Hosang LEE Jawad YOUSAF Kwangho KIM Seongjin MUN Chanseok HWANG Wansoo NAH
This paper analyzes and compares two methods to estimate electromagnetically coupled noises introduced to an antenna due to the nearby circuits at a circuit design stage. One of them is to estimate the power spectrum, and the other one is to estimate the active S11 parameter at the victim antenna, respectively, and both of them use simulated standard S-parameters for the electromagnetic coupling in the circuit. They also need the assumed or measured excitation of noise sources. To confirm the validness of the two methods, an evaluation board consisting of an antenna and noise sources were designed and fabricated in which voltage controlled oscillator (VCO) chips are placed as noise sources. The generated electromagnetic noises are transferred to an antenna via loop-shaped transmission lines, degrading the performance of the antenna. In this paper, detailed analysis procedures are described using the evaluation board, and it is shown that the two methods are equivalent to each other in terms of the induced voltages in the antenna. Finally, a procedure to estimate antenna performance degradation at the design stage is summarized.
Wenli ZHU Min ZHANG Chenxi WU Lingqing ZENG
A convolutional neural network (CNN) for broadband direction of arrival (DOA) estimation of far-field electromagnetic signals is presented. The proposed algorithm performs a nonlinear inverse mapping from received signal to angle of arrival. The signal model used for algorithm is based on the circular antenna array geometry, and the phase component extracted from the spatial covariance matrix is used as the input of the CNN network. A CNN model including three convolutional layers is then established to approximate the nonlinear mapping. The performance of the CNN model is evaluated in a noisy environment for various values of signal-to-noise ratio (SNR). The results demonstrate that the proposed CNN model with the phase component of the spatial covariance matrix as the input is able to achieve fast and accurate broadband DOA estimation and attains perfect performance at lower SNR values.
Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing security services for any mobile application. However, mobile TEE's architecture design and implementation strategy are not unbreakable at present. The existing researches lack of detect mechanisms for attack behaviour and malicious software. This paper proposes a Malicious code Detection scheme for Trusted Execution Environment based on Homomorphic Encryption (HE-TEEMD), which is a novel detection mechanism for data and code in the trusted execution environment. HE-TEEMD uses the Paillier additive homomorphic algorithm to implement the signature matching and transmits the ciphertext information generated in the TEE to the normal world for detection by the homomorphism and randomness of the homomorphic encryption ciphertext. An experiment and security analysis proves that our scheme can achieve malicious code detection in the secure world with minimal cost. Furthermore, evaluation parameters are introduced to address the known plaintext attack problem of privileged users.
Keisuke OKANO Takaki ITATSU Naoto SASAOKA Yoshio ITOH
We propose an auxiliary-noise power-scheduling method for a pre-inverse active noise control (PIANC) system. Conventional methods cannot reduce the power of auxiliary-noise due to the use of the filtered-x least mean square (FxLMS) algorithm. We developed our power-scheduling method for a PIANC system to solve this problem. Since a PIANC system uses a delayed input signal for a control filter, the proposed method delivers stability even if the acoustic path fluctuates. The proposed method also controls the gain of the auxiliary-noise based on the secondary-path-modeling state. The proposed method determines this state by the variation in the power of the secondary-path-modeling-error signal. Thus, the proposed method changes the power-scheduling of the auxiliary-noise. When the adaptive algorithm does not sufficiently converge, the proposed method injects auxiliary-noise. However, auxiliary-noise stops when the adaptive algorithm sufficiently converges. Therefore, the proposed method improves noise reduction performance.
Jonghyeok LEE Sunghyun HWANG Sungjin YOU Woo-Jin BYUN Jaehyun PARK
To estimate angle, velocity, and range information of multiple targets jointly in FMCW MIMO radar, two-dimensional (2D) MUSIC with matched filtering and FFT algorithm is proposed. By reformulating the received FMCW signal of the colocated MIMO radar, we exploit 2D MUSIC to estimate the angle and Doppler frequency of multiple targets. Then by using a matched filter together with the estimated angle and Doppler frequency and FFT operation, the range of the target is estimated. To effectively estimate the parameters of multiple targets with large distance differences, we also propose a successive interference cancellation method that uses the orthogonal projection. That is, rather than estimating the multiple target parameters simultaneously using 2D MUSIC, we estimate the target parameters sequentially, in which the parameters of the target having strongest reflected power are estimated first and then, their effect on the received signal is canceled out by using the orthogonal projection. Simulations verify the performance of the proposed algorithm.
Yuichi SUDO Fukuhito OOSHITA Hirotsugu KAKUGAWA Toshimitsu MASUZAWA
We consider the leader election problem in the population protocol model, which Angluin et al. proposed in 2004. A self-stabilizing leader election is impossible for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs, and so on unless the protocol knows the exact number of nodes. In 2009, to circumvent the impossibility, we introduced the concept of loose stabilization, which relaxes the closure requirement of self-stabilization. A loosely stabilizing protocol guarantees that starting from any initial configuration, a system reaches a safe configuration, and after that, the system keeps its specification (e.g., the unique leader) not forever but for a sufficiently long time (e.g., an exponentially long time with respect to the number of nodes). Our previous works presented two loosely stabilizing leader election protocols for arbitrary graphs; one uses agent identifiers, and the other uses random numbers to elect a unique leader. In this paper, we present a loosely stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers or random numbers. Given upper bounds N and Δ of the number of nodes n and the maximum degree of nodes δ, respectively, the proposed protocol reaches a safe configuration within O(mn2d log n+mNΔ2 log N) expected steps and keeps the unique leader for Ω(NeN) expected steps, where m is the number of edges and d is the diameter of the graph.
Chunhua QIAN Mingyang LI Yi REN
Tea sprouts segmentation via machine vision is the core technology of tea automatic picking. A novel method for Tea Sprouts Segmentation based on improved deep convolutional encoder-decoder Network (TS-SegNet) is proposed in this paper. In order to increase the segmentation accuracy and stability, the improvement is carried out by a contrastive-center loss function and skip connections. Therefore, the intra-class compactness and inter-class separability are comprehensively utilized, and the TS-SegNet can obtain more discriminative tea sprouts features. The experimental results indicate that the proposed method leads to good segmentation results, and the segmented tea sprouts are almost coincident with the ground truth.
Jichen YANG Longting XU Bo REN
Under the framework of traditional power spectrum based feature extraction, in order to extract more discriminative information for playback attack detection, this paper proposes a feature by making use of deep neural network to describe the nonlinear relationship between power spectrum and discriminative information. Namely, constant-Q deep coefficients (CQDC). It relies on constant-Q transform, deep neural network and discrete cosine transform. In which, constant-Q transform is used to convert signal from the time domain into the frequency domain because it is a long-term transform that can provide more frequency detail, deep neural network is used to extract more discriminative information to discriminate playback speech from genuine speech and discrete cosine transform is used to decorrelate among the feature dimensions. ASVspoof 2017 corpus version 2.0 is used to evaluate the performance of CQDC. The experimental results show that CQDC outperforms the existing power spectrum obtained from constant-Q transform based features, and equal error can reduce from 19.18% to 51.56%. In addition, we found that discriminative information of CQDC hides in all frequency bins, which is different from commonly used features.
Guizhong ZHANG Baoxian WANG Zhaobo YAN Yiqiang LI Huaizhi YANG
In this work, we present one novel rust detection method based upon one-class classification and L2 sparse representation (SR) with decision fusion. Firstly, a new color contrast descriptor is proposed for extracting the rust features of steel structure images. Considering that the patterns of rust features are more simplified than those of non-rust ones, one-class support vector machine (SVM) classifier and L2 SR classifier are designed with these rust image features, respectively. After that, a multiplicative fusion rule is advocated for combining the one-class SVM and L2 SR modules, thereby achieving more accurate rust detecting results. In the experiments, we conduct numerous experiments, and when compared with other developed rust detectors, the presented method can offer better rust detecting performances.
