期刊文献+
共找到130篇文章
< 1 2 7 >
每页显示 20 50 100
Physical-Layer Secret Key Generation for Dual-Task Scenarios
1
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
面向混沌激光熵源的安全随机数提取
2
作者 李瑞敏 李璞 +3 位作者 蔡强 王冰洁 马荔 徐兵杰 《光电子.激光》 CAS CSCD 北大核心 2023年第5期536-542,共7页
基于混沌激光的随机数发生器可以实现大量高速的真随机数产生。然而,受随机数产生过程中引入的额外技术噪声影响,原始随机数无法提供真随机性。为了从信息论的角度实现安全随机数的产生,必须定量评估熵源产生的随机性。本文中通过实验... 基于混沌激光的随机数发生器可以实现大量高速的真随机数产生。然而,受随机数产生过程中引入的额外技术噪声影响,原始随机数无法提供真随机性。为了从信息论的角度实现安全随机数的产生,必须定量评估熵源产生的随机性。本文中通过实验搭建基于混沌激光的随机数产生装置,使用条件最小熵评估原始随机数中可提取的真随机性。同时,通过更换不同的器件讨论关键参数对原始随机性的影响。在原始随机数的后处理提取过程中使用信息论可证安全的Toeplitz提取器,最终实现了安全随机数的产生。 展开更多
关键词 光通信 安全随机数 条件最小熵 混沌激光 随机性 信息论
原文传递
Humidity and seasonality drives body size patterns in males of the bush cricket Isophya rizeensis Sevgili, 2003 (Orthoptera: Tettigoniidae: Phaneropterinae) 被引量:1
3
作者 Selim S. Cagasan Cagasan Karacaoglu A. Cem Kuyucu ismail K. Saelam 《Insect Science》 SCIE CAS CSCD 2014年第2期213-226,共14页
Two primary patterns of body size variation have been recorded in ectotherms in relation to latitudinal/altitudinal shifts. In some, body size increases with increasing latitude/altitude whereas, in others, body size ... Two primary patterns of body size variation have been recorded in ectotherms in relation to latitudinal/altitudinal shifts. In some, body size increases with increasing latitude/altitude whereas, in others, body size decreases with increasing latitude/altitude. This clinal variation is generally assumed to be caused by local adaptation to environmental conditions however the selective variable(s) (temperature, humidity, diet quality, etc.) is still heavily debated. Here we investigate geographic variation in body size of dark and pale color morphs of males of the bush-cricket lsophya rizeensis collected from 15 locations along an elevation gradient ranging from 350 to 2 500 m. Using an information theoretical approach we evaluate the relative support of four different hypotheses (the temperature size rule, the moisture gradient hypothesis, the seasonal constraint hypothesis, and the primary productivity hypothesis) explaining body size variation along the altitudinal gradient. Body size variation in pale color morphs showed a curvilinear relationship with altitude while dark color morphs showed no variation in body size. Body size variation in pale color morphs was highly correlated with precipitation and temperature seasonality values thus giving strong support for the moisture gradient and seasonal constraint hypothesis. Our results reinforce the importance of gradients in humidity and seasonality over temperature in the creation of altitudinal body size clines and the role of selection for resistance to stress factors in the establishment of these clines. Whether a body size cline is observed or not might also depend on the phenotypic properties of the individuals, like coloration. 展开更多
关键词 altitude Bergmann's rule converse Bergmann's rule Flrtlna Valley information-theoretic temperature size rule
原文传递
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
4
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
Four counterfeit coins problem
5
作者 李安平 刘彦佩 《Chinese Science Bulletin》 SCIE EI CAS 1995年第22期1861-1868,共8页
Let S be the set of n coins,in which there are m counterfeit coins, heavier (or lighter) than the normals. How many weighings do we need to find the m fakes by a balance? Denote by g_m(n) the least number of weighings... Let S be the set of n coins,in which there are m counterfeit coins, heavier (or lighter) than the normals. How many weighings do we need to find the m fakes by a balance? Denote by g_m(n) the least number of weighings we need. 展开更多
关键词 COUNTERFEIT COINS information-theoretic BOUND
原文传递
Authentication-secrecy code based on conies over finite fields
6
作者 裴定一 王学理 《Science China(Technological Sciences)》 SCIE EI CAS 1996年第5期471-484,共14页
An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules fo... An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given. 展开更多
关键词 AUTHENTICATION CODE information-theoretic BOUND CONIC FINITE field.
原文传递
Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
7
作者 QIU Gang WANG Hong +1 位作者 WEI Shimin XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1849-1852,共4页
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols. 展开更多
关键词 verifiable secret sharing information-theoretic secure COMMITMENT RSA (Rivest Shamir Adleman) modulus
下载PDF
An Information-Theoretic Approach to Effective Inference for Z-functionals
8
作者 Chang Chun WU Run Chu ZHANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第11期1893-1906,共14页
In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, w... In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, we give a method of estimating the variance of finite population with known mean. The modified estimates and confidence intervals for Z-functionals can adequately use the auxiliary information, at least not worse than what the standard ones do. A simulation study is presented to assess the performance of the modified estimates for the finite sample case. 展开更多
关键词 confidence interval finite population modified Z-estimates information-theoretic approach Z-functional
原文传递
Ecogeographical variation of 12 morphological traits within Pinus tabulaeformis: the effects of environmental factors and demographic histories
9
作者 Mingfei Ji Jianming Deng +6 位作者 Buqing Yao Renfei Chen Zhexuan Fan Jiawei Guan Xiaowei Li Fan Wu Karl J.Niklas 《Journal of Plant Ecology》 SCIE CSCD 2017年第2期386-396,共11页
Aims More data are needed about how genetic variation(GV)and envi-ronmental factors influence phenotypic variation within the natural populations of long-lived species with broad geographic distribu-tions.To fill this... Aims More data are needed about how genetic variation(GV)and envi-ronmental factors influence phenotypic variation within the natural populations of long-lived species with broad geographic distribu-tions.To fill this gap,we examined the correlations among envi-ronmental factors and phenotypic variation within and among 13 natural populations of Pinus tabulaeformis consisting of four demo-graphically distinct groups within the entire distributional range.Methods Using the Akaike’s information Criterion(AiC)model,we measured 12 morphological traits and constructed alternative candidate models for the relationships between each morphological trait and key climatic variables and genetic groups.We then compared the AiC weight for each candidate model to identify the best approximating model for ecogeographical variation of P.tabulaeformis.The partitioning of vari-ance was assessed subsequently by evaluating the independent vari-ables of the selected best models using partial redundancy analysis.Important Findings Significant phenotypic variation of the morphological traits was observed both within individual populations and among populations.Variation partition analyses showed that most of the phenotypic variation was co-determined by both GV and climatic factors.GV accounted for the largest proportion of reproductive trait variation,whereas local key climatic factors(i.e.actual evapotranspiration,AET)accounted for the largest proportion of phenotypic variation in the remaining investigated traits.Our results indicate that both genetic divergence and key environmental factors affect the phenotypic variation observed among populations of this species,and that reproductive and vegetative traits adaptively respond differently with respect to local environmental conditions.This partitioning of factors can inform those making predictions about phenotypic variation in response to future changes in climatic conditions(particularly those affecting AET). 展开更多
关键词 Akaike’s information Criterion environmental factors genetic variation information-theoretic approach phenotypic variation
原文传递
Secrecy rate analysis of dual-hop AF relay wiretap channel
10
作者 丁飞 Song Aiguo +1 位作者 Li Jianqing Wu Zhenyang 《High Technology Letters》 EI CAS 2014年第4期390-394,共5页
An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate... An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate partners communicate over a quasi-static fading channel.Theoretical analysis and simulation results show that both cooperative strategies of average power scaling(APS) and instantaneous power scaling(IPS) are proved to be able to achieve information-theoretic security,and eavesdropper is unable to decode any information. 展开更多
关键词 secrecy rate information-theoretic security amplify-and-forward (AF) dual-hop RELAY wiretap channel
下载PDF
Incorporating within- and between-patch resource selection in identification of critical habitat for brood-rearing greater sage-grouse
11
作者 Matthew R Dzialak Chad V Olson +2 位作者 Stephen L Webb Seth M Harju Jeffrey B Winstead 《Ecological Processes》 SCIE EI 2015年第1期57-71,共15页
Introduction:Incorporating information on animal behavior in resource-based predictive modeling(e.g.,occurrence mapping)can elucidate the relationship between process and spatial pattern and depict habitat in terms of... Introduction:Incorporating information on animal behavior in resource-based predictive modeling(e.g.,occurrence mapping)can elucidate the relationship between process and spatial pattern and depict habitat in terms of its structure as well as its function.In this paper,we assigned location data on brood-rearing greater sage-grouse(Centrocercus urophasianus)to either within-patch(encamped)or between-patch(traveling)behavioral modes by estimating a movement-based relative displacement index.Objectives were to estimate and validate spatially explicit models of within-versus between-patch resource selection for application in habitat management and compare these models to a non-behaviorally adjusted model.Results:A single model,the vegetation and water resources model,was most plausible for both the encamped and traveling modes,including the non-behaviorally adjusted model.When encamped,sage-grouse selected for taller shrubs,avoided bare ground,and were closer to mesic areas.Traveling sage-grouse selected for greater litter cover and herbaceous vegetation.Preference for proximity to mesic areas was common to both encamped and traveling modes and to the non-behaviorally adjusted model.The non-behaviorally adjusted map was similar to the encamped model and validated well.However,we observed different selection patterns during traveling that could have been masked had behavioral state not been accounted for.Conclusions:Characterizing habitat that structured between-patch movement broadens our understanding of the habitat needs of brood-rearing sage-grouse,and the combined raster surface offers a reliable habitat management tool that is readily amenable to application by GIS users in efforts to focus sustainable landscape management. 展开更多
关键词 Behavioral mode Brood-rearing Centrocercus urophasianus Conditional logistic regression Conservation planning information-theoretic approach Relative displacement index Species occurrence model
原文传递
信息论联合聚类算法及其在视频镜头聚类中的应用 被引量:6
12
作者 王鹏 杨士强 刘志强 《计算机学报》 EI CSCD 北大核心 2005年第10期1692-1699,共8页
视频镜头自动聚类是基于内容索引与检索领域中的重要研究课题.以往相关工作,缺乏考虑描述镜头内容的特征与特征间存在关联性以及关联特征对镜头相似性度量和镜头聚类性能带来的影响.为提供更合理的镜头相似性度量,该文基于信息论联合聚... 视频镜头自动聚类是基于内容索引与检索领域中的重要研究课题.以往相关工作,缺乏考虑描述镜头内容的特征与特征间存在关联性以及关联特征对镜头相似性度量和镜头聚类性能带来的影响.为提供更合理的镜头相似性度量,该文基于信息论联合聚类算法,将特征关联性挖掘和镜头聚类描述为彼此依附的同步优化过程.同时,为自动估计视频中镜头类别数,文中还提出基于贝叶斯信息准则的类别数估计算法. 展开更多
关键词 视频索引与检索 视频镜头聚类 基于信息论联合聚类算法 贝叶斯信息准则
下载PDF
基于主成分分析的雷达辐射源信号数量估计 被引量:8
13
作者 陈韬伟 金炜东 《西南交通大学学报》 EI CSCD 北大核心 2009年第4期501-506,共6页
针对复杂电磁环境中雷达辐射源数的估计问题,提出了一种新的信息论准则.这种方法通过对接收到的脉冲信号包络向量进行主成分分析提取包络的特征值,并利用特征值按降序排列的曲线分布特点构造新的信息论准则,估计雷达辐射源数目.计... 针对复杂电磁环境中雷达辐射源数的估计问题,提出了一种新的信息论准则.这种方法通过对接收到的脉冲信号包络向量进行主成分分析提取包络的特征值,并利用特征值按降序排列的曲线分布特点构造新的信息论准则,估计雷达辐射源数目.计算机仿真实验表明,与已有的信息论准则相比,在低信噪比(4~8dB)下,雷达辐射源数的估计正确率平均提高29%,运行效率平均提高0.09s. 展开更多
关键词 主成分分析 信息论准则 雷达信号分选
下载PDF
GIS在中国区域地壳稳定性评价中的应用 被引量:7
14
作者 相建华 《山西建筑》 2006年第4期116-117,共2页
探讨了信息量法模型与GIS结合进行中国区域地壳稳定性评价的方法及基本程序,开发了相应的GIS空间扩展分析模块,从评价结果来看,此方法用于进行区域地壳稳定性评价是可行的。
关键词 地壳稳定性 信息量法 评价指标体系
下载PDF
基于稀疏矩阵的低复杂度安全网络编码算法 被引量:7
15
作者 徐光宪 付晓 《计算机工程》 CAS CSCD 2012年第9期55-57,共3页
针对安全网络编码复杂度较大的问题,提出一种基于稀疏矩阵的安全网络编码算法。利用稀疏矩阵占用较少的存储空间和运算速度快的优点,在信源处将信源信息与稀疏矩阵进行矩阵变换操作,使得随机网络编码能以较高的概率达到信息论安全的要... 针对安全网络编码复杂度较大的问题,提出一种基于稀疏矩阵的安全网络编码算法。利用稀疏矩阵占用较少的存储空间和运算速度快的优点,在信源处将信源信息与稀疏矩阵进行矩阵变换操作,使得随机网络编码能以较高的概率达到信息论安全的要求。仿真结果表明,该算法能提高编解码速率,降低复杂度,减少存储空间。 展开更多
关键词 网络编码 稀疏矩阵 矩阵变换 信息论安全 低复杂度
下载PDF
基于信息论网络的时序数据库挖掘 被引量:2
16
作者 林芝 曹加恒 +1 位作者 刘娟 韦丰 《计算机工程与应用》 CSCD 北大核心 2003年第1期188-190,219,共4页
介绍了如何对时序数据库进行数据库挖掘,其中包括数据预处理,识别重要的预测属性,提取相应的关联规则。文章采用的是基于信号处理和信息论网络的方法,并使用模糊和集成的概念来简化规则库。
关键词 时序数据库 数据挖掘 信息论网络 模糊化关联规则 证券数据库 证券交易
下载PDF
基于LU分解的安全外包求解线性代数方程组方法
17
作者 冯达 周福才 +1 位作者 吴淇毓 李鲍 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第4期457-463,506,共8页
由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解... 由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解线性代数方程组(information-theoretically secure outsourcing of linear algebraic equations,ITS-OutsLAE)方法 .与之前的研究相比,在保持计算和通信复杂度与现有最优方案保持一致的同时,首次将方程组唯一解的安全性提升至信息论安全(完美保密).给出了形式化的安全性证明,并通过理论分析和实验证明了所提方法的实用性. 展开更多
关键词 线性代数方程组 信息论安全 安全外包 LU分解 恶意敌手模型
下载PDF
通信感知一体化的信息理论极限 被引量:2
18
作者 熊一枫 刘凡 +7 位作者 袁伟杰 崔原豪 杨凯 武刚 张奇勋 尉志青 冯志勇 张平 《中国科学:信息科学》 CSCD 北大核心 2023年第11期2057-2086,共30页
无线感知已成为通信产业界广泛公认的、下一代无线网络中的原生能力.通信感知一体化将通信和感知功能集成在同一个无线系统中,能够提高资源利用率,减少基础设施开销,并增强通信和感知各自的性能.通信与感知间的性能折衷是通感一体化的... 无线感知已成为通信产业界广泛公认的、下一代无线网络中的原生能力.通信感知一体化将通信和感知功能集成在同一个无线系统中,能够提高资源利用率,减少基础设施开销,并增强通信和感知各自的性能.通信与感知间的性能折衷是通感一体化的关键基础理论问题之一.本文首先指出通感性能极限和可达性能边界是研究通感性能折衷的重要手段,然后从容量–失真理论、基于均方误差的通感性能边界理论、基于感知等效速率的通感性能边界理论,以及面向目标检测的通感性能边界理论4个方面出发,对相关的当前研究进展进行了详细总结与分析.文中指出通感性能折衷可进一步划分为确定–随机折衷和子空间折衷,并详细讨论了现有研究工作中与之相关的结论.在此基础上,讨论了基于实际的5G NR协议与帧结构的通感性能边界理论.最后,本文对通感一体化的信息理论极限中仍需关注和进一步研究的开放问题进行了总结. 展开更多
关键词 通信感知一体化 信息理论极限 通感性能折衷
原文传递
一种基于信息论距离的复杂图像分割方法 被引量:5
19
作者 聂方彦 李建奇 屠添翼 《红外技术》 CSCD 北大核心 2018年第8期786-791,共6页
工业生产场景下的图像成像环境复杂,在基于机器视觉的图像处理任务中要对该类图像实施精确分割很不容易。针对这一问题,应用信息论中的距离测度理论结合高斯分布提出一种基于信息论距离的图像阈值分割方法。在提出方法中运用信息论距离... 工业生产场景下的图像成像环境复杂,在基于机器视觉的图像处理任务中要对该类图像实施精确分割很不容易。针对这一问题,应用信息论中的距离测度理论结合高斯分布提出一种基于信息论距离的图像阈值分割方法。在提出方法中运用信息论距离度量分割前后图像信息的损失程度,通过最小化该距离获取最佳分割阈值,然后应用该阈值对图像进行分割。最后在工业无损检测图像、红外图像以及医学脑血管造影术图像上与几种经典及较新的图像分割方法进行了实验比较。结果表明,提出方法获得的结果视觉效果好,分割精度高,具有较好的应用推广前景。 展开更多
关键词 复杂图像 红外图像 信息论距离 高斯分布 图像分割
下载PDF
一类高维多响应变量误差模型的极小极大下界
20
作者 李欣 吴东亚 《纯粹数学与应用数学》 2023年第4期603-616,共14页
实际应用中经常会遇到误差数据的情形,例如生物信息学,神经影像和遥感研究等.现有方法主要考虑线性或广义线性回归的变量误差模型,而较少关注多响应回归的情形,并且如何评价协变量带有扰动时的估计性能,亦即信息理论极限,这仍然是一个... 实际应用中经常会遇到误差数据的情形,例如生物信息学,神经影像和遥感研究等.现有方法主要考虑线性或广义线性回归的变量误差模型,而较少关注多响应回归的情形,并且如何评价协变量带有扰动时的估计性能,亦即信息理论极限,这仍然是一个有待解决的问题.本文考虑了在高维多响应回归模型中估计一类低秩矩阵的信息理论极限.应用信息理论和关于集中不等式的统计技巧,本文以平方Frobenius损失函数的形式给出了极小极大下界,这一下界达到了以往文献在干净协变量假设下的收敛率.这一结果进一步表明即使在更具现实意义下的变量误差情形中,仍然不需要更多的样本以获得收敛率最优的估计. 展开更多
关键词 低秩矩阵 变量误差模型 极小极大下界 Kullback-Leibler散度 信息理论极限
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部