-
Izumi TSUNOKUNI, Gen SATO, Yusuke IKEDA, Yasuhiro OIKAWA
Article type: LETTER
Article ID: 2024EAL2015
Published: 2024
Advance online publication: April 08, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This paper reports a spatial extrapolation of the sound field with a physics-informed neural network. We investigate the spatial extrapolation of the room impulse responses with physics-informed SIREN architecture. Furthermore, we proposed a noise-robust extrapolation method by introducing a tolerance term to the loss function.
View full abstract
-
Feng LIU, Helin WANG, Conggai LI, Yanli XU
Article type: LETTER
Article ID: 2024EAL2023
Published: 2024
Advance online publication: April 05, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This letter proposes a scheme for the backward transmission of the propagation-delay based three-user X channel, which is reciprocal to the forward transmission. The given scheme successfully delivers 10 expected messages in 6 time-slots by cyclic interference alignment without loss of degrees of freedom, which supports efficient bidirectional transmission between the two ends of the three-user X channel.
View full abstract
-
Hongtian ZHAO, Hua YANG, Shibao ZHENG
Article type: PAPER
Article ID: 2024EAP1043
Published: 2024
Advance online publication: April 05, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Minutiae pattern extraction plays a crucial role in finger print registration and identification for electronic applications. However, the extraction accuracy is seriously compromised by the presence of contaminated ridge lines and complex background scenarios. General image processing-based methods, which rely on many prior hypotheses, fail to effectively handle minutiae extraction in complex scenarios. Previous works have shown that CNN-based methods can perform well in object detection tasks. However, the deep neural networks (DNNs)-based methods are restricted by the limitation of public labeled datasets due to legitimate privacy concerns. To address these challenges comprehensively, this paper presents a fully automated minutiae extraction method leveraging DNNs. Firstly, we create a fingerprint minutiae dataset using a semi-automated minutiae annotation algorithm. Subsequently, we propose a minutiae extraction model based on Residual Networks (Resnet) that enables end-to-end prediction of minutiae. Moreover, we introduce a novel non-maximal suppression (NMS) procedure, guided by the Generalized Intersection over Union (GIoU) metric, during the inference phase to effectively handle outliers. Experimental evaluations conducted on the NIST SD4 and FVC 2004 databases demonstrate the superiority of the proposed method over existing state-of-the-art minutiae extraction approaches.
View full abstract
-
Kento TSUJI, Tetsu IWATA
Article type: PAPER
Article ID: 2024EAP1006
Published: 2024
Advance online publication: March 29, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the TBC-based Feistel cipher is known, and the indifferentiability security of the IC-based Feistel cipher is also known, where independently keyed TBCs and independent ICs are assumed. In this paper, we analyze the security of a single-keyed TBC-based Feistel cipher and a single IC-based Feistel cipher. We characterize the security depending on the number of rounds. More precisely, we cover the case of contracting Feistel ciphers that have d ≥ 2 lines, and the results on Feistel ciphers are obtained as a special case by setting d = 2. Our indistinguishability security analysis shows that it is provably secure with d + 1 rounds. Our indifferentiability result shows that, regardless of the number of rounds, it cannot be secure. Our attacks are a type of a slide attack, and we consider a structure that uses a round constant, which is a well-known counter measure against slide attacks. We show an indifferentiability attack for the case d = 2 and 3 rounds.
View full abstract
-
Yueying LOU, Qichun WANG
Article type: LETTER
Article ID: 2023EAL2111
Published: 2024
Advance online publication: March 28, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Boolean functions play an important role in symmetric ciphers. One of important open problems on Boolean functions is determining the maximum possible resiliency order of n-variable Boolean functions with optimal algebraic immunity. In this letter, we search Boolean functions in the rotation symmetric class, and determine the maximum possible resiliency order of 9-variable Boolean functions with optimal algebraic immunity. Moreover, the maximum possible nonlinearity of 9-variable rotation symmetric Boolean functions with optimal algebraic immunity-resiliency trade-off is determined to be 224.
View full abstract
-
Menglong WU, Jianwen ZHANG, Yongfa XIE, Yongchao SHI, Tianao YAO
Article type: LETTER
Article ID: 2023EAL2113
Published: 2024
Advance online publication: March 22, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Direct-current biased optical orthogonal frequency division multiplexing (DCO-OFDM) exhibits a high peak-to-average power ratio (PAPR), which leads to nonlinear distortion in the system. In response to the above, the study proposes a scheme that combines direct-current biased optical orthogonal frequency division multiplexing with index modulation (DCO-OFDM-IM) and convex optimization algorithms. The proposed scheme utilizes partially activated subcarriers of the system to transmit constellation modulated symbol information, and transmits additional symbol information of the system through the combination of activated carrier index. Additionally, a dither signal is added to the system's idle subcarriers, and the convex optimization algorithm is applied to solve for the optimal values of this dither signal. Therefore, by ensuring the system's peak power remains unchanged, the scheme enhances the system's average transmission power and thus achieves a reduction in the PAPR. Experimental results indicate that at a system's complementary cumulative distribution function (CCDF) of 10-4, the proposed scheme reduces the PAPR by approximately 3.5 dB compared to the conventional DCO-OFDM system. Moreover, at a bit error rate (BER) of 10-3, the proposed scheme can lower the signal-to-noise ratio (SNR) by about 1 dB relative to the traditional DCO-OFDM system. Therefore, the proposed scheme enables a more substantial reduction in PAPR and improvement in BER performance compared to the conventional DCO-OFDM approach.
View full abstract
-
Jiao DU, Ziwei ZHAO, Shaojing FU, Longjiang QU, Chao LI
Article type: PAPER
Article ID: 2023EAP1144
Published: 2024
Advance online publication: March 22, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this paper, we first recall the concept of 2-tuples distribution matrix, and further study its properties. Based on these properties, we find four special classes of 2-tuples distribution matrices. Then, we provide a new sufficient and necessary condition for n-variable rotation symmetric Boolean functions to be 2-correlation immune. Finally, we give a new method for constructing such functions when n = 4t - 1 is prime, and we show an illustrative example.
View full abstract
-
Yun JIANG, Huiyang LIU, Xiaopeng JIAO, Ji WANG, Qiaoqiao XIA
Article type: LETTER
Article ID: 2023EAL2104
Published: 2024
Advance online publication: March 18, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, a novel projection algorithm is proposed in which projection onto a triangle consisting of the three even-vertices closest to the vector to be projected replaces check polytope projection, achieving the same FER performance as exact projection algorithm in both high-iteration and low-iteration regime. Simulation results show that compared with the sparse affine projection algorithm (SAPA), it can improve the FER performance by 0.2 dB as well as save average number of iterations by 4.3%.
View full abstract
-
Qi QI, Liuyi MENG, Ming XU, Bing BAI
Article type: LETTER
Article ID: 2024EAL2004
Published: 2024
Advance online publication: March 18, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In face super-resolution reconstruction, the interference caused by the texture and color of the hair region on the details and contours of the face region can negatively affect the reconstruction results. This paper proposes a semantic-based, dual-branch face super-resolution algorithm to address the issue of varying reconstruction complexities and mutual interference among different pixel semantics in face images. The algorithm clusters pixel semantic data to create a hierarchical representation, distinguishing between facial pixel regions and hair pixel regions. Subsequently, independent image enhancement is applied to these distinct pixel regions to mitigate their interference, resulting in a vivid, super-resolution face image.
View full abstract
-
Nihad A. A. ELHAG, Liang LIU, Ping WEI, Hongshu LIAO, Lin GAO
Article type: PAPER
Article ID: 2023EAP1138
Published: 2024
Advance online publication: March 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
The concept of dual function radar-communication (DFRC) provides solution to the problem of spectrum scarcity. This paper examines a multiple-input multiple-output (MIMO) DFRC system with the assistance of a reconfigurable intelligent surface (RIS). The system is capable of sensing multiple spatial directions while serving multiple users via orthogonal frequency division multiplexing (OFDM). The objective of this study is to design the radiated waveforms and receive filters utilized by both the radar and users. The mutual information (MI) is used as an objective function, on average transmit power, for multiple targets while adhering to constraints on power leakage in specific directions and maintaining each user's error rate. To address this problem, we propose an optimal solution based on a computational genetic algorithm (GA) using bisection method. The performance of the solution is demonstrated by numerical examples and it is shown that, our proposed algorithm can achieve optimum MI and the use of RIS with the MIMO DFRC system improving the system performance.
View full abstract
-
Dong Jae LEE, Deukjo HONG, Jaechul SUNG, Seokhie HONG
Article type: PAPER
Article ID: 2023EAP1145
Published: 2024
Advance online publication: March 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this study, we focus on evaluating the false-positive probability of the Demirci-Selçuk meet-in-the-middle attack, particularly within the context of configuring precomputed tables with multisets. During the attack, the adversary effectively reduces the size of the key space by filtering out the wrong keys, subsequently recovering the master key from the reduced key space. The false-positive probability is defined as the probability that a wrong key will pass through the filtering process. Due to its direct impact on the post-filtering key space size, the false-positive probability is an important factor that influences the complexity and feasibility of the attack. However, despite its significance, the false-positive probability of the multiset-based Demirci-Selçuk meet-in-the-middle attack has not been thoroughly discussed, to the best of our knowledge. We generalize the Demirci-Selçuk meet-in-the-middle attack and present a sophisticated method for accurately calculating the false-positive probability. We validate our methodology through toy experiments, demonstrating its high precision. Additionally, we propose a method to optimize an attack by determining the optimal format of precomputed data, which requires the precise false-positive probability. Applying our approach to previous attacks on AES and ARIA,we have achieved modest improvements. Specifically, we enhance the memory complexity and time complexity of the offline phase of previous attacks on 7-round AES-128/192/256, 7-round ARIA-192/256, and 8-round ARIA-256 by factors ranging from 20.56 to 23. Additionally, we have improved the overall time complexity of attacks on 7-round ARIA-192/256 by factors of 20.13 and 20.42, respectively.
View full abstract
-
Tetsuya ARAKI, Shin-ichi NAKANO
Article type: PAPER
Article ID: 2023DMP0010
Published: 2024
Advance online publication: March 11, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
The dispersion problem is a variant of facility location problems, that has been extensively studied. Given a polygon with n edges on a plane we want to find k points in the polygon so that the minimum pairwise Euclidean distance of the k points is maximized. We call the problem the k-dispersion problem in a polygon. Intuitively, for an island, we want to locate k drone bases far away from each other in flying distance to avoid congestion in the sky. In this paper, we give a polynomial-time approximation scheme (PTAS) for this problem when k is a constant and ε < 1 (where ε is a positive real number). Our proposed algorithm runs in O(((1/ε)2 + n/ε)k) time with 1/(1 + ε) approximation, the first PTAS developed for this problem. Additionally, we consider three variations of the dispersion problem and design a PTAS for each of them.
View full abstract
-
SHA ZHICHAO, MA ZIJI, XIONG KUNLAI, QIN LIANGCHENG, WANG XUEYING
Article type: PAPER
Article ID: 2023EAP1120
Published: 2024
Advance online publication: March 06, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Diagnosis at an early stage is clinically important for the cure of skin cancer. However, since some skin cancers have similar intuitive characteristics, and dermatologists rely on subjective experience to distinguish skin cancer types, the accuracy is often suboptimal. Recently, the introduction of computer methods in the medical field has better assisted physicians to improve the recognition rate but some challenges still exist. In the face of massive dermoscopic image data, residual network (ResNet) is more suitable for learning feature relationships inside big data because of its deeper network depth. Aiming at the deficiency of ResNet, this paper proposes a multi-region feature extraction and raising dimension matching method, which further improves the utilization rate of medical image features. This method firstly extracted rich and diverse features from multiple regions of the feature map, avoiding the deficiency of traditional residual modules repeatedly extracting features in a few fixed regions. Then, the fused features are strengthened by up-dimensioning the branch path information and stacking it with the main path, which solves the problem that the information of two paths is not ideal after fusion due to different dimensionality. The proposed method is experimented on the International Skin Imaging Collaboration (ISIC) Archive dataset, which contains more than 40,000 images. The results of this work on this dataset and other datasets are evaluated to be improved over networks containing traditional residual modules and some popular networks.
View full abstract
-
Daxiu ZHANG, Xianwei LI, Bo WEI
Article type: PAPER
Article ID: 2023EAP1139
Published: 2024
Advance online publication: March 06, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
With the increase of the number of Mobile User Equipments (MUEs), numerous tasks that with high requirements of resources are generated. However, the MUEs have limited computational resources, computing power and storage space. In this paper, a joint coverage constrained task offloading and resource allocation method based on deep reinforcement learning is proposed. The aim is offload the tasks that cannot be processed locally to the edge servers to alleviate the conflict between the resource constraints of MUEs and the high performance task processing. The studied problem considers the dynamic variability and complexity of the system model, coverage, offloading decisions, communication relationships and resource constraints. An entropy weight method is used to optimize the resource allocation process and balance the energy consumption and execution time. The results of the study show that the number of tasks and MUEs affects the execution time and energy consumption of the task offloading and resource allocation processes in the interest of the service provider, and enhances the user experience.
View full abstract
-
Sinh CONG LAM, Bach HUNG LUU, Kumbesan SANDRASEGARAN
Article type: LETTER
Article ID: 2024EAL2001
Published: 2024
Advance online publication: March 06, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Cooperative Communication is one of the most effective technique to improve the desired signal quality of the typical user. This paper studies an indoor cellular network system that deploys the Reconfigurable Intelligent Surfaces (RIS) at the position of BSs to enable the cooperative features. To evaluate the network performance, the coverage probability expression of the typical user in the indoor wireless environment with presence of walls and effects of Rayleigh fading is derived. The analytical results shows that the RIS-assisted system outperforms the regular one in terms of coverage probability.
View full abstract
-
Mengmeng ZHANG, Zeliang ZHANG, Yuan LI, Ran CHENG, Hongyuan JING, Zhi ...
Article type: LETTER
Article ID: 2024EAL2021
Published: 2024
Advance online publication: March 06, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Point cloud video contains not only color information but also spatial position information and usually has large volume of data. Typical rate distortion optimization algorithms based on Human Visual System only consider the color information, which limit the coding performance. In this paper, a Coding Tree Unit (CTU) level quantization parameter (QP) adjustment algorithm based on JND and spatial complexity is proposed to improve the subjective and objective quality of Video-Based Point Cloud Compression (V-PCC). Firstly, it is found that the JND model is degraded at CTU level for attribute video due to the pixel filling strategy of V-PCC, and an improved JND model is designed using the occupancy map. Secondly, a spatial complexity detection metric is designed to measure the visual importance of each CTU. Finally, a CTU-level QP adjustment scheme based on both JND levels and visual importance is proposed for geometry and attribute video. The experimental results show that, compared with the latest V-PCC (TMC2-18.0) anchors, the BD-rate is reduced by - 2.8% and -3.2% for D1 and D2 metrics, respectively, and the subjective quality is improved significantly.
View full abstract
-
Ngoc-Tan NGUYEN, Trung-Duc NGUYEN, Nam-Hoang NGUYEN, Trong-Minh HOANG
Article type: LETTER
Article ID: 2023EAL2048
Published: 2024
Advance online publication: March 05, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Multi-access edge computing (MEC) is an emerging technology of 5G and beyond mobile networks which deploys computation services at edge servers for reducing service delay. However, edge servers may have not enough computation capabilities to satisfy the delay requirement of services. Thus, heavy computation tasks need to be offloaded to other MEC servers. In this paper, we propose an offloading solution, called optimal delay offloading (ODO) solution, that can guarantee service delay requirements. Specificially, this method exploits an estimation of queuing delay among MEC servers to find a proper offloading server with the lowest service delay to offload the computation task. Simulation results have proved that the proposed ODO method outperforms the conventional methods, i.e., the non-offloading and the energy-efficient offloading [10] methods (up to 1.6 times) in terms of guaranteeing the service delay under a threshold.
View full abstract
-
Shoichi HIROSE, Hidenori KUWAKADO
Article type: PAPER
Article ID: 2023DMP0007
Published: 2024
Advance online publication: March 04, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In 2005, Nandi introduced a class of double-block-length compression functions hπ (x) := (h(x) , h( π(x) ) ), where h is a random oracle with an n-bit output and π is a non-cryptographic public permutation. Nandi demonstrated that the collision resistance of hπ is optimal if π has no fixed point in the classical setting. Our study explores the collision resistance of hπ and the Merkle-Damåard hash function using hπ in the quantum random oracle model. Firstly, we reveal that the quantum collision resistance of hπ may not be optimal even if π has no fixed point. If π is an involution, then a colliding pair of inputs can be found for hπ with only O(2n/2) queries by the Grover search. Secondly, we present a sufficient condition on π for the optimal quantum collision resistance of hπ. This condition states that any collision attack needs Ω(22n/3) queries to find a colliding pair of inputs. The proof uses the recent technique of Zhandry's compressed oracle. Thirdly, we show that the quantum collision resistance of the Merkle-Damgård hash function using hπ can be optimal even if π is an involution. Finally, we discuss the quantum collision resistance of double-block-length compression functions using a block cipher.
View full abstract
-
Yumeng ZHANG
Article type: LETTER
Article ID: 2023EAL2094
Published: 2024
Advance online publication: March 04, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Integrated Sensing and Communication at terahertz band (ISAC-THz) has been considered as one of the promising technologies for the future 6G. However, in the phase-shifters (PSs) based massive multiple-input-multiple-output (MIMO) hybrid precoding system, due to the ultra-large bandwidth of the terahertz frequency band, the subcarrier channels with different frequencies have different equivalent spatial directions. Therefore, the hybrid beamforming at the transmitter will cause serious beam split problems. In this letter, we propose a dual-function radar communication (DFRC) precoding method by considering recently proposed delay-phase precoding structure for THz massive MIMO. By adding delay phase components between the radio frequency chain and the frequency-independent PSs, the beam is aligned with the target physical direction over the entire bandwidth to reduce the loss caused by beam splitting effect. Furthermore, we employ a hardware structure by using true-timedelayers (TTDs) to realize the concept of frequency-dependent phase shifts. Theoretical analysis and simulation results have shown that it can increase communication performance and make up for the performance loss caused by the dual-function trade-off of communication radar to a certain extent.
View full abstract
-
Jun-Feng Liu, Yuan Feng, Zeng-Hui Li, Jing-Wei Tang
Article type: LETTER
Article ID: 2024EAL2012
Published: 2024
Advance online publication: March 04, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
To improve the control performance of the permanent magnet synchronous motor speed control system, the fractional order calculus theory is combined with the sliding mode control to design the fractional order integral sliding mode sliding mode surface (FOISM) to improve the robustness of the system. Secondly, considering the existence of chattering phenomenon in sliding mode control, a new second-order sliding mode reaching law (NSOSMRL) is designed to improve the control accuracy of the system. Finally, the effectiveness of the proposed strategy is demonstrated by simulation.
View full abstract
-
Keita EMURA, Kaisei KAJITA, Go OHTAKE
Article type: PAPER
Article ID: 2023DMP0003
Published: 2024
Advance online publication: February 26, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
As a multi-receiver variant of public key encryption with keyword search (PEKS), broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukherjee at INDOCRYPT 2018). Unlike broadcast encryption, no receiver anonymity is considered because the test algorithm takes a set of receivers as input and thus a set of receivers needs to be contained in a ciphertext. In this paper, we propose a generic construction of BEKS from anonymous andweakly robust 3-level hierarchical identity-based encryption (HIBE). The proposed generic construction provides outsider anonymity, where an adversary is allowed to obtain secret keys of outsiders who do not belong to the challenge sets, and provides sublinear-size ciphertext in terms of the number of receivers. Moreover, the proposed construction considers security against chosen-ciphertext attack (CCA) where an adversary is allowed to access a test oracle in the searchable encryption context. The proposed generic construction can be seen as an extension to the Fazio-Perera generic construction of anonymous broadcast encryption (PKC 2012) from anonymous and weakly robust identity-based encryption (IBE) and the Boneh et al. generic construction of PEKS (EUROCRYPT 2004) from anonymous IBE.We run the Fazio-Perera construction employs on the first-level identity and run the Boneh et al. generic construction on the second-level identity, i.e., a keyword is regarded as a second-level identity. The third-level identity is used for providing CCA security by employing one-time signatures. We also introduce weak robustness in the HIBE setting, and demonstrate that the Abdalla et al. generic transformation (TCC 2010/JoC 2018) for providing weak robustness to IBE works for HIBE with an appropriate parameter setting. We also explicitly introduce attractive concrete instantiations of the proposed generic construction from pairings and lattices, respectively.
View full abstract
-
Xiuping PENG, Yinna LIU, Hongbin LIN
Article type: LETTER
Article ID: 2023EAL2091
Published: 2024
Advance online publication: February 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we propose a novel direct construction of three-phase Z-complementary triads with flexible lengths and various widths of the zero-correlation zone based on extended Boolean functions. The maximum width ratio of the zero-correlation zone of the construction can reach 3/4. And the proposed sequences can exist for all lengths other than powers of three. We also investigate the peak-to-average power ratio properties of the proposed ZCTs.
View full abstract
-
Yang XIAO, Zhongyuan ZHOU, Mingjie SHENG, Qi ZHOU
Article type: PAPER
Article ID: 2023EAP1102
Published: 2024
Advance online publication: February 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
The method of extracting impedance parameters of surface mounted (SMD) electronic components by test is suitable for components with unknown model or material information, but requires consideration of errors caused by non-coaxial and measurement fixtures. In this paper, a fixture for impedance measurement is designed according to the characteristics of passive devices, and the fixture de-embedding method is used to eliminate errors and improve the test accuracy. The method of obtaining S parameters of fixture based on full wave simulation proposed in this paper can provide a thought for obtaining S parameters in de-embedding. Taking a certain patch capacitor as an example, the S parameters for de-embedding were obtained using methods based on full wave simulation, 2×Thru, and ADS simulation, and de-embedding tests were conducted. The results indicate that obtaining the S parameter of the testing fixture based on full wave simulation and conducting de-embedding testing compared to ADS simulation can accurately extract the impedance parameters of SMD electronic components, which provides a reference for the study of electromagnetic interference (EMI) coupling mechanism.
View full abstract
-
Kazuyuki MIURA
Article type: PAPER
Article ID: 2023DMP0004
Published: 2024
Advance online publication: February 09, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
A rectangle-of-influence drawing of a plane graph G is a straight-line planar drawing of G such that there is no vertex in the proper inside of the axis-parallel rectangle defined by the two ends of any edge. In this paper, we show that any given 5-connected plane graph G with five or more vertices on the outer face has a rectangle-of-influence drawing in an integer grid such that W + H ≤ n - 2, where n is the number of vertices in G, W is the width and H is the height of the grid.
View full abstract
-
Yusaku HIRAI, Toshimasa MATSUOKA, Takatsugu KAMATA, Sadahiro TANI, Tak ...
Article type: PAPER
Article ID: 2023EAP1093
Published: 2024
Advance online publication: February 09, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This paper presents a multi-channel biomedical sensor system with system-level chopping and stochastic analog-to-digital (A/D) conversion technique. The system-level chopping technique extends the input-signal bandwidth and reduces the interchannel crosstalk caused by multiplexing. The system-level chopping can replace an analog low-pass filter (LPF) with a digital filter and can reduce its area occupation. The stochastic A/D conversion technique realizes power-efficient resolution enhancement. A novel auto-calibration technique is also proposed for the stochastic A/D conversion technique. The proposed system includes a prototype analog front-end (AFE) IC fabricated using a 130 nm CMOS process. The fabricated AFE IC improved its interchannel crosstalk by 40 dB compared with the conventional analog chopping architecture. The AFE IC achieved SNDR of 62.9 dB at a sampling rate of 31.25 kSps while consuming 9.6 μW from a 1.2 V power supply. The proposed resolution enhancement technique improved the measured SNDR by 4.5 dB.
