The search functionality is under construction.

Author Search Result

[Author] Hao Luo(21hit)

1-20hit(21hit)

  • Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing

    Shuzhuang ZHANG  Hao LUO  Binxing FANG  Xiaochun YUN  

     
    PAPER-DRM and Security

      Vol:
    E92-D No:10
      Page(s):
    1953-1960

    Scanning packet payload at a high speed has become a crucial task in modern network management due to its wide variety applications on network security and application-specific services. Traditionally, Deterministic finite automatons (DFAs) are used to perform this operation in linear time. However, the memory requirements of DFAs are prohibitively high for patterns used in practical packet scanning, especially when many patterns are compiled into a single DFA. Existing solutions for memory blow-up are making a trade-off between memory requirement and memory access of processing per input character. In this paper we proposed a novel method to drastically reduce the memory requirements of DFAs while still maintain the high matching speed and provide worst-case guarantees. We removed the duplicate transitions between states by dividing all the DFA states into a number of groups and making each group of states share a merged transition table. We also proposed an efficient algorithm for transition sharing between states. The high efficiency in time and space made our approach adapted to frequently updated DFAs. We performed several experiments on real world rule sets. Overall, for all rule sets and approach evaluated, our approach offers the best memory versus run-time trade-offs.

  • Efficient and Precise Profiling, Modeling and Management on Power and Performance for Power Constrained HPC Systems

    Yuan HE  Yasutaka WADA  Wenchao LUO  Ryuichi SAKAMOTO  Guanqin PAN  Thang CAO  Masaaki KONDO  

     
    PAPER

      Pubricized:
    2020/12/01
      Vol:
    E104-C No:6
      Page(s):
    237-246

    Due to the slowdown of Moore's Law, power limitation has been one of the most critical issues for current and future HPC systems. To more efficiently utilize HPC systems when power budgets or deadlines are given, it is very desirable to accurately estimate the performance or power consumption of applications before conducting their tuned production runs on any specific systems. In order to ease such estimations, we showcase a straight-forward and yet effective method, based on the enhanced power management framework and DSL we developed, to help HPC users to clarify the performance and power relationships of their applications. This method demonstrates an easy process of profiling, modeling and management on both performance and power of HPC systems and applications. In our evaluations, only a few (up to 3) profiled runs are necessary before very precise models of HPC applications can be obtained through this method (and algorithm), which has dramatically improved the efficiency of and lowered the difficulty in utilizing HPC systems under limited power budgets.

  • Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis

    Shi-Ze GUO  Zhe-Ming LU  Zhe CHEN  Hao LUO  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E94-D No:11
      Page(s):
    2284-2287

    This Letter defines thirteen useful correlation measures for directed weighted complex network analysis. First, in-strength and out-strength are defined for each node in the directed weighted network. Then, one node-based strength-strength correlation measure and four arc-based strength-strength correlation measures are defined. In addition, considering that each node is associated with in-degree, out-degree, in-strength and out-strength, four node-based strength-degree correlation measures and four arc-based strength-degree correlation measures are defined. Finally, we use these measures to analyze the world trade network and the food web. The results demonstrate the effectiveness of the proposed measures for directed weighted networks.

  • Out-of-Sequence Traffic Classification Based on Improved Dynamic Time Warping

    Jinghua YAN  Xiaochun YUN  Hao LUO  Zhigang WU  Shuzhuang ZHANG  

     
    PAPER-Information Network

      Vol:
    E96-D No:11
      Page(s):
    2354-2364

    Traffic classification has recently gained much attention in both academic and industrial research communities. Many machine learning methods have been proposed to tackle this problem and have shown good results. However, when applied to traffic with out-of-sequence packets, the accuracy of existing machine learning approaches decreases dramatically. We observe the main reason is that the out-of-sequence packets change the spatial representation of feature vectors, which means the property of linear mapping relation among features used in machine learning approaches cannot hold any more. To address this problem, this paper proposes an Improved Dynamic Time Warping (IDTW) method, which can align two feature vectors using non-linear alignment. Experimental results on two real traces show that IDTW achieves better classification accuracy in out-of-sequence traffic classification, in comparison to existing machine learning approaches.

  • Content Adaptive Visible Watermarking during Ordered Dithering

    Hao LUO  Jeng-Shyang PAN  Zhe-Ming LU  

     
    LETTER-Application Information Security

      Vol:
    E90-D No:7
      Page(s):
    1113-1116

    This letter presents an improved visible watermarking scheme for halftone images. It incorporates watermark embedding into ordered dither halftoning by threshold modulation. The input images include a continuous-tone host image (e.g. an 8-bit gray level image) and a binary watermark image, and the output is a halftone image with a visible watermark. Our method is content adaptive because it takes local intensity information of the host image into account. Experimental results demonstrate effectiveness of the proposed technique. It can be used in practical applications for halftone images, such as commercial advertisement, content annotation, copyright announcement, etc.

  • Quantifying Resiliency of Virtualized System with Software Rejuvenation

    Hiroyuki OKAMURA  Jungang GUAN  Chao LUO  Tadashi DOHI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2051-2059

    This paper considers how to evaluate the resiliency for virtualized system with software rejuvenation. The software rejuvenation is a proactive technique to prevent the failure caused by aging phenomenon such as resource exhaustion. In particular, according to Gohsh et al. (2010), we compute a quantitative criterion to evaluate resiliency of system by using continuous-time Markov chains (CTMC). In addition, in order to convert general state-based models to CTMCs, we employ PH (phase-type) expansion technique. In numerical examples, we investigate the resiliency of virtualized system with software rejuvenation under two different rejuvenation policies.

  • Identifying High-Rate Flows Based on Sequential Sampling

    Yu ZHANG  Binxing FANG  Hao LUO  

     
    PAPER-Information Network

      Vol:
    E93-D No:5
      Page(s):
    1162-1174

    We consider the problem of fast identification of high-rate flows in backbone links with possibly millions of flows. Accurate identification of high-rate flows is important for active queue management, traffic measurement and network security such as detection of distributed denial of service attacks. It is difficult to directly identify high-rate flows in backbone links because tracking the possible millions of flows needs correspondingly large high speed memories. To reduce the measurement overhead, the deterministic 1-out-of-k sampling technique is adopted which is also implemented in Cisco routers (NetFlow). Ideally, a high-rate flow identification method should have short identification time, low memory cost and processing cost. Most importantly, it should be able to specify the identification accuracy. We develop two such methods. The first method is based on fixed sample size test (FSST) which is able to identify high-rate flows with user-specified identification accuracy. However, since FSST has to record every sampled flow during the measurement period, it is not memory efficient. Therefore the second novel method based on truncated sequential probability ratio test (TSPRT) is proposed. Through sequential sampling, TSPRT is able to remove the low-rate flows and identify the high-rate flows at the early stage which can reduce the memory cost and identification time respectively. According to the way to determine the parameters in TSPRT, two versions of TSPRT are proposed: TSPRT-M which is suitable when low memory cost is preferred and TSPRT-T which is suitable when short identification time is preferred. The experimental results show that TSPRT requires less memory and identification time in identifying high-rate flows while satisfying the accuracy requirement as compared to previously proposed methods.

  • Self Embedding Watermarking Scheme Using Halftone Image

    Hao LUO  Zhe-Ming LU  Shu-Chuan CHU  Jeng-Shyang PAN  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:1
      Page(s):
    148-152

    Self embedding watermarking is a technique used for tamper detection, localization and recovery. This letter proposes a novel self embedding scheme, in which the halftone version of the host image is exploited as a watermark, instead of a JPEG-compressed version used in most existing methods. Our scheme employs a pixel-wise permuted and embedded mechanism and thus overcomes some common drawbacks of the previous methods. Experimental results demonstrate our technique is effective and practical.

  • A Tree-Structured Deterministic Small-World Network

    Shi-Ze GUO  Zhe-Ming LU  Guang-Yu KANG  Zhe CHEN  Hao LUO  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:5
      Page(s):
    1536-1538

    Small-world is a common property existing in many real-life social, technological and biological networks. Small-world networks distinguish themselves from others by their high clustering coefficient and short average path length. In the past dozen years, many probabilistic small-world networks and some deterministic small-world networks have been proposed utilizing various mechanisms. In this Letter, we propose a new deterministic small-world network model by first constructing a binary-tree structure and then adding links between each pair of brother nodes and links between each grandfather node and its four grandson nodes. Furthermore, we give the analytic solutions to several topological characteristics, which shows that the proposed model is a small-world network.

  • Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection

    Junxiang WANG  Jiangqun NI  Dong ZHANG  Hao LUO  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:10
      Page(s):
    2552-2555

    In the letter, we propose an improved histogram shifting (HS) based reversible data hiding scheme for small payload embedding. Conventional HS based schemes are not suitable for low capacity embedding with relatively large distortion due to the inflexible side information selection. From an analysis of the whole HS process, we develop a rate-distortion model and provide an optimal adaptive searching approach for side information selection according to the given payload. Experiments demonstrate the superior performance of the proposed scheme in terms of performance curve for low payload embedding.

  • Color Image Retrieval Based on Distance-Weighted Boundary Predictive Vector Quantization Index Histograms

    Zhen SUN  Zhe-Ming LU  Hao LUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:9
      Page(s):
    1803-1806

    This Letter proposes a new kind of features for color image retrieval based on Distance-weighted Boundary Predictive Vector Quantization (DWBPVQ) Index Histograms. For each color image in the database, 6 histograms (2 for each color component) are calculated from the six corresponding DWBPVQ index sequences. The retrieval simulation results show that, compared with the traditional Spatial-domain Color-Histogram-based (SCH) features and the DCTVQ index histogram-based (DCTVQIH) features, the proposed DWBPVQIH features can greatly improve the recall and precision performance.

  • Approximate Nearest Neighbor Based Feature Quantization Algorithm for Robust Hashing

    Yue nan LI  Hao LUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E95-D No:12
      Page(s):
    3109-3112

    In this letter, the problem of feature quantization in robust hashing is studied from the perspective of approximate nearest neighbor (ANN). We model the features of perceptually identical media as ANNs in the feature set and show that ANN indexing can well meet the robustness and discrimination requirements of feature quantization. A feature quantization algorithm is then developed by exploiting the random-projection based ANN indexing. For performance study, the distortion tolerance and randomness of the quantizer are analytically derived. Experimental results demonstrate that the proposed work is superior to state-of-the-art quantizers, and its random nature can provide robust hashing with security against hash forgery.

  • Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables

    Yong ZHANG  Shi-Ze GUO  Zhe-Ming LU  Hao LUO  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E96-B No:2
      Page(s):
    624-631

    Reversible data hiding has been a hot research topic since both the host media and hidden data can be recovered without distortion. In the past several years, more and more attention has been paid to reversible data hiding schemes for images in compressed formats such as JPEG, JPEG2000, Vector Quantization (VQ) and Block Truncation Coding (BTC). Traditional data hiding schemes in the BTC domain modify the BTC encoding stage or BTC-compressed data according to the secret bits, and they have no ability to reduce the bit rate but may reduce the image quality. This paper presents a novel reversible data hiding scheme for BTC-compressed images by further losslessly encoding the BTC-compressed data according to the secret bits. First, the original BTC technique is performed on the original image to obtain the BTC-compressed data which can be represented by a high mean table, a low mean table and a bitplane sequence. Then, the proposed reversible data hiding scheme is performed on both the high mean table and low mean table. Our hiding scheme is a lossless joint hiding and compression method based on 22 blocks in mean tables, thus it can not only hide data in mean tables but also reduce the bit rate. Experiments show that our scheme outperforms three existing BTC-based data hiding works, in terms of the bit rate, capacity and efficiency.

  • Global Motion Representation of Video Shot Based on Vector Quantization Index Histogram

    Fa-Xin YU  Zhe-Ming LU  Zhen LI  Hao LUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    90-92

    In this Letter, we propose a novel method of low-level global motion feature description based on Vector Quantization (VQ) index histograms of motion feature vectors (MFVVQIH) for the purpose of video shot retrieval. The contribution lies in three aspects: first, we use VQ to eliminate singular points in the motion feature vector space; second, we utilize the global motion feature vector index histogram of a video shot as the global motion signature; third, video shot retrieval based on index histograms instead of original motion feature vectors guarantees the low computation complexity, and thus assures a real-time video shot retrieval. Experimental results show that the proposed scheme has high accuracy and low computation complexity.

  • Enhanced Side-Channel Cube Attacks on PRESENT

    Xinjie ZHAO  Shize GUO  Fan ZHANG  Tao WANG  Zhijie SHI  Hao LUO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:1
      Page(s):
    332-339

    This paper proposes several improved Side-channel cube attacks (SCCAs) on PRESENT-80/128 under single bit leakage model. Assuming the leakage is in the output of round 3 as in previous work, we discover new results of SCCA on PRESENT. Then an enhanced SCCA is proposed to extract key related non-linear equations. 64-bit key for both PRESENT-80 and 128 can be obtained. To mount more effective attack, we utilize the leakage in round 4 and enhance SCCA in two ways. A partitioning scheme is proposed to handle huge polynomials, and an iterative scheme is proposed to extract more key bits. With these enhanced techniques, the master key search space can be reduced to 28 for PRESENT-80 and to 229 for PRESENT-128.

  • Erasable Photograph Tagging: A Mobile Application Framework Employing Owner's Voice

    Zhenfei ZHAO  Hao LUO  Hua ZHONG  Bian YANG  Zhe-Ming LU  

     
    LETTER-Speech and Hearing

      Vol:
    E97-D No:2
      Page(s):
    370-372

    This letter proposes a mobile application framework named erasable photograph tagging (EPT) for photograph annotation and fast retrieval. The smartphone owner's voice is employed as tags and hidden in the host photograph without an extra feature database aided for retrieval. These digitized tags can be erased anytime with no distortion remaining in the recovered photograph.

  • Novel Watermarked MDC System Based on SFQ Algorithm

    Lin-Lin TANG  Jeng-Shyang PAN  Hao LUO  Junbao LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2922-2925

    A novel watermarked MDC system based on the SFQ algorithm and the sub-sampling method is proposed in this paper. Sub-sampling algorithm is applied onto the transformed image to introduce some redundancy between different channels. Secret information is embedded into the preprocessed sub-images. Good performance of the new system to defense the noise and the compression attacks is shown in the experimental results.

  • Visible Watermarking for Halftone Images

    Jeng-Shyang PAN  Hao LUO  Zhe-Ming LU  

     
    LETTER-Information Security

      Vol:
    E90-A No:7
      Page(s):
    1487-1490

    This letter proposes a visible watermarking scheme for halftone images. It exploits HVS filtering to transform the image in binary domain into continuous-tone domain for watermark embedding. Then a codeword search operation converts the watermarked continuous-tone image into binary domain. The scheme is flexible for two weighting factors are involved to adjust the watermark embedding strength and the average intensity of the watermarked image. Moreover, it can be used in some applications where original continuous-tone images are not available and the halftoning method is unknown.

  • Design and SNR Optimization for Multi-Relay Compress-and-Forward System Based on CEO Theory

    Junwei BAO  Dazhuan XU  Hao LUO  Ruidan ZHANG  Fei WANG  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2020/01/23
      Vol:
    E103-D No:5
      Page(s):
    1006-1012

    A novel compress-and-forward (CF) system based on multi-relay network is proposed. In this system, two networks are linked, wherein one is a sensor network connecting the analog source and the relays, and the other is a communication network between the relays and the destination. At several parallel relay nodes, the analog signals are transformed into digital signals after quantization and encoding and then the digital signals are transmitted to the destination. Based on the Chief Executive Officer (CEO) theory, we calculate the minimum transmission rate of every source-relay link and we propose a system model by combining sensor network with communication network according to Shannon channel capacity theory. Furthermore, we obtain the best possible system performance under system power constraint, which is measured by signal-to-noise ratio (SNR) rather than bit error rate (BER). Numerical simulation results show that the proposed CF outperforms the traditional amplify-and-forward (AF) system in the performance versus SNR.

  • A Wideband 16×16-Slot array antenna With Low Side-lobe Design in W-band

    Hao LUO  Wenhao TAN  Luoning GAN  Houjun SUN  

    This paper has been cancelled due to violation of duplicate submission policy on IEICE Transactions on Communications
     
    PAPER-Antennas and Propagation

      Vol:
    E102-B No:8
      Page(s):
    1689-1694

    A W-band corporate-feed 16×16-slot array antenna with low sidelobe level is designed and fabricated. The basic unit of the array is a 2×2-circular-slot subarray with step square cavities and uses an E-plane waveguide as the feeding line. An efficient method to design an unequal power-splitting ratio but equal phase (UPEP) E-plane waveguide T-junction (E-T) is proposed for constructing a 1-to-64 power-tapering feed network, which is the critical part to realize low sidelobe level. The whole array is fabricated with aluminum by milling and bonded by the vacuum brazing process. The measured results demonstrate that the array can achieve a 7.2% bandwidth with VSWR<1.5 and holistic sidelobe levels lower than -23.5dB in E-plane and H-plane from 89GHz ∼ 95.8GHz. The measured gain is higher than 31.7dBi over the working band with the antenna efficiency better than 67.5%.

1-20hit(21hit)