ID |
原文 |
译文 |
57798 |
以正态分布的随机数作为噪声涨落的输入,对比分析了在不同压缩参量下电场强度正交分量随时间变化的关系以及在相同压缩参量下输入分别为真空态和压缩态时的情况. |
Subsequently,the random numbers with Gaussian distribution are used as the input of vacuum state or squeezed state to analyze the changing of the exacting quadrature components with time. |
57799 |
结果表明,该纠缠微波信号仿真模型所表示的电场强度能够反映出正交分量之间的正反关联特性,且关联度与压缩参量成正比,输入压缩度越高,关联度越高,与实验结论相吻合. |
It is shown that the quantum simulation model of entangled microwave signals can reflect the positive and negative correlation characteristics of quadrature components. The correlation degree is proportional to the squeezed parameter. |
57800 |
针对现有固件脆弱哈希函数识别误报率高、定位不准确、破解难度大等问题,提出一种嵌入式固件脆弱哈希函数自动识别与破解方法,基于机器学习模型和结构化匹配的脆弱哈希函数识别与定位技术以及基于 VEX 中间表达式( VEX IR) 符号执行的 Z3 约束求解器( Z3 SMT) 的求解方法,构建了从固件二进制文件的脆弱哈希函数的识别与定位到破解的完整自动化分析流程. |
There exist some problems for the existing firmware vulnerable Hash functions mining technolo- gy,for the reason that the identification error rate is high,the positioning is not accurate,the cracking is difficult and so on. To solve these problems,a method that uses vulnerable Hash functions identification and positioning technique based on machine learning model and a structured matching method is pro- posed. Meantime,constraint solution of Z3 satisfiability modulo theories ( Z3 SMT) based on VEX inter- mediate representation ( VEX IR) and symbol execution techniques for an automatic identification and cracking method or vulnerable Hash functions of embedded firmwares are proposed. |
57801 |
实验结果表明,所提方法对多种架构和不同编译优化选项下编译的二进制文件的脆弱哈希函数的识别与定位的准确率高达 98% ,对类似于 BKDR 哈希函数( BKDRHash) 结构的脆弱哈希函数能够准确定位,并快速破解出多个碰撞值. |
A complete automa- ted analysis process is constructed for the vulnerable Hash functions in the firmware binaries from being i- dentified and positioned to being cracked. Experiments show that the method can identify and position the vulnerable Hash functions in the binary files which compiled by multiple architectures and compiler opti- mization options with the accuracy rate as high as 98% ,vulnerable Hash functions with a structure simi- lar to the BKDRHash Hash function structure can be accurately positioned and quickly cracked out of many collision values. |
57802 |
针对合法接收端采用全双工模式时的自干扰消除问题,提出了一种在单输入多输出系统中,利用神经网络实现全双工合法接收端信号合并和自干扰消除的方案. |
Aiming at the problem of self-interference cancellation when the full-duplex mode is adopted by the legitimate receiver,a scheme is presented for signal combining and self-interference cancellation based on neural networks at the full-duplex legitimate receiver in a single-input multi-output system. |
57803 |
合法接收端在接收信号的同时发送人工噪声干扰窃听者. |
The legitimate receiver,while receiving signals,sends artificial noise to interfere with the eavesdropper. |
57804 |
设 计 2 个神经网络,一个用于接收信号的合并,另一个对接收信号中的自干扰进行对消. |
Two neural networks are designed,one combining the signals received by multiple antennas,and the other re- constructing self-interference for the self-interference cancellation of the received signals. |
57805 |
对合法接收端和窃听端的误比特率、可达保密速率等性能进行仿真的结果表明,信号合并和自干扰消除方案可行并有效,在适当配置接收端发射天线和接收天线数量后,可获得可观的系统保密速率. |
The bit error rates of the legitimate receiver and the eavesdropper and the achievable secrecy rate are simulated. The simulation results show that the signal combination and self-interference cancellation scheme is feasible and effective. They also show that a considerable secrecy rate can be achieved when the transmitting an- tennas and receiving antennas at the legitimate receiver are properly allocated. |
57806 |
同一用户在不同社交平台注册账号,使得用户数据分散于多个平台,且这些数据不全面、不可靠、利用率低. |
The same user registers accounts on different social platforms,which makes user data scattered across multiple platforms,and these data are incomplete,unreliable and low utilization. |
57807 |
通过分析这些跨平台的数据,发现不同账户对应同一用户的真实身份,使跨平台用户身份关联,以构建详细的用户画像、推荐系统、跨社交网络的链接预测等. |
By using these cross-platform data to discover the real identity of the same user corresponding to different accounts, cross-platform user identity association plays an important role in building detailed user profiles,recom- mendation systems,cross-social network link prediction and other cross-platform applications. |