View full abstract
-
Ryuta TAMURA, Yuichi TAKANO, Ryuhei MIYASHIRO
Article type: PAPER
Article ID: 2023EAP1043
Published: 2024
Advance online publication: February 08, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
We study the mixed-integer optimization (MIO) approach to feature subset selection in nonlinear kernel support vector machines (SVMs) for binary classification. To measure the performance of subset selection, we use the distance between two classes (DBTC) in a high-dimensional feature space based on the Gaussian kernel function. However, DBTC to be maximized as an objective function is nonlinear, nonconvex and nonconcave. Despite the difficulty of linearizing such a nonlinear function in general, our major contribution is to propose a mixed-integer linear optimization (MILO) formulation to maximize DBTC for feature subset selection, and this MILO problem can be solved to optimality using optimization software. We also derive a reduced version of the MILO problem to accelerate our MILO computations. Experimental results show good computational efficiency for our MILO formulation with the reduced problem. Moreover, our method can often outperform the linear-SVM-based MILO formulation and recursive feature elimination in prediction performance, especially when there are relatively few data instances.
View full abstract
-
Nobuyuki TAKEUCHI, Kosei SAKAMOTO, Takuro SHIRAYA, Takanori ISOBE
Article type: PAPER
Article ID: 2023EAP1098
Published: 2024
Advance online publication: February 08, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
At CT-RSA 2022, Bossert et al. proposed Pholkos family, an efficient large-state tweakable block cipher. In order to evaluate the security of differential attacks on Pholkos, they obtained the lower bounds for the number of active S-boxes for Pholkos using MILP (Mixed Integer Linear Programming) tools. Based on it, they claimed that Pholkos family is secure against differential attacks. However, they only gave rough security bounds in both of related-tweak and related-tweakey settings. To be more precise, they estimated the lower bounds of the number of active S-boxes for relatively-large number of steps by just summing those in the small number of steps.
In this paper, we utilize efficient search methods based on MILP to obtain tighter lower bounds for the number of active S-boxes in a larger number of steps. For the first time, we derive the exact minimum number of active S-boxes of each variant up to the steps where the security against differential attacks can be ensured in related-tweak and related-tweakey settings. Our results indicate that Pholkos-256-128/256-256/512/1024 is secure after 4/5/3/4 steps in the related-tweak setting, and after 5/6/3/4 steps in the related-tweakey setting, respectively. Our results enable reducing the required number of steps to be secure against differential attacks of Pholkos-256-256 in related-tweak setting, and Pholkos-256-128/256 and Pholkos-1024 in the related-tweakey setting by one step, respectively.
View full abstract
-
Shion UTSUMI, Kosei SAKAMOTO, Takanori ISOBE
Article type: PAPER
Article ID: 2023EAP1149
Published: 2024
Advance online publication: February 08, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers Piccolo and TWINE have been proposed. Both Piccolo and TWINE are designed based on the Generalized Feistel Structure. However, it is crucial to address the potential vulnerability of these structures to the impossible differential attack. Therefore, detailed security evaluations against this attack are essential.
This paper focuses on conducting bit-level evaluations of Piccolo and TWINE against related-key impossible differential attacks by leveraging SAT-aided approaches. We search for the longest distinguishers under the condition that the Hamming weight of the active bits of the input, which includes plaintext and master key differences, and output differences is set to 1, respectively. Additionally, for Tweakable TWINE, we search for the longest distinguishers under the related-tweak and related-tweak-key settings. The result for Piccolo with a 128-bit key, we identify the longest 16-round distinguishers for the first time. In addition, we also demonstrate the ability to extend these distinguishers to 17 rounds by taking into account the cancellation of the round key and plaintext difference. Regarding evaluations of TWINE with a 128-bit key, we search for the first time and reveal the distinguishers up to 19 rounds. For the search for Tweakable TWINE, we evaluate under the related-tweak-key setting for the first time and reveal the distinguishers up to 18 rounds for 80-bit key and 19 rounds for 128-bit key.
View full abstract
-
You GAO, Ming-Yue XIE, Gang WANG, Lin-Zhi SHEN
Article type: LETTER
Article ID: 2023EAL2083
Published: 2024
Advance online publication: February 07, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Mutually unbiased bases (MUBs) are widely used in quantum information processing and play an important role in quantum cryptography, quantum state tomography and communications. It's difficult to construct MUBs and remains unknown whether complete MUBs exist for any non prime power. Therefore, researchers have proposed the solution to construct approximately mutually unbiased bases (AMUBs) by weakening the inner product conditions. This paper constructs q AMUBs of ℂq, (q + 1) AMUBs of ℂq-1 and q AMUBs of ℂq-1 by using character sums over Galois rings and finite fields, where q is a power of a prime. The first construction of q AMUBs of ℂq is new which illustrates K AMUBs of ℂK can be achieved. The second and third constructions in this paper include the partial results about AMUBs constructed by W. Wang et al. in [9].
View full abstract
-
Zhimin SHAO, Chunxiu LIU, Cong WANG, Longtan LI, Yimin LIU, Zaiyan ZHO ...
Article type: PAPER
Article ID: 2023EAP1150
Published: 2024
Advance online publication: January 31, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Data resource sharing can guarantee the reliable and safe operation of distribution power grid. However, it faces the challenges of low security and high delay in the sharing process. Consortium blockchain can ensure the security and efficiency of data resource sharing, but it still faces problems such as arbitrary master node selection and high consensus delay. In this paper, we propose an improved practical Byzantine fault tolerance (PBFT) consensus algorithm based on intelligent consensus node selection to realize high-security and real-time data resource sharing for distribution power grid. Firstly, a blockchain-based data resource sharing model is constructed to realize secure data resource storage by combining the consortium blockchain and interplanetary file system (IPFS). Then, the improved PBFT consensus algorithm is proposed to optimize the consensus node selection based on the upper confidence bound of node performance. It prevents Byzantine nodes from participating in the consensus process, reduces the consensus delay, and improves the security of data resource sharing. The simulation results verify the effectiveness of the proposed algorithm.
View full abstract
-
Xiaolong ZHENG, Bangjie LI, Daqiao ZHANG, Di YAO, Xuguang YANG
Article type: LETTER
Article ID: 2023EAL2074
Published: 2024
Advance online publication: January 23, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
High Frequency Surface Wave Radar holds significant potential in sea detection. However, the target signals are often surpassed by substantial sea clutter and ionospheric clutter, making it crucial to address clutter suppression and extract weak target signals amidst the strong noise background. This study proposes a novel method for separating weak harmonic target signals based on local tangent space, leveraging the chaotic feature of ionospheric clutter. The effectiveness of this approach is demonstrated through the analysis of measured data, thereby validating its practicality and potential for real-world applications.
View full abstract
-
Daichi ISHIKAWA, Naoki HAYASHI, Shigemasa TAKAI
Article type: PAPER
Article ID: 2023MAP0002
Published: 2024
Advance online publication: January 18, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this paper, we consider a distributed stochastic nonconvex optimization problem for multiagent systems. We propose a distributed stochastic gradient-tracking method with event-triggered communication. A group of agents cooperatively finds a critical point of the sum of local cost functions, which are smooth but not necessarily convex. We show that the proposed algorithm achieves a sublinear convergence rate by appropriately tuning the step size and the trigger threshold. Moreover, we show that agents can effectively solve a nonconvex optimization problem by the proposed event-triggered algorithm with less communication than by the existing time-triggered gradient-tracking algorithm. We confirm the validity of the proposed method by numerical experiments.
View full abstract
-
Takahiro IINUMA, Yudai EBATO, Sou NOBUKAWA, Nobuhiko WAGATSUMA, Keiich ...
Article type: PAPER
Article ID: 2023EAP1116
Published: 2024
Advance online publication: January 17, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Stochastic resonance is a representative phenomenon in which the degree of synchronization with a weak input signal is enhanced using additive stochastic noise. In systems with multiple chaotic attractors, the chaos-chaos intermittent behavior in attractor-merging bifurcation induces chaotic resonance, which is similar to the stochastic resonance and has high sensitivity. However, controlling chaotic resonance is difficult because it requires adjusting the internal parameters from the outside. The reduced-region-of-orbit (RRO) method, which controls the attractor-merging bifurcation using an external feedback signal, is employed to overcome this issue. However, the lower perturbation of the feedback signal requires further improvement for engineering applications. This study proposed an RRO method with more sophisticated and less perturbed feedback signals, called the double-Gaussian-filtered RRO (DG-RRO) method. The inverse sign of the map function and double Gaussian filters were used to improve the local specification, i.e., the concentration around the local maximum/minimum in the feedback signals, called the DG-RRO feedback signals. Owing to their fine local specification, these signals achieved the attractor-merging bifurcation with significantly smaller feedback perturbation than that in the conventional RRO method. Consequently, chaotic resonance was induced through weak feedback perturbation. It exhibited greater synchronization against weak input signals than that induced by the conventional RRO feedback signal and sustained the same level of response frequency range as that of the conventional RRO method. These advantages may pave the way for utilizing chaotic resonance in engineering scenarios where the stochastic resonance has been applied.
View full abstract
-
Qingqi ZHANG, Xiaoan BAO, Ren WU, Mitsuru NAKATA, Qi-Wei GE
Article type: PAPER
Article ID: 2023MAP0007
Published: 2024
Advance online publication: January 16, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Automatic detection of prohibited items is vital in helping security staff be more efficient while improving the public safety index. However, prohibited item detection within X-ray security inspection images is limited by various factors, including the imbalance distribution of categories, diversity of prohibited item scales, and overlap between items. In this paper, we propose to leverage the Poisson blending algorithm with the Canny edge operator to alleviate the imbalance distribution of categories maximally in the X-ray images dataset. Based on this, we improve the cascade network to deal with the other two difficulties. To address the prohibited scale diversity problem, we propose the Re-BiFPN feature fusion method, which includes a coordinate attention atrous spatial pyramid pooling (CA-ASPP) module and a recursive connection. The CA-ASPP module can implicitly extract direction-aware and position-aware information from the feature map. The recursive connection feeds the CA-ASPP module processed multi-scale feature map to the bottom-up backbone layer for further multi-scale feature extraction. In addition, a Rep-CIoU loss function is designed to address the overlapping problem in X-ray images. Extensive experimental results demonstrate that our method can successfully identify ten types of prohibited items, such as Knives, Scissors, Pressure, etc. and achieves 83.4% of mAP, which is 3.8% superior to the original cascade network. Moreover, our method outperforms other mainstream methods by a significant margin.
View full abstract
-
Takeru INOUE, Norihito YASUDA, Hidetomo NABESHIMA, Masaaki NISHINO, Sh ...
Article type: PAPER
Article ID: 2023DMP0006
Published: 2024
Advance online publication: January 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This paper reports on the details of the International Competition on Graph Counting Algorithms (ICGCA) held in 2023. The graph counting problem is to count the subgraphs satisfying specified constraints on a given graph. The problem belongs to #P-complete, a computationally tough class. Since many essential systems in modern society, e.g., infrastructure networks, are often represented as graphs, graph counting algorithms are a key technology to efficiently scan all the subgraphs representing the feasible states of the system. In the ICGCA, contestants were asked to count the paths on a graph under a length constraint. The benchmark set included 150 challenging instances, emphasizing graphs resembling infrastructure networks. Eleven solvers were submitted and ranked by the number of benchmarks correctly solved within a time limit. The winning solver, TLDC, was designed based on three fundamental approaches: backtracking search, dynamic programming, and model counting or #SAT (a counting version of Boolean satisfiability). Detailed analyses show that each approach has its own strengths, and one approach is unlikely to dominate the others. The codes and papers of the participating solvers are available: https://afsa.jp/icgca/.
View full abstract
-
Zhan SHI
Article type: PAPER
Article ID: 2023EAP1154
Published: 2024
Advance online publication: January 15, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Power line communication (PLC) provides a flexible-access, wide-distribution, and low-cost communication solution for distribution network services. However, the PLC self-organizing networking in distribution network faces several challenges such as diversified data transmission requirements guarantee, the contradiction between long-term constraints and short-term optimization, and the uncertainty of global information. To address these challenges, we propose a backpressure learning-based data transmission reliability-aware self-organizing networking algorithm to minimize the weighted sum of node data backlogs under the long-term transmission reliability constraint. Specifically, the minimization problem is transformed by the Lyapunov optimization and backpressure algorithm. Finally, we propose a backpressure and data transmission reliability-aware state-action-reward-state-action (SARSA)-based self-organizing networking strategy to realize the PLC networking optimization. Simulation results demonstrate that the proposed algorithm has superior performances of data backlogs and transmission reliability.
View full abstract
-
Hakan BERCAG, Osman KUKRER, Aykut HOCANIN
Article type: LETTER
Article ID: 2023EAL2072
Published: 2024
Advance online publication: January 11, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
A new extended normalized least-mean-square (ENLMS) algorithm is proposed. A novel non-linear time-varying step-size (NLTVSS) formula is derived. The convergence rate of ENLMS increases due to NLTVSS as the number of data-reuse L is increased. ENLMS does not involve matrix inversion, and, thus, avoids numerical instability issues.
View full abstract
-
Ryoto Koizumi, Xiaoyan Wang, Masahiro Umehira, Ran Sun, Shigeki Takeda
Article type: PAPER
Article ID: 2023EAP1122
Published: 2024
Advance online publication: January 11, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In recent years, high-resolution 77GHz band automotive radar, which is indispensable for autonomous driving, has been extensively investigated. In the future, as vehicle-mounted CS (chirp sequence) radars become more and more popular, intensive inter-radar wideband interference will become a serious problem, which results in undesired miss detection of targets. To address this problem, learning-based wideband interference mitigation method has been proposed, and its feasibility has been validated by simulations. In this paper, firstly we evaluated the tradeoff between interference mitigation performance and model training time of the learning-based interference mitigation method in a simulation environment. Secondly, we conducted extensive inter-radar interference experiments by using multiple 77GHz MIMO (Multiple-Input and Multiple-output) CS radars and collected real-world interference data. Finally, we compared the performance of learning-based interference mitigation method with existing algorithm-based methods by real experimental data in terms of SINR (signal to interference plus noise ratio) and MAPE (mean absolute percentage error).
View full abstract
-
Guangwei Cong, Noritsugu Yamamoto, Takashi Inoue, Yuriko Maegami, Mori ...
Article type: INVITED PAPER
Article ID: 2023GCI0001
Published: 2024
Advance online publication: January 05, 2024
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Wide deployment of artificial intelligence (AI) is inducing exponentially growing energy consumption. Traditional digital platforms are becoming difficult to fulfill such ever-growing demands on energy efficiency as well as computing latency, which necessitates the development of high efficiency analog hardware platforms for AI. Recently, optical and electrooptic hybrid computing is reactivated as a promising analog hardware alternative because it can accelerate the information processing in an energy-efficient way. Integrated photonic circuits offer such an analog hardware solution for implementing photonic AI and machine learning. For this purpose, we proposed a photonic analog of support vector machine and experimentally demonstrated low-latency and low-energy classification computing, which evidences the latency and energy advantages of optical analog computing over traditional digital computing. We also proposed an electrooptic Hopfield network for classifying and recognizing time-series data. This paper will review our work on implementing classification computing and Hopfield network by leveraging silicon photonic circuits.
View full abstract
-
Hiroya Hachiyama, Takamichi Nakamoto
Article type: PAPER
Article ID: 2023EAP1051
Published: 2023
Advance online publication: December 28, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Devices presenting audiovisual information are widespread, but few ones presenting olfactory information. We have developed a device called an olfactory display that presents odors to users by mixing multiple fragrances. Previously developed olfactory displays had the problem that the ejection volume of liquid perfume droplets was large and the dynamic range of the blending ratio was small. In this study, we used an inkjet device that ejects small droplets in order to expand the dynamic range of blending ratios to present a variety of scents. By finely controlling the back pressure using an electro-osmotic pump (EO pump) and adjusting the timing of EO pump and inkjet device, we succeeded in stabilizing the ejection of the inkjet device and we can have large dynamic range.
View full abstract
-
Chuzo IWAMOTO, Takeru TOKUNAGA
Article type: LETTER
Article ID: 2023DML0001
Published: 2023
Advance online publication: December 27, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Choco Banana is one of Nikoli's pencil puzzles. We study the computational complexity of Choco Banana. It is shown that deciding whether a given instance of the Choco Banana puzzle has a solution is NP-complete.
View full abstract
-
Changhui CHEN, Haibin KAN, Jie PENG, Li WANG
Article type: PAPER
Article ID: 2023EAP1113
Published: 2023
Advance online publication: December 27, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Permutation polynomials have been studied for a long time and have important applications in cryptography, coding theory and combinatorial designs. In this paper, by means of the multivariate method and the resultant, we propose four new classes of permutation quadrinomials over 𝔽q3, where q is a prime power. We also show that they are not quasi-multiplicative equivalent to known ones. Moreover, we compare their differential uniformity with that of some known classes of permutation trinomials for some small q.
View full abstract
-
Pingping JI, Lingge JIANG, Chen HE, Di HE, Zhuxian LIAN
Article type: LETTER
Article ID: 2023EAL2082
Published: 2023
Advance online publication: December 25, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we study the dynamic antenna grouping and the hybrid beamforming for high altitude platform (HAP) massive multiple-input multiple-output (MIMO) systems. We first exploit the fact that the ergodic sum rate is only related to statistical channel state information (SCSI) in the large-scale array regime, and then we utilize it to perform the dynamic antenna grouping and design the RF beamformer. By applying the Gershgorin Circle Theorem, the dynamic antenna grouping is realized based on the novel statistical distance metric instead of the value of the instantaneous channels. The RF beamformer is designed according to the singular value decomposition of the statistical correlation matrix according to the obtained dynamic antenna group. Dynamic subarrays mean each RF chain is linked with a dynamic antenna sub-set. The baseband beamformer is derived by utilizing the zero forcing (ZF). Numerical results demonstrate the performance enhancement of our proposed dynamic hybrid precoding (DHP) algorithm.
View full abstract
-
Ho-Lim CHOI
Article type: LETTER
Article ID: 2023EAL2092
Published: 2023
Advance online publication: December 25, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
We propose a zero-order-hold triggered control for a chain of integrators with an arbitrary sampling period. We analytically show that our control scheme globally asymptotically stabilizes the considered system. The key feature is that the pre-specified sampling period can be enlarged as desired by adjusting a gain-scaling factor. An example with various simulation results is given for clear illustration.
View full abstract
-
Akira KITAYAMA, Goichi ONO, Hiroaki ITO
Article type: PAPER
Article ID: 2023EAP1131
Published: 2023
Advance online publication: December 20, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Edge devices with strict safety and reliability requirements, such as autonomous driving cars, industrial robots, and drones, necessitate software verification on such devices before operation. The human cost and time required for this analysis constitute a barrier in the cycle of software development and updating. In particular, the final verification at the edge device should at least strictly confirm that the updated software is not degraded from the current it. Since the edge device does not have the correct data, it is necessary for a human to judge whether the difference between the updated software and the operating it is due to degradation or improvement. Therefore, this verification is very costly. This paper proposes a novel automated method for efficient verification on edge devices of an object detection AI, which has found practical use in various applications. In the proposed method, a target object existence detector (TOED) (a simple binary classifier) judges whether an object in the recognition target class exists in the region of a prediction difference between the AI’s operating and updated versions. Using the results of this TOED judgement and the predicted difference, an automated verification system for the updated AI was constructed. TOED was designed as a simple binary classifier with four convolutional layers, and the accuracy of object existence judgment was evaluated for the difference between the predictions of the YOLOv5 L and X models using the Cityscapes dataset. The results showed judgement with more than 99.5% accuracy and 8.6% over detection, thus indicating that a verification system adopting this method would be more efficient than simple analysis of the prediction differences.
View full abstract
-
Koji NUIDA, Tomoko ADACHI
Article type: LETTER
Article ID: 2023DML0002
Published: 2023
Advance online publication: December 19, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Latin squares are a classical and well-studied topic of discrete mathematics, and recently Takeuti and Adachi (IACR ePrint, 2023) proposed (2, n)-threshold secret sharing based on mutually orthogonal Latin squares (MOLS). Hence efficient constructions of as large sets of MOLS as possible are also important from practical viewpoints. In this letter, we determine the maximum number of MOLS among a known class of Latin squares defined by weighted sums. We also mention some known property of Latin squares interpreted via the relation to secret sharing and a connection of Takeuti-Adachi's scheme to Shamir's secret sharing scheme.
View full abstract
-
Yingcai WAN, Lijin FANG
Article type: PAPER
Article ID: 2023EAP1095
Published: 2023
Advance online publication: December 15, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
2D and 3D semantic segmentation play important roles in robotic scene understanding. However, current 3D semantic segmentation heavily relies on 3D point clouds, which are susceptible to factors such as point cloud noise, sparsity, estimation and reconstruction errors, and data imbalance. In this paper, a novel approach is proposed to enhance 3D semantic segmentation by incorporating 2D semantic segmentation from RGB-D sequences. Firstly, the RGB-D pairs are consistently segmented into 2D semantic maps using the tracking pipeline of Simultaneous Localization and Mapping (SLAM). This process effectively propagates object labels from full scans to corresponding labels in partial views with high probability. Subsequently, a novel Semantic Projection (SP) block is introduced, which integrates features extracted from localized 2D fragments across different camera viewpoints into their corresponding 3D semantic features. Lastly, the 3D semantic segmentation network utilizes a combination of 2D-3D fusion features to facilitate a merged semantic segmentation process for both 2D and 3D. Extensive experiments conducted on public datasets demonstrate the effective performance of the proposed 2D-assisted 3D semantic segmentation method.
View full abstract
-
Yuta MINAMIKAWA, Kazumasa SHINAGAWA
Article type: PAPER
Article ID: 2023EAP1082
Published: 2023
Advance online publication: December 13, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Secure computation is a kind of cryptographic techniques that enables to compute a function while keeping input data secret. Komano and Mizuki (International Journal of Information Security 2022) proposed a model of coin-based protocols, which are secure computation protocols using physical coins. They designed AND,XOR, and COPY protocols using so-called hand operations, which move coins from one player's palm to the other palm. However, hand operations cannot be executed when all players' hands are occupied. In this paper, we propose coin-based protocols without hand operations. In particular, we design a three-coin NOT protocol, a seven-coin AND protocol, a six-coin XOR protocol, and a five-coin COPY protocol without hand operations. Our protocols use random flips only as shuffle operations and are enough to compute any function since they have the same format of input and output, i.e., committed-format protocols.
View full abstract
-
Sota MORIYAMA, Koichi ICHIGE, Yuichi HORI, Masayuki TACHI
Article type: LETTER
Article ID: 2023EAL2078
Published: 2023
Advance online publication: December 11, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this paper, we propose a method for video reflection removal using a video restoration framework with enhanced deformable networks (EDVR). We examine the effect of each module in EDVR on video reflection removal and modify the models using 3D convolutions. The performance of each modified model is evaluated in terms of the RMSE between the structural similarity (SSIM) and the smoothed SSIM representing temporal consistency.
View full abstract
-
Sendren Sheng-Dong XU, Albertus Andrie CHRISTIAN, Chien-Peng HO, Shun- ...
Article type: PAPER
Article ID: 2023EAP1038
Published: 2023
Advance online publication: December 11, 2023
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
During the COVID-19 pandemic, a robust system for masked face recognition has been required. Most existing solutions used many samples per identity for the model to recognize, but the processes involved are very laborious in a real-life scenario. Therefore, we propose “CPNet” as a suitable and reliable way of recognizing masked faces from only a few samples per identity. The prototype classifier uses a few-shot learning paradigm to perform the recognition process. To handle complex and occluded facial features, we incorporated the covariance structure of the classes to refine the class distance calculation. We also used sharpness-aware minimization (SAM) to improve the classifier. Extensive in-depth experiments on a variety of datasets show that our method achieves remarkable results with accuracy as high as 95.3%, which is 3.4% higher than that of the baseline prototype network used for comparison.
View full abstract