Loading...
首页
期刊介绍
期刊订阅
联系我们
快速检索
引用检索
图表检索
高级检索
最新录用
|
预出版
|
当期目录
|
过刊浏览
|
阅读排行
|
下载排行
|
引用排行
|
百年期刊
ISSN 1000-0585
CN 11-1848/P
Started in 1982
About the Journal
»
About Journal
»
Editorial Board
»
Indexed in
»
Rewarded
Authors
»
Online Submission
»
Guidelines for Authors
»
Templates
»
Copyright Agreement
Reviewers
»
Guidelines for Reviewers
»
Online Peer Review
Office
»
Editor-in-chief
»
Office Work
»
Production Centre
Table of Content
, Volume 59 Issue 1
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
INFORMATION SECURITY
Select
User random access authentication protocol for low earth orbit satellite networks
ZHU Hui, CHEN Siyu, LI Fenghua, WU Heng, ZHAO Haiqiang, WANG Gang
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 1-8. DOI: 10.16511/j.cnki.qhdxxb.2018.22.057
Abstract
PDF
(2863KB) (
603
)
Low earth orbit (LEO) satellite networks can be used as supplementary networks for ground-based networks to provide network services for complex areas. However, the satellite networks characteristics such as open channels, a dynamic network topology, and a large number of user terminals can lead to problems of security, quality of service (QoS), and network control center overloading. This paper presents a dynamic access authentication protocol based on Token and the satellite orbit predictability and accurate clock synchronization to construct pre-authentication vectors which implement user random access and seamless switching. Simulations show that this protocol satisfies the security requirements with low handover delay and low computational costs for efficient and secure access authentication for users in LEO satellite networks.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Malware visualization and automatic classification with enhanced information density
LIU Yashu, WANG Zhihai, HOU Yueran, YAN Hanbing
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 9-14. DOI: 10.16511/j.cnki.qhdxxb.2018.22.054
Abstract
PDF
(1463KB) (
340
)
The development of computers and networking has been accompanied by exponential increases in the amount of malware which greatly threaten cyber space applications. This study combines the reverse analysis of malicious codes with a visualization method in a method that visualizes operating code sequences extracted from the ".text" section of portable and excutable (PE) files. This method not only improves the efficiency of malware, but also solves the difficulty of simHash similarity measurements. Tests show that this method identifies more effective features with higher information densities. This method is more efficient and has better classification accuracy than traditional malware visualization methods.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Control flow graph division based on an improved GN algorithm
MA Rui, GAO Haoran, DOU Bowen, WANG Xiajing, HU Changzhen
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 15-22. DOI: 10.16511/j.cnki.qhdxxb.2018.26.053
Abstract
PDF
(1167KB) (
266
)
The accuracy and efficiency of program analyses are hindered by very large control flow graphs (CFG). This paper presents an improved GN (Girvan-Newman) algorithm for CFG division. The node weights are added as parameters to the betweenness calculation to better balance the subgraph sizes with the sizes controlled dynamically to terminate the algorithm at a suitable time to improve the execution efficiency. Then, the binary programs indicated by the CFGs are analyzed using the angr tool. The improved GN algorithm,
K
-means algorithm, spectral clustering algorithm and naive aggregation algorithm were all tested with the results showing the improved GN algorithm provided the best modularity and subgraph size balance.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Collection scheme of location data based on local differential privacy
GAO Zhiqiang, CUI Xiaolong, DU Bo, ZHOU Sha, YUAN Chen, LI Ai
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 23-27. DOI: 10.16511/j.cnki.qhdxxb.2018.22.058
Abstract
PDF
(887KB) (
307
)
Methods are needed to protect a person's privacy while monitoring their location. This paper presents a scheme for collecting location data based on local differential privacy. First, a multi-phase randomized response is used to collect the location data based on their local differential privacy. Then, the density of a certain section is estimated using the statistical method and expectation maximization (EM) to analyze the location data. The scheme guarantees that an untrustworthy data collector can still obtain the location statistics without direct access to the original data. Extensive tests verify that EM provides better privacy protection and better utility than the statistical method with limited location data. The results of the statistical method and EM are similar with abundant location data.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Joint DDoS detection system based on software-defined networking
SONG Yubo, YANG Huiwen, WU Wei, HU Aiqun, GAO Shang
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 28-35. DOI: 10.16511/j.cnki.qhdxxb.2018.26.049
Abstract
PDF
(1121KB) (
289
)
Distributed denial-of-service (DDoS) attacks, which are becoming increasingly serious, have become one of the biggest threats to network security. Traditional defense mechanisms such as instruction detection, traffic filtering and multiple authentication are limited to static networks, which leads to obvious drawbacks. Software-defined networking (SDN) is a typical dynamic network that provides defenses against DDoS. The existing SDN-based DDoS protection solutions are still in development with many problems that need improvement. A DDoS detection scheme combined with trigger detection and in-depth detection is given here to shorten the detection period with low system overhead. A low-overhead, coarse-grained trigger detection algorithm is integrated with a precise, fine-grained, in-depth detection algorithm to reduce system complexity while ensuring high detection accuracy. An SDN DDoS detection system has been implemented on the Mininet platform to test and evaluate the system. The test show that the detection system has low system overhead, high detection accuracy, and strong practical value.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Software defined network moving target defense mechanism against link flooding attacks
XIE Lixia, DING Ying
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 36-43. DOI: 10.16511/j.cnki.qhdxxb.2018.25.062
Abstract
PDF
(1292KB) (
358
)
This paper presents a software defined network (SDN) based defense mechanism to detect and mitigate a new distributed denial of service (DDoS) attack named Crossfire. An SDN traffic-level centralized monitoring and shunt control model was defined based on the Crossfire characteristics for the defense mechanism. The SDN re-routing strategy was used to resolve the congestion load of the attacked link with flexible traffic scheduling used to alleviate the congestion and avoid critical link interruption that could seriously interfere with network service. The SDN mobile target defense mechanism was used to dynamically adjust the network configuration and network behavior to induce the attacker to adjust the attack traffic; thereby improving the attack detection efficiency of the bait server. Tests show that this mechanism can effectively defend against Crossfire attacks and that the SDN defense mechanism and rerouting strategy does not require significant overhead.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Intrusion detection method based on a deep convolutional neural network
ZHANG Sicong, XIE Xiaoyao, XU Yang
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 44-52. DOI: 10.16511/j.cnki.qhdxxb.2019.22.004
Abstract
PDF
(4677KB) (
413
)
This paper presents an intrusion detection method based on a deep convolutional neural network (dCNN) to improve the detection accuracy and efficiency of intrusion detection systems. This method uses deep learning to design the deep intrusion detection model including the tanh, Dropout, and Softmax algorithms. The method first transforms the one-dimensional raw intrusion data into two-dimensional "image" data using data padding. Then, the method uses dCNN to learn effective features from the data and the Softmax classifier to generate the final detection result. The method was implemented on a Tensorflow-GPU and evaluated on a Nvidia GTX 1060 3 GB GPU using the ADFA-LD and NSL-KDD datasets. Tests show that this method has shorter training time, improved detection accuracy, and lower false alarm rates. Thus, this method enhances the real-time processing and detection efficiency of intrusion detection systems.
Figures and Tables
|
References
|
Related Articles
|
Metrics
AUTOMOTIVE ENGINEERING
Select
Self-discharge mechanism and measurement methods for lithium ion batteries
PEI Pucheng, CHEN Jiayao, WU Ziyao
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 53-65. DOI: 10.16511/j.cnki.qhdxxb.2018.22.052
Abstract
PDF
(5165KB) (
1379
)
During pre-delivery inspections of lithium ion batteries and the staggered utilization phase after elimination, the battery self-discharge rate needs to be measured to confirm the uniformity of the lithium ion batteries. This study analyzed the lithium ion battery self-discharge mechanisms, the key factors affecting the self-discharge, and the two main methods for measuring the self-discharge rate. The deposit method for measuring the self-discharge rate stores the batteries for a long time, which is very time consuming. The dynamic method measures the self-discharge rate over a short period based on an equivalent circuit model which significantly shortens the measuring time. The dynamic method needs to be further optimized to realize rapid measurements.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Finite element prediction of the forming limit curve for anisotropic high-strength steel
GUI Liangjin, ZHANG Xiaoqian, ZHOU Chi, FAN Zijie
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 66-72. DOI: 10.16511/j.cnki.qhdxxb.2018.22.042
Abstract
PDF
(6718KB) (
230
)
High-strength steel is an effective way to reduce automobile masses, with the forming limit curve of the steel as an important tool for evaluating the sheet metal forming. A forming limit curve simulation prediction method for the anisotropic high-strength steel Q490C is given here based on the maximum punch force criterion to reduce experiment costs and shorten the development cycle. The results are then fit to correlations. The simulations agree well with experimental data. The simulated curve intercept agrees well with the Keeler's formula. Thus, the finite element predictions of the forming limit curve used in this paper can accurately predict the forming limit curve for anisotropic sheets, which lays a foundation for blank stamping forming.
Figures and Tables
|
References
|
Related Articles
|
Metrics
ECONOMIC AND PUBLIC MANAGEMENT
Select
Start-ups valuation predicted by fuzzy real options theory
ZHENG Zheng, ZHU Wuxiang
Journal of Tsinghua University(Science and Technology). 2019,
59
(1): 73-84. DOI: 10.16511/j.cnki.qhdxxb.2018.22.051
Abstract
PDF
(942KB) (
345
)
Key parameter interval changes are used to quantify start-ups uncertainty and to deduce the discounted cash flow (DCF) and a compound real options model based on fuzzy theory. This research shows that the fuzzy real option method improves the DCF by giving the range of values with a fuzzy uncertainty to make more reasonable valuations. The fuzzy parameter sensitivity analysis shows that the start-ups uncertainty negatively correlates with the probability, the minimum value positively correlates with the left width, and the maximum value positively correlates with the right width. Analyses of the start-ups values for different situations can improve the investment decision accuracy. A case study further verifies the effectiveness of the fuzzy real options method in multi-stage investments for start-ups.
Figures and Tables
|
References
|
Related Articles
|
Metrics
News
More
»
2023年度优秀论文、优秀审稿人、优秀组稿人评选结果
2023-12-12
»
2022年度优秀论文、优秀审稿人、优秀组稿人评选结果
2022-12-20
»
2020年度优秀论文、优秀审稿人评选结果
2021-12-01
»
aa
2020-11-03
»
2020年度优秀论文、优秀审稿人评选结果
2020-10-28
»
第十六届“清华大学—横山亮次优秀论文奖”暨2019年度“清华之友—日立化成学术交流奖”颁奖仪式
2020-01-17
»
a
2019-01-09
»
a
2018-12-28
»
a
2018-01-19
»
news2016
2017-01-13
Links
More
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd