141,820 research outputs found
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g.
accounts and passwords) leaked from 3rd party applications to try other
applications is popular and serious. We call this attack "database collision".
Traditionally, people have to keep dozens of accounts and passwords for
different applications to prevent this attack. In this paper, we propose a
novel encryption scheme for hiding users' register information and preventing
this attack. Specifically, we first hash the register information using
existing safe hash function. Then the hash string is hidden, instead a
coefficient vector is stored for verification. Coefficient vectors of the same
register information are generated randomly for different applications. Hence,
the original information is hardly cracked by dictionary based attack or
database collision in practice. Using our encryption scheme, each user only
needs to keep one password for dozens of applications
Stability Analysis of Integral Delay Systems with Multiple Delays
This note is concerned with stability analysis of integral delay systems with
multiple delays. To study this problem, the well-known Jensen inequality is
generalized to the case of multiple terms by introducing an individual slack
weighting matrix for each term, which can be optimized to reduce the
conservatism. With the help of the multiple Jensen inequalities and by
developing a novel linearizing technique, two novel Lyapunov functional based
approaches are established to obtain sufficient stability conditions expressed
by linear matrix inequalities (LMIs). It is shown that these new conditions are
always less conservative than the existing ones. Moreover, by the positive
operator theory, a single LMI based condition and a spectral radius based
condition are obtained based on an existing sufficient stability condition
expressed by coupled LMIs. A numerical example illustrates the effectiveness of
the proposed approaches.Comment: 14 page
Extroverts Tweet Differently from Introverts in Weibo
Being dominant factors driving the human actions, personalities can be
excellent indicators in predicting the offline and online behavior of different
individuals. However, because of the great expense and inevitable subjectivity
in questionnaires and surveys, it is challenging for conventional studies to
explore the connection between personality and behavior and gain insights in
the context of large amount individuals. Considering the more and more
important role of the online social media in daily communications, we argue
that the footprint of massive individuals, like tweets in Weibo, can be the
inspiring proxy to infer the personality and further understand its functions
in shaping the online human behavior. In this study, a map from self-reports of
personalities to online profiles of 293 active users in Weibo is established to
train a competent machine learning model, which then successfully identifies
over 7,000 users as extroverts or introverts. Systematical comparisons from
perspectives of tempo-spatial patterns, online activities, emotion expressions
and attitudes to virtual honor surprisingly disclose that the extrovert indeed
behaves differently from the introvert in Weibo. Our findings provide solid
evidence to justify the methodology of employing machine learning to
objectively study personalities of massive individuals and shed lights on
applications of probing personalities and corresponding behaviors solely
through online profiles.Comment: Datasets of this study can be freely downloaded through:
https://doi.org/10.6084/m9.figshare.4765150.v
- …