Please wait a minute...

����Ŀ¼

    15 December 2017, Volume 3 Issue 12
    Papers
    Credit risk identification of high-risk online lending enterprises based on neural network model
    Mao-guang WANG,Zi-jun ZHU
    2017, 3(12):  15-21.  doi:10.11959/j.issn.2096-109x.2017.00222
    Asbtract ( 1187 )   HTML ( 10)   PDF (493KB) ( 2632 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid development of online lending alleviates the difficulty of financing for small and micro enterprises to a certain extent,but it also exposes the credit risk identification problem of online lending platform.In order to fully identify the characteristics of high-risk network lending enterprises,small and medium-sized network lending companies were selected as samples,and indicators that were highly correlated with risk identification were chosen as indicators variables.And by using the BP neural network algorithm model,the credit risk identification rate and credit risk classification accuracy rate of high risk network lending enterprises,under different conditions,were obtained.The results show that the credit risks of high-risk network lending enterprises are highly recognized,and have the characteristics of high recall rate and high accuracy.

    Protocol to enhance the security of Early data in TLS 1.3
    Xing-long ZHANG,Qing-feng CHENG,Jian-feng MA
    2017, 3(12):  22-30.  doi:10.11959/j.issn.2096-109x.2017.00224
    Asbtract ( 1402 )   HTML ( 8)   PDF (539KB) ( 4299 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The new 0-RTT Internet key exchange was drawn on the TLS 1.3 session resumption phase,the rFSOPKE protocol was constructed,and the Early data encryption and transmission process were improved.The rFSOPKE protocol can protect the forward security of Early data and protect it from replay attacks during the validity period of the Ticket.Compared with the previous Early data transmission process,rFSOPKE greatly enhanced the security of Early data.Due to the increase in the calculation and transmission overhead of this protocol when sending Early data,the efficiency of the protocol is reduced.However,rFSOPKE can embed the appropriate algorithm according to the different application environment,so more efficient algorithms should be chosen to improve the protocol implementation speed.

    Board voting system based on the consortium blockchains
    You-kang DONG,Da-wei ZHANG,Zhen HAN,Liang CHANG
    2017, 3(12):  31-37.  doi:10.11959/j.issn.2096-109x.2017.00221
    Asbtract ( 2002 )   HTML ( 38)   PDF (532KB) ( 4131 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The board voting is a scenario of anonymous voting on a particular group of individuals,which is strict with the identities of the participants.A board e-voting protocol based on the consortium blockchains was presented,which replaced the traditional trusted third party with the smart contract so as to reduce the system trust cost.It adopt a digital certificate-based identity mechanism to ensure that the voter's identity is legal.It adopt the blind signature based on elliptic curve technology to achieve the anonymity of voting.The security analysis shows that the proposed protocol can meet the requirements of unforgeability,anonymity and security etc,which is convenient and flexible to use.

    JPEG recapture image tamper detection method based on block effect grid offset
    Wei HUANG,Tian-qiang HUANG,Xue-li ZHANG,Hui XIAO
    2017, 3(12):  38-44.  doi:10.11959/j.issn.2096-109x.2017.00220
    Asbtract ( 1140 )   HTML ( 9)   PDF (582KB) ( 2895 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recaptured images are captured original or distorted image shown on the intermediaries,a high-quality recapture image is difficult to distinguish the authenticity of the human eye.Aimed at the tampering operation of JPEG image,a method of detecting block effect grid offset due to re-compression was proposed.The original image was compressed multiple times did not produce the block effect of the grid offset,and the recapture image,because of the recapture process would introduce background information that was not related to the original image,the re-compression of the block effect grid with the original grid is mismatched,and the average information loss amount of the image was used to detect whether the block effect grid generates an offset or not to detect the recapture image.Experiments show that this method is more accurate than the existing recapture image detection method,and the average detection time is shorter.

    Population surveillance and trend alert analysis of mass gatherings
    Si-wen CHEN,Yang-dong BIAN,Feng HU,Chao WANG
    2017, 3(12):  45-53.  doi:10.11959/j.issn.2096-109x.2017.00207
    Asbtract ( 1400 )   HTML ( 8)   PDF (518KB) ( 3946 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking the bund stampede in December 31th,2014 as an example,the urgent problems of the population surveillance and trend alert analysis in mass gatherings were proposed:population statistics and the flow density in the scenic,flow and velocity analysis,the judgments of stop-and-go or head-on walking phenomenon inside the local area.In order to provide support for population situation judgment and early warning,emergency response and evacuation in future mass gatherings,the intrinsic defects of the current three principal techniques analysis and the corresponding suggestions were put forward.

    Adaptive digital watermarking algorithm under image quad-tree partition
    Wen-xing LIU,Wei CHEN,Yuan LIU
    2017, 3(12):  54-61.  doi:10.11959/j.issn.2096-109x.2017.00219
    Asbtract ( 1348 )   HTML ( 2)   PDF (761KB) ( 2000 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An adaptive digital watermarking algorithm based on image quad-tree partition was proposed.The original image was approximated by various least square polynomial patches at multiple scales and was organized by a quad-tree structure.At the same time,this representation also reflected the texture information of image.By calculating the watermark embedding intensity in different regions,an adaptive digital watermarking scheme based on the number of the refined meshes in each region was realized.The experiment results show that this algorithm has the good imperceptibility and robustness.

    Flow consistency in an intensive SDN security architecture with multiple controllers
    Ying-ying LV,Yun-fei GUO,Chao QI,Qi WU,Ya-wen WANG
    2017, 3(12):  62-78.  doi:10.11959/j.issn.2096-109x.2017.00223
    Asbtract ( 1163 )   HTML ( 3)   PDF (1186KB) ( 1444 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: