survey,we summarize notable studies in this emerging area of research.With a unified framework,we highlight the critical challenges and innovations in outsourcing machine learning confidentially.We focus on the cryptographic approaches for confidential machine learning(CML),primarily on model training,while also covering other directions such as perturbation-based approaches and CML in the hardware-assisted computing environment.The discussion will take a holistic way to consider a rich context of the related threat models,security assumptions,design principles,and associated trade-offs amongst data utility,cost,and confidentiality.展开更多
Traditional human detection using pre-trained detectors tends to be computationally intensive for time-critical tracking tasks, and the detection rate is prone to be unsatisfying when occlusion, motion blur and body d...Traditional human detection using pre-trained detectors tends to be computationally intensive for time-critical tracking tasks, and the detection rate is prone to be unsatisfying when occlusion, motion blur and body deformation occur frequently. A spatial-confidential proposal filtering method(SCPF) is proposed for efficient and accurate human detection. It consists of two filtering phases: spatial proposal filtering and confidential proposal filtering. A compact spatial proposal is generated in the first phase to minimize the search space to reduce the computation cost. The human detector only estimates the confidence scores of the candidate search regions accepted by the spatial proposal instead of global scanning. At the second phase, each candidate search region is assigned with a supplementary confidence score according to their reliability estimated by the confidential proposal to reduce missing detections. The performance of the SCPF method is verified by extensive tests on several video sequences from available public datasets. Both quantitatively and qualitatively experimental results indicate that the proposed method can highly improve the efficiency and the accuracy of human detection.展开更多
文摘Background:The analysis of communication tools used in advocacy is currently a topical research problem in the context of dynamic information communication in the sociopolitical space.Aims and Objectives:The aim of the study was to analyze the attorney’s request as a means of obtaining information by attorneys to carry out their professional activity.Materials and Methods:The research was conducted with the help of numerous methods,the method of expert interviews being the leading one.It was used to single out the procedural characteristics and prospects of the attorney’s request in presentday Ukraine.Results:Attention is drawn to a number of issues that complicate the process of submitting attorney’s request and a proper use of this mechanism and procedure by an attorney.The ratification of the EU-Ukraine Association Agreement opens up new prospects not only for Ukrainian and European producers but also provides for interesting objectives for attorneys to consult the private sector in the process of building new markets.Conclusion:In this article,it was suggested to compare and analyze the issue of the attorney’s request in Ukrainian and Polish legal framework.As a result of the research,problems were identified,and proposals were made for a simplified procedure for submitting an attorney’s request as a communication instrument in advocacy.
基金supported by National Natural Science Foundation of China under Grant No.52107066 and 5210071352.
文摘The identification of load model parameters from practical measurement data has become an essential method to build load models for power system simulation,analysis and control.In practical situations,the accuracy of the load model parameters identification results is impacted by data quality and measurement accuracy,which leads to the problem of identifiability.In this paper,an identifiability analysis methodology of load model parameters,by estimating the confidential intervals(CIs)of the parameters,is proposed.The load model structure and the combined optimization and regression method to identify the parameters are first introduced.Then,the definition and analysis method of identifiability are discussed.The CIs of the parameters are estimated through the profile likelihood method,based on which a practical identifiability index(PII)is defined to quantitatively evaluate identifiability.Finally,the effectiveness of the proposed analysis approach is validated by the case study results in a practical provincial power grid.The results show that the impact of various disturbance magnitudes,measurement errors and data length can all be reflected by the proposed PII.Furthermore,the proposed PII can provide guidance in data length selection in practical load model identification situations.
文摘In this paper, algorithms of automatic identification of persons on the basis of their photographs are considered. For identification of persons, the comparative analysis of control systems by bases of images created in the different periods is carried out and their applied possibilities are shown.
文摘In recent years, a growing number of foreign companies and individuals were involved in geodata violations in China. The Chinese government is facing greater pressure to protect confidential geodata within its territory. Geodata violations occurred in the course of illegal mapping and surveying, geographical and geological data collection and transactions. Although China has reformed laws and regulations to refine some aspects of confidential geodata management, existing rules remain ambiguous and controversial. This article aims to address the liability concerns raised among foreign companies from geodata violations. After defining the three most significant concepts, geological data, mapping and surveying, and state secrets, this article reviews the status quo, reasons for and impacts of geodata violations in China, to find out how big the problem is and why it matters. It then explores the legislative framework of state secrets protection in the context of geodata management; special focus is put on liability issues and problems of the current system. As a response to existing arguments, possible ways to improve confidential geodata protection and some practical tips for foreign businesses are offered.
基金Funded by DFG Grants 389792660 as part of TRR 248—CPECand 390696704 as part of CeTI.
文摘This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future.
文摘Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a variety of confidential computing technology routes,with significant differences in the principles and interfaces of implementation.There is an urgent need to develop relevant standards and specifications and guide the design,development,deployment and application of confidential computing related products.This paper introduces the development progress of the national standard project“Information security techniques—General framework for the confidential computing”and its pilot application scenarios across various industries.Additionally,it proposes suggestions on modifying and improving the standard to promote the healthy development of the confidential computing industry ecosystem.
基金supported by the National Key Research and Development(R&D)Program of China(2018YFE0205503)the National Natural Science Foundation of China(62071066)。
文摘As a more trackable performance metric for secrecy capacity,the secure degrees of freedom(SDoF)are widely studied for most multiuser networks in the high signal to noise ratio(SNR)region.However,the SDoF for these networks under rank-deficiency and arbitrary antenna configurations have not yet been determined.In this paper,the SDoF of two-user general multiple-input multiple-output(MIMO)interference channel with confidential messages(ICCM)under rank-deficiency are derived.For the two-user rank-deficient MIMO ICCM,the model is generalized to fully asymmetric settings,where the transmitters and receivers are equipped with arbitrary antennas.The outer bound of SDoF is the union of three outer bounds that are based on the Fano’s inequality and the secrecy constraints,the secrecy penalty lemma and the role of a helper lemma,and the transmitters cooperation,respectively.The SDoF region is subdivided into five regions according to the number of transceivers antennas,and each region has an achievability scheme with designed null space transmission and alignment techniques.Numerical results indicate that the SDoF increase at first and then decrease as the rank of the channel matrix decreases.The SDoF improve by increasing the transmitting antenna or reducing receiving antenna,but the effect of the transmitting antenna is greater.
文摘In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified.
基金the National Science Foundation under grant no.1245847the National Institute of Health under grant no.1R43AI136357-01A1.
文摘With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)for scalable processing or collaborative learning.Thus,sensitive data and models are in danger of unauthorized access,misuse,and privacy compromises.A relatively new body of research confidentially trains machine learning models on protected data to address these concerns.In this survey,we summarize notable studies in this emerging area of research.With a unified framework,we highlight the critical challenges and innovations in outsourcing machine learning confidentially.We focus on the cryptographic approaches for confidential machine learning(CML),primarily on model training,while also covering other directions such as perturbation-based approaches and CML in the hardware-assisted computing environment.The discussion will take a holistic way to consider a rich context of the related threat models,security assumptions,design principles,and associated trade-offs amongst data utility,cost,and confidentiality.
基金Projects(61175096,60772063)supported by the National Natural Science Foundation of China
文摘Traditional human detection using pre-trained detectors tends to be computationally intensive for time-critical tracking tasks, and the detection rate is prone to be unsatisfying when occlusion, motion blur and body deformation occur frequently. A spatial-confidential proposal filtering method(SCPF) is proposed for efficient and accurate human detection. It consists of two filtering phases: spatial proposal filtering and confidential proposal filtering. A compact spatial proposal is generated in the first phase to minimize the search space to reduce the computation cost. The human detector only estimates the confidence scores of the candidate search regions accepted by the spatial proposal instead of global scanning. At the second phase, each candidate search region is assigned with a supplementary confidence score according to their reliability estimated by the confidential proposal to reduce missing detections. The performance of the SCPF method is verified by extensive tests on several video sequences from available public datasets. Both quantitatively and qualitatively experimental results indicate that the proposed method can highly improve the efficiency and the accuracy of human detection.