针对量子计算机特点的公钥密码理论与关键技术研究
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
项目级别
研究期限
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
项目受资助省
项目结题报告(全文)
1.基于CSAtt-GraphSAGE双通道特征加权融合的企业内部网络威胁检测方法
- 关键词:
- 企业内部网络威胁检测;自注意力机制;GraphSAGE;卷积神经网络;特征融合
- 罗燕燕;刘子傲;谢媛媛;纪祥敏
- 2025年
- 卷
- 期
- 期刊
针对许多研究注重于用户个体行为分析,忽略了用户之间潜在关联关系的问题,提出一种基于双通道特征加权融合的企业内部网络威胁检测方法。首先,在Intra通道采用CSAtt分析用户个体行为特征的内在联系和增强关键特征的表达能力;其次,在Inter通道将用户行为特征与用户关联关系抽象成异构图,并借助GraphSAGE捕捉图中关联用户节点间的群体行为模式;然后,引入可学习因子将不同通道获取的特征信息进行加权融合,使后续分类任务不仅能关注到与恶意操作相关的关键特征,还补充了对群体行为模式的分析,以提高整体模型检测性能。在CMU-CERTr4.2数据集上的实验表明,提出的双通道特征加权融合方法在解决企业内部网络威胁检测问题上具备有效性和普遍适用性,最终检测效果在准确率、精确率和F1值分别达到95.67%、96.32% 和95.37%。
...2.TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification
- 关键词:
- convolutional neural network; deep learning; encrypted traffic; trafficclassification; transformer;NEURAL-NETWORKS
- Liu, Ziao;Xie, Yuanyuan;Luo, Yanyan;Wang, Yuxin;Ji, Xiangmin
- 《APPLIED SCIENCES-BASEL》
- 2025年
- 15卷
- 6期
- 期刊
Featured Application Classification of encrypted traffic. Abstract Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in handling high-dimensional features; and (2) they lack the capability to capture dynamic temporal patterns. This paper introduces TransECA-Net, a novel hybrid deep learning architecture that addresses these limitations through two key innovations. First, we integrate ECA-Net modules with CNN architecture to enable automated feature extraction and efficient dimension reduction via channel selection. Second, we incorporate a Transformer encoder to model global temporal dependencies through multi-head self-attention, supplemented by residual connections for optimal gradient flow. Extensive experiments on the ISCX VPN-nonVPN dataset demonstrate the superiority of our approach. TransECA-Net achieved an average accuracy of 98.25% in classifying 12 types of encrypted traffic, outperforming classical baseline models such as 1D-CNN, CNN + LSTM, and TFE-GNN by 6.2-14.8%. Additionally, it demonstrated a 37.44-48.84% improvement in convergence speed during the training process. Our proposed framework presents a new paradigm for encrypted traffic feature disentanglement and representation learning. This paradigm enables cybersecurity systems to achieve fine-grained service identification of encrypted traffic (e.g., 98.9% accuracy in VPN traffic detection) and real-time responsiveness (48.8% faster than conventional methods), providing technical support for combating emerging cybercrimes such as monitoring illegal transactions on darknet networks and contributing significantly to adaptive network security monitoring systems.
...3.Quantum Polynomial-Time Fixed-Point Attack for RSA
- 关键词:
- information security; cryptography; RSA fixed-point; quantum computing
- Wang, Yahui;Zhang, Huanguo;Wang, Houzhen
- 《CHINA COMMUNICATIONS》
- 2018年
- 15卷
- 2期
- 期刊
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a well-known factoring algorithm by finding the prime factors of a number n = pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd (a(r/2) +/- 1,n) = p or q. For odd values of r it is assumed that the factors of n cannot be found (since a(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4 phi(r) / pi(2)r, exceeding that of the existing quantum algorithm for attacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.
...4.基于改进祖冲之算法的安全跳频通信系统研究
- 霍振坤;刘鹏程;
- 0年
- 卷
- 期
- 期刊
5.Research on the Method of Using Wireless Sensing to Detect Indoor People during Fire Based on Unmanned Aerial Vehicle
- 关键词:
- Concretes;Fire extinguishers;Information management;Risk management;Tall buildings;Unmanned aerial vehicles (UAV);Walls (structural partitions);Aerial vehicle;Channel state;Channel-state information;High-rise building fire;Search and rescue;State sensing;Through walls;Through-wall detection;Wireless channel;Wireless signals
- Tang, Lin;Wang, Chao;Ding, Yinfan;Zhou, Meng
- 《Tehnicki Vjesnik》
- 2024年
- 31卷
- 6期
- 期刊
Though improving the efficiency of urban land use, high-rise buildings greatly increase the difficulty in search and rescue during fires. Therefore, effective search and rescue in high-rise building fires has always been a hot and difficult issue in emergency management. Starting from the characteristics of high-rise building fires and the difficulties in addressing them, this paper introduced unmanned aerial vehicle (UAV) technology into search and rescue operations in fires. Based on the influences of dynamic factors on wireless signal (WS) states in a static environment, it investigated the techniques for extracting and sensing wireless channel state features when indoor personnel waves for help and proposed a method for indoor personnel detection based on channel state information (CSI) sensing. In the article, a single source wireless device (common Wi-Fi router) is used as the detection terminal to collect the wireless channel state, and the signal sampling, support vector machine (SVM), and other technologies are combined to realize the wireless channel state sensing and classification. The outcomes of the experiment revealed that the suggested approach can effectively succeed in through-wall detection and sensing for indoor personnel calling for help in the event of a fire, with an accuracy of 94.6%. Incorporating the non-invasive, robust, universal, and low-cost characteristics, the method promises broad application values in improving the search and rescue efficiency of firefighters. © 2024, Strojarski Facultet. All rights reserved.
...6.基于SM2和SM4的TEE下任务数据迁移方案
- 关键词:
- TEE 云计算 任务数据迁移 SM2 SM4 基金资助:国家自然科学基金[61332019]; 国家重点研发计划[2018YFC1604000]; “十三五”国家密码发展基金[MMJJ201701304]; 专辑:信息科技 专题:计算机软件及计算机应用 分类号:TP309 手机阅读
- 刘芹;郭凯圆;涂航
- 0年
- 卷
- 期
- 期刊
可信执行环境(Trusted Execution Environment,TEE)技术常用于保证云服务器上用户关键任务数据的机密性和完整性,考虑云服务器的负载均衡以及服务响应延迟,往往需要对TEE下的用户关键任务数据进行迁移。为了解决TEE下任务数据迁移中如何确认迁移双方身份可信性、保证迁移数据传输安全性和提高迁移速度等问题,文章提出一种高效的TEE下任务数据安全迁移方案。该方案使用软件防护扩展(Software Guard Extension,SGX)远程认证功能对迁移双方进行身份可信性验证,并基于SM2密钥协商算法和SM4分组密码算法保证迁移数据安全传输。安全性分析表明,该方案可以确保迁移双方身份可信性和迁移数据传输安全性;仿真实验结果表明,该迁移方案能够提高TEE下任务数据迁移速度。
...7.嵌入式系统安全综述
- 关键词:
- 可信计算 嵌入式系统 脆弱性 安全 对策 综述 基金资助:国家高技术研究发展计划(863)(2015AA016002); 国家自然科学基金(61332019); 国家重点基础研究发展计划(973)(2014CB340600,2014CB340601)资助项目; DOI:10.14188/j.1671-8836.2018.02.001 专辑:基础科学 信息科技 专题:计算机硬件技术 计算机软件及计算机应用 分类号:TP309TP368.1 手机阅读
- 赵波;倪明涛;石源;樊佩茹
- 0年
- 卷
- 期
- 期刊
针对嵌入式系统面临的安全威胁日益严重的问题,分析了嵌入式系统的特性与脆弱性.从基于硬件的侧信道、硬件木马、错误注入、微探针、硬件逆向工程等攻击和以破坏、篡改、窃取为目的的软件攻击两大层面,对嵌入式系统面临的安全威胁作了细致的阐述.分析了国内外现有的安全对策,并指出了其中的不足之处.基于可信计算思想,从理论研究模型、可信度量、可信报告、资源的可信共享与可信隔离等方面,给出了未来研究的建议.最后,提出了理想的全域联合安全增强方案,并讨论了未来的研究方向.
...8.基于WiFi定位的区域人群轨迹模型
- 关键词:
- WiFi定位 人群轨迹 三边测量定位 信号强度 位置指纹 基金资助:国家自然科学基金重点项目[61332019]; 中央引导地方科技发展专项资金项目[黔科中引地20184008]; 贵州省科技合作计划重点项目[黔科合LH字20157763]; 住房和城乡建设部科学技术计划项目[2016-K3-009]; 全国统计科学研究项目[2016LY81]; 专辑:基础科学 信息科技 专题:电信技术 分类号:TN92 手机阅读
- 徐洋;孙建忠;黄磊;谢晓尧
- 0年
- 卷
- 期
- 期刊
针对传统的室内WiFi定位方法难以解决大型活动及区域间流动人群轨迹分析需要这一问题,提出了基于三边测量定位和信号强度(RSSI)的应用于大型场馆、复杂环境下的人群定位新方法,实现区域内人员定位、区域内外人群划分、区域内人群流量分析。使用基于一种概率统计预测算法进行人群轨迹预测,建立了WiFi区域内人群轨迹模型,通过进一步建立的跨区域人群移动轨迹模型,实现大跨度区域间人群流动分析。通过搭建WiFi区域人群轨迹模型验证系统,使用2016年贵阳数博会数据,进行了数据可视化分析,证明了模型的有效性。
...9.网络空间安全学科简论
- 关键词:
- 网络空间 网络空间安全 网络空间安全学科 学科建设 人才培养 基金资助:国家重点基础研究发展计划(973计划)基金资助项目(No.2014CB340601); 国家自然科学基金重点资助项目(No.61332019)~~; 专辑:信息科技 社会科学Ⅱ辑 专题:高等教育 互联网技术 分类号:TP393.08-4G642 手机阅读
- 张焕国;杜瑞颖
- 0年
- 卷
- 期
- 期刊
随着信息技术与产业的高速发展和广泛应用,人类社会进入信息化时代。在信息化时代,人类生活工作在网络空间中,因此确保网络空间安全成为信息时代的基本需求。我国已经发展形成了完整的网络空间安全学科体系,因此,全面论述网络空间安全学科的体系结构与理论基础成为网络空间安全学科建设和人才培养的当务之急,内容包括:网络空间与网络空间安全的概念,网络空间安全学科的内涵,网络空间安全学科的主要研究方向及研究内容,网络空间安全学科的理论基础和方法论基础。因此,正确理解和掌握网络空间安全学科理论与体系结构,不仅对我国网络空间安全学科建设和人才培养具有十分重要的指导意义,而且对我国网络空间安全领域的科学研究和产业发展也具有十分重要的指导意义。
...10.Indoor Human Fall Detection Algorithm Based on Wireless Sensing
- 关键词:
- Wireless communication; Wireless sensor networks; Privacy; Machinelearning algorithms; Signal processing algorithms; Sensor systems;Sensors; wireless signal; channel status information; fall detection;wireless sensing
- Wang, Chao;Tang, Lin;Zhou, Meng;Ding, Yinfan;Zhuang, Xueyong;Wu, Jie
- 《TSINGHUA SCIENCE AND TECHNOLOGY》
- 2022年
- 27卷
- 6期
- 期刊
As the main health threat to the elderly living alone and performing indoor activities, falls have attracted great attention from institutions and society. Currently, fall detection systems are mainly based on wear sensors, environmental sensors, and computer vision, which need to be worn or require complex equipment construction. However, they have limitations and will interfere with the daily life of the elderly. On the basis of the indoor propagation theory of wireless signals, this paper proposes a conceptual verification module using Wi-Fi signals to identify human fall behavior. The module can detect falls without invading privacy and affecting human comfort and has the advantages of noninvasive, robustness, universality, and low price. The module combines digital signal processing technology and machine learning technology. This paper analyzes and processes the channel state information (CSI) data of wireless signals, and the local outlier factor algorithm is used to find the abnormal CSI sequence. The support vector machine and extreme gradient boosting algorithms are used for classification, recognition, and comparative research. Experimental results show that the average accuracy of fall detection based on wireless sensing is more than 90%. This work has important social significance in ensuring the safety of the elderly.
...
