Please wait a minute...

Current Issue

    20 November 2020, Volume 36 Issue 11
    Comprehensive Review
    Dependable identity recognition and authorization based on visual information
    Chunlei PENG,Xinbo GAO,Nannan WANG,Jie LI
    2020, 36(11):  1-17.  doi:10.11959/j.issn.1000-0801.2020293
    Asbtract ( 475 )   HTML ( 50)   PDF (1567KB) ( 634 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.

    A survey on key technologies of privacy protection for machine learning
    Zishan LIU,Qiang CHENG,Bo LV
    2020, 36(11):  18-27.  doi:10.11959/j.issn.1000-0801.2020283
    Asbtract ( 449 )   HTML ( 49)   PDF (766KB) ( 803 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of information and communication technology,large-scale data collection has vastly promoted the application of machine learning in various fields.However,the data involved in machine learning often contains a lot of personal private information,which makes privacy protection face new risks and challenges,and has attracted more and more attention.The current progress of the related laws,regulations and standards to the personal privacy protection and data safety in machine learning were summarized.The existing work on privacy protection for machine learning was presented in detail.Privacy protection algorithms usually have influence on the data quality,model performance and communication cost.Thus,the performance of the privacy protection algorithms should be comprehensively evaluated in multiple dimensions.The performance evaluation metrics for the privacy protection algorithms for machine learning were presented,given with the conclusion that the privacy preservation on machine learning needs to balance the data quality,model convergence rate and communication cost.

    Research and Development
    Evaluation criteria and solution of mobile communication network
    Yusun FU
    2020, 36(11):  28-38.  doi:10.11959/j.issn.1000-0801.2020275
    Asbtract ( 325 )   HTML ( 34)   PDF (918KB) ( 322 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the huge difference of business and various personalized experience requirements in the future,KPI (key performance indicator),KQI (key quality indicator),QoS,QoE and KBI (key business indicator) was discussed,as well as the possible optimal design methods,potential challenges and technical research directions based on KPI,KQI and KBI,which was a progressive and unified whole.Finally,it was pointed out that the current fairness index was a kind of “experience” guidance,and there was no specific feedback closed-loop mechanism to form a clear guidance for the design criteria.The traction from the perspective of KBI may be an optional final and normalized evaluation criterion.It was pointed out that to do these works well in depth and breadth,it needed interdisciplinary in-depth research,close collaboration and cross layer design between different nodes of the network.

    Semi-dynamic pilot allocation based on graph coloring in massive MIMO systems
    Fangmin XU,Hui QIAN,Haiyan CAO
    2020, 36(11):  39-46.  doi:10.11959/j.issn.1000-0801.2020184
    Asbtract ( 156 )   HTML ( 14)   PDF (850KB) ( 98 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To alleviate the performance loss caused by pilot contamination in massive multiple-input multiple-output (MIMO) systems,a semi-dynamic pilot allocation scheme based on graph coloring was proposed.Firstly,a pilot reuse threshold was derived for users.Then,based on the pilot reuse threshold,users of each cell are divided into cell-center users and cell-edge users,where cell-center users were allowed to reuse the same pilot.Finally,based on the graph coloring theory,the pilot resources were allocated to cell-edge users with serious pilot interference by multi-cell coordination.The simulation results show that the proposed pilot allocation scheme reduces the pilot interference and improves the uplink achievable rate of the whole system effectively.

    Biterm topic model of social network users’ sentiment by integrating word co-occurrence
    Qiuyang GU,Bao WU,Chunhua JU
    2020, 36(11):  47-60.  doi:10.11959/j.issn.1000-0801.2020302
    Asbtract ( 273 )   HTML ( 14)   PDF (803KB) ( 176 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increasing number of social network users in recent years,text-based user sentiment analysis technology has been widely concerned and applied.However,data sparsity and low accuracy often reduce the accuracy and speed of emotion recognition methods.The user emotion Biterm topic model (US-BTM) was proposed which could find user preference and emotional tendency from the text of specific places,so as to effectively use Biterm for topic modeling.The strategy of user aggregation to form pseudo-documents was used,and word pairs were created for the whole corpus to solve the problems of data sparsity and short text.Then the topic was studied through the lexical co-occurrence model,so as to infer the topic with abundant corps-level information,and the purpose of accurately predicting the user’s interest,preference and emotion to the specific scene was achieved by analyzing the lexical matching set in the comment corpus under the specific scene and the emotion of the corresponding topic.The experimental results show that the method proposed can accurately capture users’ emotional tendency and correctly reveal users’ preference,which can be widely used in social network content description,recommendation,social network user interest description,semantic analysis and other fields.

    Optical fiber eavesdropping detection method based on machine learning
    Xiaolian CHEN,Yi QIN,Jie ZHANG,Yajie LI,Haokun SONG,Huibin ZHANG
    2020, 36(11):  61-67.  doi:10.11959/j.issn.1000-0801.2020299
    Asbtract ( 270 )   HTML ( 26)   PDF (1555KB) ( 324 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.

    PSWF signal based continuous phase modulation and its spectrum performance analysis
    Dawei YANG,Chuanhui LIU,Jiafang KANG
    2020, 36(11):  68-78.  doi:10.11959/j.issn.1000-0801.2020277
    Asbtract ( 254 )   HTML ( 9)   PDF (1281KB) ( 159 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Prolate spheroidal wave function (PSWF) signals are the best energy-gathering signals in the time-frequency domain,here is an exploratory application of PSWF signals to continuous phase modulation technology.Firstly,the process of generating CPM modulated signals based on PSWF signals was described.Secondly,a calculation method for the power spectral density of CPM modulated signals based on PSWF using the autocorrelation function method was given.Finally,combined with numerical calculation and analysis,the power spectral density and signal occupied bandwidth characteristics of minimum frequency shift keying,sinusoidal frequency shift keying,Gaussian filtered minimum shift keying and CPM modulation signal based on Gaussian function were compared.Numerical calculation results show that the PSWF signal can obtain CPM modulation signal with better spectral performance and energy concentration,compared with rectangular pulse,raised cosine pulse,Gaussian pulse and Gauss-like pulse as the baseband frequency modulation signal of CPM.

    Feedback bit allocation in distributed antenna array systems
    Shuai ZHANG,Peng PAN,Cui WANG
    2020, 36(11):  79-88.  doi:10.11959/j.issn.1000-0801.2020300
    Asbtract ( 125 )   HTML ( 10)   PDF (826KB) ( 134 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In a frequency division duplex communication system,precoding at the base station usually requires terminal feedback channel state information.In a distributed array system,the channel conditions between the terminal and different access nodes in the cell are different because multiple access nodes are arranged at different locations in the cell.When the resources for feedback channel state information are limited,the allocation method of feedback bit needs to be optimized to improve the overall performance of the system.In a multi-user distributed array system,an access node selection method based on distance threshold was adopted.Based on this method,the quantization characteristics of the random vector quantization codebook and the Taylor expansion method were used to derive the system quantization capacity loss,and then an approximate expression was given.Based on this expression,a feedback bit allocation method was proposed.Compared with other allocation methods,the method of this paper was more universal because it did not limit the number of access nodes selected by the user.The simulation results show that the strategy proposed is superior to the traditional equal-bit allocation scheme and can obtain better performance when the feedback resources are limited.

    Design of multi-key encryption method
    Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN
    2020, 36(11):  89-97.  doi:10.11959/j.issn.1000-0801.2020304
    Asbtract ( 142 )   HTML ( 12)   PDF (774KB) ( 99 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.

    Topic:Information Security
    Application of public key infrastructure in telecom operators
    Congli WANG,Jinhua WANG,Weijia XUE
    2020, 36(11):  98-103.  doi:10.11959/j.issn.1000-0801.2020292
    Asbtract ( 220 )   HTML ( 19)   PDF (725KB) ( 242 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.

    Machine vision technology,standardization,and application in safety industry
    Yuan ZHANG,Huifen WANG,Hanming WANG
    2020, 36(11):  104-112.  doi:10.11959/j.issn.1000-0801.2020296
    Asbtract ( 283 )   HTML ( 22)   PDF (1123KB) ( 359 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technology and standardization of machine vision were focused on,and the attributes and relations of machine vision,computer vision,and human vision were analyzed.The machine vision related technologies and typical applications such as network information,security intelligent surveillance and intelligent transportation were introduced,as well as the latest development of international and domestic mainstream SDOs of machine vision technology,system and service.The development of the core machine vision technology,video coding for machine vision standards in VCM and DCM,and machine vision systems and application SDOs were elaborated.On this basis,the future development trend of machine vision technology and standardization was analyzed.

    RASP based Web security detection method
    Hang YU,Shuai WANG,Huamin JIN
    2020, 36(11):  113-120.  doi:10.11959/j.issn.1000-0801.2020294
    Asbtract ( 481 )   HTML ( 53)   PDF (1352KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.

    Internet bad information detection based on Bert model
    Xin CAI
    2020, 36(11):  121-126.  doi:10.11959/j.issn.1000-0801.2020303
    Asbtract ( 493 )   HTML ( 66)   PDF (705KB) ( 693 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the business scenario of bad information detection on the internet,the method of detection based on the text content of the website was discussed .Classical text analysis techniques were reviewed.The key technical features and two different usages of Bert model were introduced.The specific implementation scheme of using the feature extraction method to detect website bad information was described in detail,and was compared with the traditional TF-IDF model and word2vec+LSTM model.The validity of this method is verified.

    Application of security threat intelligence based on big data analysis in telecom operators
    Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG
    2020, 36(11):  127-133.  doi:10.11959/j.issn.1000-0801.2020301
    Asbtract ( 310 )   HTML ( 34)   PDF (1074KB) ( 417 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.

    Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
    Xiaoyin XI,Xiaoyun YUAN
    2020, 36(11):  134-140.  doi:10.11959/j.issn.1000-0801.2020295
    Asbtract ( 169 )   HTML ( 23)   PDF (729KB) ( 438 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to better promote the construction of China Telecom’s network and information security governance system,optimize the network and information security product service system,and promote the cultivation and development of network and information security core competence,domestic and foreign industry benchmark enterprises were selected to carry out practical case analysis.The advanced successful experience of benchmarking enterprises in the field of network and information security were summarized,and the current development status and future development trend in the field of network and information security were further combined,and targeted development suggestions and measures were put forward to improve the governance system of China’s telecommunications network and information security,improve the governance ability,as well as related business,and the development of products and services provides useful help.

    Operation Technology
    5G large-scale array antenna technology development and innovation direction
    Shengjun LUO,Shenke ZHANG
    2020, 36(11):  141-148.  doi:10.11959/j.issn.1000-0801.2020186
    Asbtract ( 227 )   HTML ( 24)   PDF (1089KB) ( 139 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the current system architecture and technical solutions of 5G large-scale antennas,new technological developments and innovation directions were proposed,including low profile and light weight radiation element,high precision amplitude and phase calibration networks,all-in-one dense radiation arrays,and highly integrated antenna without reflection,antenna integrated filter,antenna and filter common module,mechanical phase shift and digital shaping combined,5G dual-band antenna,4G & 5G intelligent antenna,etc.For each technological innovation direction,an overview and useful description were given.

    Research on B2B business model of operators in 5G era
    Xiaoxia WANG,Hui ZHAO,Yufei CUI,Kun LI,Xiao WANG
    2020, 36(11):  149-155.  doi:10.11959/j.issn.1000-0801.2020297
    Asbtract ( 318 )   HTML ( 29)   PDF (927KB) ( 264 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    B2B business model in 5G era will become the main competition area for operators.Opportunities come along with challenges from investment,market and technology such as huge construction expenditure,fragmented market and difficulties of industry integration.Research on B2B operation cases of domestic and foreign operators and internet giants in the post 4G and 5G era had been done,from which “communication +” service model,industry coordinator model and platform model were investigated especially.Finally,three B2B operations models of domestic operators were proposed.

    Open source development in the cloud services era
    Fuzhou SUN,Jin QIAN,Jing YANG,Ling QIAN
    2020, 36(11):  156-164.  doi:10.11959/j.issn.1000-0801.2020298
    Asbtract ( 158 )   HTML ( 11)   PDF (747KB) ( 361 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics
    Design of backhaul routes in VRRP networks of MPLS VPN
    Haolun WANG
    2020, 36(11):  165-173.  doi:10.11959/j.issn.1000-0801.2020264
    Asbtract ( 272 )   HTML ( 17)   PDF (1047KB) ( 161 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the process of flattening metropolitan area network,in order to improve the reliability of MPLS L3VPN services,OLT devices can be planned as VRRP branch nodes.This design could probably induce traps of backhaul routes.Two separate methods of switching backhaul routes were proposed.One is a strict method based on checking the reachability of OLT devices,the other is a simplified method based on the priority of routes.The experimental results show that,handover latency is between 2~ 8 s.These proposed methods of switching backhaul routes,can effectively prevent traps of backhaul routes,and improve the reliability of services.

    Quality analysis method of Web browsing based on big data
    Weihua CHENG,Xiaorong HE
    2020, 36(11):  174-181.  doi:10.11959/j.issn.1000-0801.2020126
    Asbtract ( 184 )   HTML ( 24)   PDF (3725KB) ( 194 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: