141,820 research outputs found

    One Password: An Encryption Scheme for Hiding Users' Register Information

    Full text link
    In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision". Traditionally, people have to keep dozens of accounts and passwords for different applications to prevent this attack. In this paper, we propose a novel encryption scheme for hiding users' register information and preventing this attack. Specifically, we first hash the register information using existing safe hash function. Then the hash string is hidden, instead a coefficient vector is stored for verification. Coefficient vectors of the same register information are generated randomly for different applications. Hence, the original information is hardly cracked by dictionary based attack or database collision in practice. Using our encryption scheme, each user only needs to keep one password for dozens of applications

    Stability Analysis of Integral Delay Systems with Multiple Delays

    Full text link
    This note is concerned with stability analysis of integral delay systems with multiple delays. To study this problem, the well-known Jensen inequality is generalized to the case of multiple terms by introducing an individual slack weighting matrix for each term, which can be optimized to reduce the conservatism. With the help of the multiple Jensen inequalities and by developing a novel linearizing technique, two novel Lyapunov functional based approaches are established to obtain sufficient stability conditions expressed by linear matrix inequalities (LMIs). It is shown that these new conditions are always less conservative than the existing ones. Moreover, by the positive operator theory, a single LMI based condition and a spectral radius based condition are obtained based on an existing sufficient stability condition expressed by coupled LMIs. A numerical example illustrates the effectiveness of the proposed approaches.Comment: 14 page

    Extroverts Tweet Differently from Introverts in Weibo

    Full text link
    Being dominant factors driving the human actions, personalities can be excellent indicators in predicting the offline and online behavior of different individuals. However, because of the great expense and inevitable subjectivity in questionnaires and surveys, it is challenging for conventional studies to explore the connection between personality and behavior and gain insights in the context of large amount individuals. Considering the more and more important role of the online social media in daily communications, we argue that the footprint of massive individuals, like tweets in Weibo, can be the inspiring proxy to infer the personality and further understand its functions in shaping the online human behavior. In this study, a map from self-reports of personalities to online profiles of 293 active users in Weibo is established to train a competent machine learning model, which then successfully identifies over 7,000 users as extroverts or introverts. Systematical comparisons from perspectives of tempo-spatial patterns, online activities, emotion expressions and attitudes to virtual honor surprisingly disclose that the extrovert indeed behaves differently from the introvert in Weibo. Our findings provide solid evidence to justify the methodology of employing machine learning to objectively study personalities of massive individuals and shed lights on applications of probing personalities and corresponding behaviors solely through online profiles.Comment: Datasets of this study can be freely downloaded through: https://doi.org/10.6084/m9.figshare.4765150.v
    • …
    corecore