ID 原文 译文
3303 综合考虑证据矩阵相似特性和冲突特性,将冲突子空间奇异值与相似子空间奇异值之比作为新的冲突度量因子。 Considering the similarity and conflict characteristics of the evidence matrix, and the ratio of the singular value of the conflict subspace to the singular value of the similar subspace was taken as the new conflict measure factor.
3304 最后在全冲突场景、变信度场景、变焦元场景、焦元嵌套场景等多种证据冲突场景下将所提方法与常见方法进行了对比分析, Finally, the proposed method was compared with common methods in var-ious evidence conflict scenarios, such as full conflict scenario, variable reliability scenario, variable focus element scena-rio, focal element nested scenario,
3305 结果表明所提方法具有适应性广、准确性高、稳定性好的特点。 and the results show that the proposed method has wide adaptability, high accuracy and good stability.
3306 针对车联网中共谋节点可能协同发布虚假路况信息,导致路况信息共享过程中消息真实性无法保证的问题,提出了一种基于信誉积分的路况信息共享中共谋攻击节点检测方法。 Aiming at the problem that on occasion of the release of false road condition information by collusion nodes inthe Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition in-formation sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputa-tion points was proposed.
3307 在路况信息聚合过程中,设计了恶意信息检测算法,能够检测到共谋节点发布的虚假消息,保证系统中传递消息的真实准确。 In the process of road condition information aggregation, a malicious information detection al-gorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accu-racy of messages delivered in the system.
3308 安全性评估和实验表明,相比于现有方案,该方法对共谋节点的检测效率更高,共谋节点数量占比适应场景更广泛。 Experimental results show that the proposed method has higher detection effi-ciency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments incomparison with the existing schemes.
3309 首先,提出了类 MARS 密码结构,给出了该密码结构的若干线性特性,并给出了线性变换的一种优化设计方法。 A MARS-like cryptographic structure was proposed and some linear properties of this cryptographic structure were given. An optimal design method of linear transformation in MARS-like cryptographic structure was also given.
3310 具体地,通过分析一类具有特殊结构的线性逼近的传递规律,证明了无论怎样设计线性变换,t(1≤t≤3)轮线性逼近中至少有一条活动轮函数个数为 0 的线性逼近; Concretely, by analyzing the transfer law of a class of linear approximation with special structure, regardless of the se-lected linear bijection, the existence of the linear approximation with 0 active round function in the t(1≤t≤3) round hadbeen demonstrated.
3311 4 轮线性逼近中至少有一条活动轮函数个数不超过 1 的线性逼近;t(t>4)轮线性逼近中至少有一条活动轮函数个数不超过⌊8t/15⌋的线性逼近。 Furthermore, there was at least one with no more than 1, ⌊8t/15⌋ active round function among the 4,t(t>4)-round of linear approximation, respectively.
3312 在此基础上,给出了类 MARS 密码结构中线性变换的一种优化设计方法,该优化设计使活动轮函数个数的下界与 MARS密码结构相比更加接近可能的最大值。 On this basis, an optimal design method was proposed to make thelower bound of the number of active round function closer to the maximum possible value than the MARS cryptographicstructure for the linear transformation in the MARS-like cryptographic structure.