The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

1841-1860hit(42807hit)

  • FOREWORD Open Access

    Yoshinori TAKEUCHI  

     
    FOREWORD

      Vol:
    E105-A No:3
      Page(s):
    436-436
  • FOREWORD Open Access

    Guojun WANG  Yizhi REN  

     
    FOREWORD

      Vol:
    E105-D No:2
      Page(s):
    193-194
  • A Privacy-Preserving Data Feed Scheme for Smart Contracts

    Hao WANG  Zhe LIU  Chunpeng GE  Kouichi SAKURAI  Chunhua SU  

     
    INVITED PAPER

      Pubricized:
    2021/12/06
      Vol:
    E105-D No:2
      Page(s):
    195-204

    Smart contracts are becoming more and more popular in financial scenarios like medical insurance. Rather than traditional schemes, using smart contracts as a medium is a better choice for both participants, as it is fairer, more reliable, more efficient, and enables real-time payment. However, medical insurance contracts need to input the patient's condition information as the judgment logic to trigger subsequent execution. Since the blockchain is a closed network, it lacks a secure network environment for data interaction with the outside world. The Data feed aims to provide the service of the on-chain and off-chain data interaction. Existing researches on the data feed has solved the security problems on it effectively, such as Town Crier, TLS-N and they have also taken into account the privacy-preserving problems. However, these schemes cannot actually protect privacy because when the ciphertext data is executed by the contract, privacy information can still be inferred by analyzing the transaction results, since states of the contract are publicly visible. In this paper, based on zero-knowledge proof and Hawk technology, a on-and-off-chain complete smart contract data feed privacy-preserving scheme is proposed. In order to present our scheme more intuitively, we combined the medical insurance compensation case to implement it, which is called MIPDF. In our MIPDF, the patient and the insurance company are parties involved in the contract, and the hospital is the data provider of data feed. The patient's medical data is sent to the smart contract under the umbrella of the zero-knowledge proof signature scheme. The smart contract verifies the proof and calculates the insurance premium based on the judgment logic. Meanwhile, we use Hawk technology to ensure the privacy of on-chain contract execution, so that no information will be disclosed due to the result of contract execution. We give a general description of our scheme within the Universal Composability (UC) framework. We experiment and evaluate MIPDF on Ethereum for in-depth analysis. The results show that our scheme can securely and efficiently support the functions of medical insurance and achieve complete privacy-preserving.

  • BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking

    Wenjuan LI  Yu WANG  Weizhi MENG  Jin LI  Chunhua SU  

     
    PAPER

      Pubricized:
    2021/09/16
      Vol:
    E105-D No:2
      Page(s):
    272-279

    To safeguard critical services and assets in a distributed environment, collaborative intrusion detection systems (CIDSs) are usually adopted to share necessary data and information among various nodes, and enhance the detection capability. For simplifying the network management, software defined networking (SDN) is an emerging platform that decouples the controller plane from the data plane. Intuitively, SDN can help lighten the management complexity in CIDSs, and a CIDS can protect the security of SDN. In practical implementation, trust management is an important approach to help identify insider attacks (or malicious nodes) in CIDSs, but the challenge is how to ensure the data integrity when evaluating the reputation of a node. Motivated by the recent development of blockchain technology, in this work, we design BlockCSDN — a framework of blockchain-based collaborative intrusion detection in SDN, and take the challenge-based CIDS as a study. The experimental results under both external and internal attacks indicate that using blockchain technology can benefit the robustness and security of CIDSs and SDN.

  • Improved Resolution Enhancement Technique for Broadband Illumination in Flat Panel Display Lithography Open Access

    Kanji SUZUKI  Manabu HAKKO  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-C No:2
      Page(s):
    59-67

    In flat panel display (FPD) lithography, a high resolution and large depth of focus (DOF) are required. The demands for high throughput have necessitated the use of large glass plates and exposure areas, thereby increasing focal unevenness and reducing process latitude. Thus, a large DOF is needed, particularly for high-resolution lithography. To manufacture future high-definition displays, 1.0μm line and space (L/S) is predicted to be required, and a technique to achieve this resolution with adequate DOF is necessary. To improve the resolution and DOF, resolution enhancement techniques (RETs) have been introduced. RETs such as off-axis illumination (OAI) and phase-shift masks (PSMs) have been widely used in semiconductor lithography, which utilizes narrowband illumination. To effectively use RETs in FPD lithography, modification for broadband illumination is required because FPD lithography utilizes such illumination as exposure light. However, thus far, RETs for broadband illumination have not been studied. This study aimed to develop techniques to achieve 1.0μm L/S resolution with an acceptable DOF. To this end, this paper proposes a method that combines our previously developed RET, namely, divided spectrum illumination (DSI), with an attenuated PSM (Att. PSM). Theoretical observations and simulations present the design of a PSM for broadband illumination. The transmittance and phase shift, whose degree varies according to the wavelength, are determined in terms of aerial image contrast and resist loss. The design of DSI for an Att. PSM is also discussed considering image contrast, DOF, and illumination intensity. Finally, the exposure results of 1.0μm L/S using DSI and PSM techniques are shown, demonstrating that a PSM greatly improves the resist profile, and DSI enhances the DOF by approximately 30% compared to conventional OAI. Thus, DSI and PSMs can be used in practical applications for achieving 1.0μm L/S with sufficient DOF.

  • A Novel Method for Adaptive Beamforming under the Strong Interference Condition

    Zongli RUAN  Hongshu LIAO  Guobing QIAN  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2021/08/02
      Vol:
    E105-A No:2
      Page(s):
    109-113

    In this letter, firstly, a novel adaptive beamformer using independent component analysis (ICA) algorithm is proposed. By this algorithm, the ambiguity of amplitude and phase resulted from blind source separation is removed utilizing the special structure of array manifolds matrix. However, there might exist great calibration error when the powers of interferences are far larger than that of desired signal at many applications such as sonar, radio astronomy, biomedical engineering and earthquake detection. As a result, this will lead to a significant reduction in separation performance. Then, a new method based on the combination of ICA and primary component analysis (PCA) is proposed to recover the desired signal's amplitude under strong interference. Finally, computer simulation is carried out to indicate the effectiveness of our methods. The simulation results show that the proposed methods can obtain higher SNR and more accurate power estimation of desired signal than diagonal loading sample matrix inversion (LSMI) and worst-case performance optimization (WCPO) method.

  • In-Band Full-Duplex-Applicable Area Expansion by Inter-User Interference Reduction Using Successive Interference Cancellation

    Shota MORI  Keiichi MIZUTANI  Hiroshi HARADA  

     
    PAPER

      Pubricized:
    2021/09/02
      Vol:
    E105-B No:2
      Page(s):
    168-176

    In-band full-duplex (IBFD) has been an attractive technology, which can theoretically double the spectral efficiency. However, when performing IBFD in the dynamic-duplex cellular (DDC) system, inter-user interference (IUI) deteriorates transmission performance in downlink (DL) communication and limits IBFD-applicable area and IBFD application ratio. In this paper, to expand the IBFD-applicable area and improve the IBFD application ratio, we propose an IUI reduction scheme using successive interference cancellation (SIC) for the DDC system. SIC can utilize the power difference and reduce the signal with the higher power. The effectiveness of the proposed scheme is evaluated by the computer simulation. The IUI reducing effect on the IBFD-inapplicable area is confirmed when the received power of the IUI is stronger than that of the desired signal at the user equipment for DL (DL-UE). The IBFD-inapplicable area within 95m from the DL-UE, where the IBFD does not work without the proposed scheme, can reduce by 43.6% from 52.8% to 9.2% by applying the proposed scheme. Moreover, the IBFD application ratio can improve by 24.6% from 69.5% to 94.1%.

  • ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain

    Haoyang AN  Jiageng CHEN  

     
    PAPER

      Pubricized:
    2021/12/06
      Vol:
    E105-D No:2
      Page(s):
    235-247

    The development of educational informatization makes data privacy particularly important in education. With society's development, the education system is complicated, and the result of education evaluation becomes more and more critical to students. The evaluation process of education must be justice and transparent. In recent years, the Onscreen Marking (OSM) system based on traditional cloud platforms has been widely used in various large-scale public examinations. However, due to the excessive concentration of power in the existing scheme, the mainstream marking process is not transparent, and there are hidden dangers of black-box operation, which will damage the fairness of the examination. In addition, issues related to data security and privacy are still considered to be severe challenges. This paper deals with the above problems by providing secure and private transactions in a distributed OSM assuming the semi-trusted examination center. We have implemented a proof-of-concept for a consortium blockchain-based OSM in a privacy-preserving and auditable manner, enabling markers to mark on the distributed ledger anonymously. We have proposed a distributed OSM system in high-level, which provides theoretical support for the fair evaluation process of education informatization. It has particular theoretical and application value for education combined with blockchain.

  • Layerweaver+: A QoS-Aware Layer-Wise DNN Scheduler for Multi-Tenant Neural Processing Units

    Young H. OH  Yunho JIN  Tae Jun HAM  Jae W. LEE  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2021/11/11
      Vol:
    E105-D No:2
      Page(s):
    427-431

    Many cloud service providers employ specialized hardware accelerators, called neural processing units (NPUs), to accelerate deep neural networks (DNNs). An NPU scheduler is responsible for scheduling incoming user requests and required to satisfy the two, often conflicting, optimization goals: maximizing system throughput and satisfying quality-of-service (QoS) constraints (e.g., deadlines) of individual requests. We propose Layerweaver+, a low-cost layer-wise DNN scheduler for NPUs, which provides both high system throughput and minimal QoS violations. For a serving scenario based on the industry-standard MLPerf inference benchmark, Layerweaver+ significantly improves the system throughput by up to 266.7% over the baseline scheduler serving one DNN at a time.

  • A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance

    Takaki ASANUMA  Takanori ISOBE  

     
    PAPER

      Pubricized:
    2021/11/08
      Vol:
    E105-D No:2
      Page(s):
    248-255

    Hashcash, which is a Proof of Work (PoW) of bitcoin, is based on a preimage problem of hash functions of SHA-2 and RIPEMD. As these hash functions employ the Merkle-Damgard (MD) construction, a preimage can be found with negligible memory. Since such calculations can be accelerated by dedicated ASICs, it has a potential risk of a so-called 51% attack. To address this issue, we propose a new PoW scheme based on the key recovery problem of cascade block ciphers. By choosing the appropriate parameters, e.g., block sizes and key sizes of underlying block ciphers, we can make this problem a memory-hard problem such that it requires a lot of memory to efficiently solve it. Besides, we can independently adjust the required time complexity and memory complexity, according to requirements by target applications and progress of computational power.

  • Learning Pyramidal Feature Hierarchy for 3D Reconstruction

    Fairuz Safwan MAHAD  Masakazu IWAMURA  Koichi KISE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2021/11/16
      Vol:
    E105-D No:2
      Page(s):
    446-449

    Neural network-based three-dimensional (3D) reconstruction methods have produced promising results. However, they do not pay particular attention to reconstructing detailed parts of objects. This occurs because the network is not designed to capture the fine details of objects. In this paper, we propose a network designed to capture both the coarse and fine details of objects to improve the reconstruction of the fine parts of objects.

  • Multi-Party Electronic Contract Signing Protocol Based on Blockchain

    Tong ZHANG  Yujue WANG  Yong DING  Qianhong WU  Hai LIANG  Huiyong WANG  

     
    PAPER

      Pubricized:
    2021/12/07
      Vol:
    E105-D No:2
      Page(s):
    264-271

    With the development of Internet technology, the demand for signing electronic contracts has been greatly increased. The electronic contract generated by the participants in an online way enjoys the same legal effect as paper contract. The fairness is the key issue in jointly signing electronic contracts by the involved participants, so that all participants can either get the same copy of the contract or nothing. Most existing solutions only focus on the fairness of electronic contract generation between two participants, where the digital signature can effectively guarantee the fairness of the exchange of electronic contracts and becomes the conventional technology in designing the contract signing protocol. In this paper, an efficient blockchain-based multi-party electronic contract signing (MECS) protocol is presented, which not only offers the fairness of electronic contract generation for multiple participants, but also allows each participant to aggregate validate the signed copy of others. Security analysis shows that the proposed MECS protocol enjoys unforgeability, non-repudiation and fairness of electronic contracts, and performance analysis demonstrates the high efficiency of our construction.

  • New Construction Methods on Multiple Output Resilient Boolean Functions with High Nonlinearity

    Luyang LI  Linhui WANG  Dong ZHENG  Qinlan ZHAO  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/08/10
      Vol:
    E105-A No:2
      Page(s):
    87-92

    Construction of multiple output functions is one of the most important problems in the design and analysis of stream ciphers. Generally, such a function has to be satisfied with several criteria, such as high nonlinearity, resiliency and high algebraic degree. But there are mutual restraints among the cryptographic parameters. Finding a way to achieve the optimization is always regarded as a hard task. In this paper, by using the disjoint linear codes and disjoint spectral functions, two classes of resilient multiple output functions are obtained. It has been proved that the obtained functions have high nonlinearity and high algebraic degree.

  • Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System

    Yingxiao XIANG  Chao LI  Tong CHEN  Yike LI  Endong TONG  Wenjia NIU  Qiong LI  Jiqiang LIU  Wei WANG  

     
    PAPER

      Pubricized:
    2021/09/13
      Vol:
    E105-D No:2
      Page(s):
    280-288

    Controlled optimization of phases (COP) is a core implementation in the future intelligent traffic signal system (I-SIG), which has been deployed and tested in countries including the U.S. and China. In such a system design, optimal signal control depends on dynamic traffic situation awareness via connected vehicles. Unfortunately, I-SIG suffers data spoofing from any hacked vehicle; in particular, the spoofing of the last vehicle can break the system and cause severe traffic congestion. Specifically, coordinated attacks on multiple intersections may even bring cascading failure of the road traffic network. To mitigate this security issue, a blockchain-based multi-intersection joint defense mechanism upon COP planning is designed. The major contributions of this paper are the following. 1) A blockchain network constituted by road-side units at multiple intersections, which are originally distributed and decentralized, is proposed to obtain accurate and reliable spoofing detection. 2) COP-oriented smart contract is implemented and utilized to ensure the credibility of spoofing vehicle detection. Thus, an I-SIG can automatically execute a signal planning scheme according to traffic information without spoofing data. Security analysis for the data spoofing attack is carried out to demonstrate the security. Meanwhile, experiments on the simulation platform VISSIM and Hyperledger Fabric show the efficiency and practicality of the blockchain-based defense mechanism.

  • FPGA Implementation of 3-Bit Quantized Multi-Task CNN for Contour Detection and Disparity Estimation

    Masayuki MIYAMA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/10/26
      Vol:
    E105-D No:2
      Page(s):
    406-414

    Object contour detection is a task of extracting the shape created by the boundaries between objects in an image. Conventional methods limit the detection targets to specific categories, or miss-detect edges of patterns inside an object. We propose a new method to represent a contour image where the pixel value is the distance to the boundary. Contour detection becomes a regression problem that estimates this contour image. A deep convolutional network for contour estimation is combined with stereo vision to detect unspecified object contours. Furthermore, thanks to similar inference targets and common network structure, we propose a network that simultaneously estimates both contour and disparity with fully shared weights. As a result of experiments, the multi-tasking network drew a good precision-recall curve, and F-measure was about 0.833 for FlyingThings3D dataset. L1 loss of disparity estimation for the dataset was 2.571. This network reduces the amount of calculation and memory capacity by half, and accuracy drop compared to the dedicated networks is slight. Then we quantize both weights and activations of the network to 3-bit. We devise a dedicated hardware architecture for the quantized CNN and implement it on an FPGA. This circuit uses only internal memory to perform forward propagation calculations, that eliminates high-power external memory accesses. This circuit is a stall-free pixel-by-pixel pipeline, and performs 8 rows, 16 input channels, 16 output channels, 3 by 3 pixels convolution calculations in parallel. The convolution calculation performance at the operating frequency of 250 MHz is 9 TOPs/s.

  • Gender Recognition Using a Gaze-Guided Self-Attention Mechanism Robust Against Background Bias in Training Samples

    Masashi NISHIYAMA  Michiko INOUE  Yoshio IWAI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/11/18
      Vol:
    E105-D No:2
      Page(s):
    415-426

    We propose an attention mechanism in deep learning networks for gender recognition using the gaze distribution of human observers when they judge the gender of people in pedestrian images. Prevalent attention mechanisms spatially compute the correlation among values of all cells in an input feature map to calculate attention weights. If a large bias in the background of pedestrian images (e.g., test samples and training samples containing different backgrounds) is present, the attention weights learned using the prevalent attention mechanisms are affected by the bias, which in turn reduces the accuracy of gender recognition. To avoid this problem, we incorporate an attention mechanism called gaze-guided self-attention (GSA) that is inspired by human visual attention. Our method assigns spatially suitable attention weights to each input feature map using the gaze distribution of human observers. In particular, GSA yields promising results even when using training samples with the background bias. The results of experiments on publicly available datasets confirm that our GSA, using the gaze distribution, is more accurate in gender recognition than currently available attention-based methods in the case of background bias between training and test samples.

  • Impulse-Noise-Tolerant Data-Selective LMS Algorithm

    Ying-Ren CHIEN  Chih-Hsiang YU  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2021/08/02
      Vol:
    E105-A No:2
      Page(s):
    114-117

    Exponential growth in data volumes has promoted widespread interest in data-selective adaptive algorithms. In a pioneering work, Diniz developed the data-selective least mean square (DS-LMS) algorithm, which is able to reduce specific quantities of computation data without compromising performance. Note however that the existing framework fails to consider the issue of impulse noise (IN), which can greatly undermine the benefits of reduced computation. In this letter, we present an error-based IN detection algorithm for implementation in conjunction with the DS-LMS algorithm. Numerical evaluations confirm the effectiveness of our proposed IN-tolerant DS-LMS algorithm.

  • Low-Hit-Zone Frequency-Hopping Sequence Sets with Wide-Gap and Optimal Hamming Correlation Properties

    Limengnan ZHOU  Qian KONG  Hongyu HAN  Xing LIU  Hanzhou WU  

     
    LETTER-Coding Theory

      Pubricized:
    2021/08/10
      Vol:
    E105-A No:2
      Page(s):
    122-125

    Frequency-hopping sequence (FHS) sets with low-hit-zone (LZH) can be well applied in quasi-synchronous (QS) frequency-hopping multiple-access (FHMA) systems to reduce the mutual interference among different users. On the other hand, LHZ-FHS sets with wide-gap (WG) property can effectively resist the broadband blocking interference, the single frequency narrowband interference, the multipath fading and the tracking interference. In this letter, a new family of WG-LHZ-FHS sets is constructed. Besides, these new WG-LHZ-FHS sets possess optimal average periodic Hamming correlation (APHC) properties.

  • Efficient Task Allocation Protocol for a Hybrid-Hierarchical Spatial-Aerial-Terrestrial Edge-Centric IoT Architecture Open Access

    Abbas JAMALIPOUR  Forough SHIRIN ABKENAR  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-B No:2
      Page(s):
    116-130

    In this paper, we propose a novel Hybrid-Hierarchical spatial-aerial-Terrestrial Edge-Centric (H2TEC) for the space-air integrated Internet of Things (IoT) networks. (H2TEC) comprises unmanned aerial vehicles (UAVs) that act as mobile fog nodes to provide the required services for terminal nodes (TNs) in cooperation with the satellites. TNs in (H2TEC) offload their generated tasks to the UAVs for further processing. Due to the limited energy budget of TNs, a novel task allocation protocol, named TOP, is proposed to minimize the energy consumption of TNs while guaranteeing the outage probability and network reliability for which the transmission rate of TNs is optimized. TOP also takes advantage of the energy harvesting by which the low earth orbit satellites transfer energy to the UAVs when the remaining energy of the UAVs is below a predefined threshold. To this end, the harvested power of the UAVs is optimized alongside the corresponding harvesting time so that the UAVs can improve the network throughput via processing more bits. Numerical results reveal that TOP outperforms the baseline method in critical situations that more power is required to process the task. It is also found that even in such situations, the energy harvesting mechanism provided in the TOP yields a more efficient network throughput.

  • Status Update for Accurate Remote Estimation: Centralized and Decentralized Schemes Open Access

    Jingzhou SUN  Yuxuan SUN  Sheng ZHOU  Zhisheng NIU  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-B No:2
      Page(s):
    131-139

    In this work, we consider a remote estimation system where a remote controller estimates the status of heterogeneous sensing devices with the information delivered over wireless channels. Status of heterogeneous devices changes at different speeds. With limited wireless resources, estimating as accurately as possible requires careful design of status update schemes. Status update schemes can be divided into two classes: centralized and decentralized. In centralized schemes, a central scheduler coordinates devices to avoid potential collisions. However, in decentralized schemes where each device updates on its own, update decisions can be made by using the current status which is unavailable in centralized schemes. The relation between these two schemes under the heterogeneous devices case is unclear, and thus we study these two schemes in terms of the mean square error (MSE) of the estimation. For centralized schemes, since the scheduler does not have the current status of each device, we study policies where the scheduling decisions are based on age of information (AoI), which measures the staleness of the status information held in the controller. The optimal scheduling policy is provided, along with the corresponding MSE. For decentralized schemes, we consider deviation-based policies with which only devices with estimation deviations larger than prescribed thresholds may update, and the others stay idle. We derive an approximation of the minimum MSE under the deviation-based policies and show that it is e/3 of the minimum MSE under the AoI-based policies. Simulation results further show that the actual minimum MSEs of these two policies are even closer than that shown by the approximation, which indicates that the cost of collision in the deviation-based policy cancels out the gain from exploiting status deviations.

1841-1860hit(42807hit)