Yudi ZHANG Debiao HE Xinyi HUANG Ding WANG Kim-Kwang Raymond CHOO Jing WANG
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.
Fanxin ZENG Xiping HE Guixin XUAN Zhenyu ZHANG Yanni PENG Li YAN
In an OFDM communication system using quadrature amplitude modulation (QAM) signals, peak envelope powers (PEPs) of the transmitted signals can be well controlled by using QAM Golay complementary sequence pairs (CSPs). In this letter, by making use of a new construction, a family of new 16-QAM Golay CSPs of length N=2m (integer m≥2) with binary inputs is presented, and all the resultant pairs have the PEP upper bound 2N. However, in the existing such pairs from other references their PEP upper bounds can arrive at 3.6N when the worst case happens. In this sense, novel pairs are good candidates for OFDM applications.
Joanna Kazzandra DUMAGPI Woo-Young JUNG Yong-Jin JEONG
Threat object recognition in x-ray security images is one of the important practical applications of computer vision. However, research in this field has been limited by the lack of available dataset that would mirror the practical setting for such applications. In this paper, we present a novel GAN-based anomaly detection (GBAD) approach as a solution to the extreme class-imbalance problem in multi-label classification. This method helps in suppressing the surge in false positives induced by training a CNN on a non-practical dataset. We evaluate our method on a large-scale x-ray image database to closely emulate practical scenarios in port security inspection systems. Experiments demonstrate improvement against the existing algorithm.
Hau Sim CHOO Chia Yee OOI Michiko INOUE Nordinah ISMAIL Mehrdad MOGHBEL Chee Hoo KOK
Register-transfer-level (RTL) information is hardly available for hardware Trojan detection. In this paper, four RTL Trojan features related to branching statement are proposed. The Minimum Redundancy Maximum Relevance (mRMR) feature selection is applied to the proposed Trojan features to determine the recommended feature combinations. The feature combinations are then tested using different machine learning concepts in order to determine the best approach for classifying Trojan and normal branches. The result shows that a Decision Tree classification algorithm with all the four proposed Trojan features can achieve an average true positive detection rate of 93.72% on unseen test data.
Dohyeon PARK Jinho LEE Jung-Won KANG Jae-Gon KIM
The emerging Versatile Video Coding (VVC) standard currently adopts Triangular Partitioning Mode (TPM) to make more flexible inter prediction. Due to the motion search and motion storage for TPM, the complexity of the encoder and decoder is significantly increased. This letter proposes two simplifications of TPM for reducing the complexity of the current design. One simplification is to reduce the number of combinations of motion vectors for both partitions to be checked. The method gives 4% encoding time decrease with negligible BD-rate loss. Another one is to remove the reference picture remapping process in the motion vector storage of TPM. It reduces the complexity of the encoder and decoder without a BD-rate change for the random-access configuration.
Yong-Uk YOON Do-Hyeon PARK Jae-Gon KIM
Cross-component linear model (CCLM) has been recently adopted as a chroma intra-prediction tool in Versatile Video Coding (VVC), which is being developed as a new video coding standard. CCLM predicts chroma components from luma components through a linear model based on assumption of linear correlation between both components. A linear model is derived from the reconstructed neighboring luma and chroma samples of the current coding block by linear regression. A simplified linear modeling method recently adopted in the test model of VVC (VTM) 3.0 significantly reduces computational complexity of deriving model parameters with considerable coding loss. This letter proposes a method of linear modeling to compensate the coding loss of the simplified linear model. In the proposed method, the model parameters which are quite roughly derived in the existing simplified linear model are refined more accurately using individual method to derive each parameter. Experimental results show that, compared to VTM 3.0, the proposed method gives 0.08%, 0.52% and 0.55% Bjotegaard-Delta (BD)-rate savings, for Y, Cb and Cr components, respectively, in the All-Intra (AI) configuration with negligible computational complexity increase.
