1,818 research outputs found

    Study of Fully Homomorphic Encryption over Integers

    Get PDF
    Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method of constructing first fully homomorphic encryption scheme by Gentry is complicate so that it has been considered difficult to understand. This paper explains the idea of constructing fully homomorphic encryption and presents a general framework from various scheme of fully homomorphic encryption. Specially, this general framework can show some possible ways to construct fully homomorphic encryption. We then analyze the procedure how to obtaining fully homomorphic encryption over the integers. The analysis of recrypt procedure show the growth of noise, and the bound of noise in recrypt procedure is given. Finally, we describe the steps of implementation.

    Piperazine-2,3,5,6-tetra­one

    Get PDF
    The mol­ecule of the title compound, C4H2N2O4, is located around an inversion center and the four O atoms are in the 2,3,5,6-positions of the piperazine ring. In the crystal, bifurcated N—H⋯O hydrogen bonds link the mol­ecules into a corrugated layer parallel to (101)

    Achieving Covert Communication With A Probabilistic Jamming Strategy

    Full text link
    In this work, we consider a covert communication scenario, where a transmitter Alice communicates to a receiver Bob with the aid of a probabilistic and uninformed jammer against an adversary warden's detection. The transmission status and power of the jammer are random and follow some priori probabilities. We first analyze the warden's detection performance as a function of the jammer's transmission probability, transmit power distribution, and Alice's transmit power. We then maximize the covert throughput from Alice to Bob subject to a covertness constraint, by designing the covert communication strategies from three different perspectives: Alice's perspective, the jammer's perspective, and the global perspective. Our analysis reveals that the minimum jamming power should not always be zero in the probabilistic jamming strategy, which is different from that in the continuous jamming strategy presented in the literature. In addition, we prove that the minimum jamming power should be the same as Alice's covert transmit power, depending on the covertness and average jamming power constraints. Furthermore, our results show that the probabilistic jamming can outperform the continuous jamming in terms of achieving a higher covert throughput under the same covertness and average jamming power constraints

    Emulating Reader Behaviors for Fake News Detection

    Full text link
    The wide dissemination of fake news has affected our lives in many aspects, making fake news detection important and attracting increasing attention. Existing approaches make substantial contributions in this field by modeling news from a single-modal or multi-modal perspective. However, these modal-based methods can result in sub-optimal outcomes as they ignore reader behaviors in news consumption and authenticity verification. For instance, they haven't taken into consideration the component-by-component reading process: from the headline, images, comments, to the body, which is essential for modeling news with more granularity. To this end, we propose an approach of Emulating the behaviors of readers (Ember) for fake news detection on social media, incorporating readers' reading and verificating process to model news from the component perspective thoroughly. Specifically, we first construct intra-component feature extractors to emulate the behaviors of semantic analyzing on each component. Then, we design a module that comprises inter-component feature extractors and a sequence-based aggregator. This module mimics the process of verifying the correlation between components and the overall reading and verification sequence. Thus, Ember can handle the news with various components by emulating corresponding sequences. We conduct extensive experiments on nine real-world datasets, and the results demonstrate the superiority of Ember.Comment: 12 page

    Exploration and practice of animal physiology teaching mode for top class

    Get PDF
    动物生理学是动物医学、动物科学专业的重要基础理论课程。针对本校拔尖班学生培养计划和学习特点,本课程在教学中注重情境化教学,把最新研究进展及时整合到相应教学模块中,适当提高过程性评价比例,探索出适合拔尖班学生的授课模式,改善教学效果。Animal physiology is an important basic theoretical course for the specialty of animal medicine and animal science. According to the training programs and learning characteristics of top class students in our college, this course focused on situational teaching, integrated the latest progress manner into teaching model timely, and properly increased the process evaluation proportion in order to explore suitable teaching mode for top-class students, and improve teaching effectiveness

    2-Eth­oxy-6-[(methyl­imino)­meth­yl]phenol

    Get PDF
    In the title compound, C10H13NO2, synthesized by the reaction of 2-hy­droxy-3-eth­oxy­benzaldehyde with methyl­amine, there is an an intra­molecular O—H⋯N hydrogen bond involving the hy­droxy substituent and the amino N atom. In the crystal, mol­ecules form inversion dimers connected by pairs of C—H⋯O hydrogen bonds

    Deep line art video colorization with a few references

    Get PDF
    Coloring line art images based on the colors of reference images is an important stage in animation production, which is time-consuming and tedious. In this paper, we propose a deep architecture to automatically color line art videos with the same color style as the given reference images. Our framework consists of a color transform network and a temporal refinement network based on 3U-net. The color transform network takes the target line art images as well as the line art and color images of the reference images as input, and generates corresponding target color images. To cope with the large differences between each target line art image and the reference color images, we propose a distance attention layer that utilizes non-local similarity matching to determine the region correspondences between the target image and the reference images and transforms the local color information from the references to the target. To ensure global color style consistency, we further incorporate Adaptive Instance Normalization (AdaIN) with the transformation parameters obtained from a multiple-layer AdaIN that describes the global color style of the references, extracted by an embedder network. The temporal refinement network learns spatiotemporal features through 3D convolutions to ensure the temporal color consistency of the results. Our model can achieve even better coloring results by fine-tuning the parameters with only a small number of samples when dealing with an animation of a new style. To evaluate our method, we build a line art coloring dataset
    corecore