Ryo MASUDA Koichi KOBAYASHI Yuh YAMASHITA
The surveillance problem is to find optimal trajectories of agents that patrol a given area as evenly as possible. In this paper, we consider multiple agents with fuel constraints. The surveillance area is given by a weighted directed graph, where the weight assigned to each arc corresponds to the fuel consumption/supply. For each node, the penalty to evaluate the unattended time is introduced. Penalties, agents, and fuels are modeled by a mixed logical dynamical system model. Then, the surveillance problem is reduced to a mixed integer linear programming (MILP) problem. Based on the policy of model predictive control, the MILP problem is solved at each discrete time. In this paper, the feasibility condition for the MILP problem is derived. Finally, the proposed method is demonstrated by a numerical example.
You Zhu LI Yong Qiang JIA Hong Shu LIAO
Radio signals show small characteristic differences between radio transmitters resulted from their idiosyncratic hardware properties. Based on the parameters estimation of transmitter imperfections, a novel radiometric identification method is presented in this letter. The fingerprint features of the radio are extracted from the mismatches of the modulator and the nonlinearity of the power amplifier, and used to train a support vector machine classifier to identify the class label of a new data. Experiments on real data sets demonstrate the validation of this method.
Shunsuke YAMAKI Ryo SUZUKI Makoto YOSHIZAWA
This paper proposes statistical analysis of phase-only correlation functions between two signals with stochastic phase-spectra following bivariate circular probability distributions based on directional statistics. We give general expressions for the expectation and variance of phase-only correlation functions in terms of joint characteristic functions of the bivariate circular probability density function. In particular, if we assume bivariate wrapped distributions for the phase-spectra, we obtain exactly the same results between in case of a bivariate linear distribution and its corresponding bivariate wrapped distribution.
Ming DAI Zhiheng ZHOU Tianlei WANG Yongfan GUO
In many real application scenarios of image segmentation problems involving limited and low-quality data, employing prior information can significantly improve the segmentation result. For example, the shape of the object is a kind of common prior information. In this paper, we introduced a new kind of prior information, which is named by prior distribution. On the basis of nonparametric statistical active contour model, we proposed a novel distribution prior model. Unlike traditional shape prior model, our model is not sensitive to the shapes of object boundary. Using the intensity distribution of objects and backgrounds as prior information can simplify the process of establishing and solving the model. The idea of constructing our energy function is as follows. During the contour curve convergence, while maximizing distribution difference between the inside and outside of the active contour, the distribution difference between the inside/outside of contour and the prior object/background is minimized. We present experimental results on a variety of synthetic and natural images. Experimental results demonstrate the potential of the proposed method that with the information of prior distribution, the segmentation effect and speed can be both improved efficaciously.
In this work, we address a joint energy efficiency (EE) and throughput optimization problem in interweave cognitive radio networks (CRNs) subject to scheduling, power, and stability constraints, which could be solved through traffic admission control, channel allocation, and power allocation. Specifically, the joint objective is to concurrently optimize the system EE and the throughput of secondary user (SU), while satisfying the minimum throughput requirement of primary user (PU), the throughput constraint of SU, and the scheduling and power control constraints that must be considered. To achieve these goals, our algorithm independently and simultaneously makes control decisions on admission and transmission to maximize a joint utility of EE and throughput under time-varying conditions of channel and traffic without a priori knowledge. Specially, the proposed scheduling algorithm has polynomial time efficiency, and the power control algorithms as well as the admission control algorithm involved are simply threshold-based and thus very computationally efficient. Finally, numerical analyses show that our proposals achieve both system stability and optimal utility.