Skip to Content

42 Results Found

  • Article
  • Open Access
6 Citations
6,035 Views
18 Pages

Dynamic Markov Model: Password Guessing Using Probability Adjustment Method

  • Xiaozhou Guo,
  • Yi Liu,
  • Kaijun Tan,
  • Wenyu Mao,
  • Min Jin and
  • Huaxiang Lu

18 May 2021

In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low...

  • Article
  • Open Access
2 Citations
3,928 Views
13 Pages

29 August 2022

The frequent incidents of password leakage have increased people’s attention and research on password security. Password guessing is an essential part of password cracking and password security research. The progression of deep learning technol...

  • Article
  • Open Access
6 Citations
3,218 Views
31 Pages

25 June 2023

Using majorization theory via “Robin Hood” elementary operations, optimal lower and upper bounds are derived on Rényi and guessing entropies with respect to either error probability (yielding reverse-Fano and Fano inequalities) or total variation dis...

  • Article
  • Open Access
4 Citations
3,959 Views
15 Pages

9 July 2019

This study considers the minimum error discrimination of two quantum states in terms of a two-party zero-sum game, whose optimal strategy is a minimax strategy. A minimax strategy is one in which a sender chooses a strategy for a receiver so that the...

  • Proceeding Paper
  • Open Access
1 Citations
1,875 Views
9 Pages

In many areas of computer science, it is of primary importance to assess the randomness of a certain variable X. Many different criteria can be used to evaluate randomness, possibly after observing some disclosed data. A “sufficiently random&rd...

  • Article
  • Open Access
1 Citations
2,526 Views
15 Pages

A New Scheme for Capturing Global Conditional Nonlinear Optimal Perturbation

  • Siyuan Liu,
  • Qi Shao,
  • Wei Li,
  • Guijun Han,
  • Kangzhuang Liang,
  • Yantian Gong,
  • Ru Wang,
  • Hanyu Liu and
  • Song Hu

Conditional nonlinear optimal perturbation (CNOP) represents the initial perturbation that satisfies a certain physical constraint condition, and leads to a maximum prediction error at the moment of prediction. The CNOP method is a useful tool in stu...

  • Article
  • Open Access
18 Citations
8,496 Views
18 Pages

Guess What …?—How Guessed Norms Nudge Climate-Friendly Food Choices in Real-Life Settings

  • Amelie Griesoph,
  • Stefan Hoffmann,
  • Christine Merk,
  • Katrin Rehdanz and
  • Ulrich Schmidt

3 August 2021

Social norms, also called social comparison nudges, have been shown to be particularly effective in promoting healthy food choices and environmentally friendly behaviors. However, there is limited evidence on the effectiveness of these nudges for pro...

  • Article
  • Open Access
937 Views
17 Pages

Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples

  • Cheng Liu,
  • Junrong Li,
  • Xiheng Liu,
  • Bo Li,
  • Mengsu Hou,
  • Wei Yu,
  • Yujun Li and
  • Wenjun Liu

15 July 2025

As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict bet...

  • Communication
  • Open Access
2 Citations
2,650 Views
6 Pages

26 June 2023

The use of large lecture halls in business and economic education often dictates the use of multiple-choice exams to measure student learning. This study asserts that student performance on these types of exams can be viewed as the result of the proc...

  • Article
  • Open Access
3 Citations
4,499 Views
20 Pages

1 April 2019

Slow-hash algorithms are proposed to defend against traditional offline password recovery by making the hash function very slow to compute. In this paper, we study the problem of slow-hash recovery on a large scale. We attack the problem by proposing...

  • Article
  • Open Access
6 Citations
5,480 Views
11 Pages

10 March 2015

Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes. Different t...

  • Article
  • Open Access
10 Citations
4,712 Views
18 Pages

21 November 2019

Investigation into privacy preserving data publishing with multiple sensitive attributes is performed to reduce probability of adversaries to guess the sensitive values. Masking the sensitive values is usually performed by anonymizing data by using g...

  • Article
  • Open Access
3 Citations
3,609 Views
14 Pages

3 December 2022

At present, static text passwords are still the most widely-used identity authentication method. Password-generation technology can generate large-scale password sets and then detect the defects in password-protection mechanisms, which is of great si...

  • Article
  • Open Access
29 Citations
6,305 Views
25 Pages

22 November 2018

This paper provides tight bounds on the Rényi entropy of a function of a discrete random variable with a finite number of possible values, where the considered function is not one to one. To that end, a tight lower bound on the Rényi en...

  • Article
  • Open Access
6 Citations
5,880 Views
32 Pages

Strength Analysis of Real-Life Passwords Using Markov Models

  • Viktor Taneski,
  • Marko Kompara,
  • Marjan Heričko and
  • Boštjan Brumen

11 October 2021

Recent literature proposes the use of a proactive password checker as method for preventing users from creating easy-to-guess passwords. Markov models can help us create a more effective password checker that would be able to check the probability of...

  • Article
  • Open Access
4 Citations
2,261 Views
14 Pages

A New Wavelet-Based Privatization Mechanism for Probability Distributions

  • Hélio M. de Oliveira,
  • Raydonal Ospina,
  • Víctor Leiva,
  • Carlos Martin-Barreiro and
  • Christophe Chesneau

14 May 2022

In this paper, we propose a new privatization mechanism based on a naive theory of a perturbation on a probability using wavelets, such as a noise perturbs the signal of a digital image sensor. Wavelets are employed to extract information from a wide...

  • Article
  • Open Access
36 Citations
5,198 Views
16 Pages

Assessing the Potential Earthquake Precursory Information in ULF Magnetic Data Recorded in Kanto, Japan during 2000–2010: Distance and Magnitude Dependences

  • Peng Han,
  • Jiancang Zhuang,
  • Katsumi Hattori,
  • Chieh-Hung Chen,
  • Febty Febriani,
  • Hongyan Chen,
  • Chie Yoshino and
  • Shuji Yoshida

1 August 2020

In order to clarify ultra-low-frequency (ULF) seismomagnetic phenomena, a sensitive geomagnetic network was installed in Kanto, Japan since 2000. In previous studies, we have verified the correlation between ULF magnetic anomalies and local sizeable...

  • Article
  • Open Access
4 Citations
1,949 Views
23 Pages

Improvement of the Cybersecurity of the Satellite Internet of Vehicles through the Application of an Authentication Protocol Based on a Modular Error-Correction Code

  • Igor Anatolyevich Kalmykov,
  • Aleksandr Anatolyevich Olenev,
  • Natalya Vladimirovna Kononova,
  • Tatyana Aleksandrovna Peleshenko,
  • Daniil Vyacheslavovich Dukhovnyj,
  • Nikita Konstantinovich Chistousov and
  • Natalya Igorevna Kalmykova

The integration of the Internet of Vehicles (IoV) and low-orbit satellite Internet not only increases the efficiency of traffic management but also contributes to the emergence of new cyberattacks. Spoofing interference occupies a special place among...

  • Article
  • Open Access
4 Citations
2,481 Views
18 Pages

6 February 2024

Previous studies have shown that contextual information may aid in guessing the intention underlying others’ actions in conditions of perceptual ambiguity. Here, we aimed to evaluate the temporal deployment of contextual influence on action pre...

  • Article
  • Open Access
4 Citations
3,254 Views
11 Pages

Certainty-Based Marking (CBM) involves asking students not only the answer to an objective question, but also how certain they are that their answer is correct. In a mixed method design employing an embedded approach with a quasi-experimental design,...

  • Article
  • Open Access
1 Citations
3,013 Views
22 Pages

To describe the meaning of functionality in a universe before life evolved, existing etiological and systemic accounts of function are evaluated. Since the theory of function is only applicable in context with living beings and artifacts used by livi...

  • Article
  • Open Access
16 Citations
6,573 Views
20 Pages

3 December 2016

The microwave humidity and temperature sounder (MWHTS) on the Fengyun (FY)-3C satellite measures the outgoing radiance from the Earth’s surface and atmospheric constituents. MWHTS, which makes measurements in the isolated oxygen absorption line near...

  • Article
  • Open Access
2,198 Views
17 Pages

22 July 2022

Employing the single item search algorithm of N dimensional database it is shown that: First, the entanglement developed between two any-size parts of database space varies periodically during the course of searching. The periodic entanglement of the...

  • Article
  • Open Access
3 Citations
2,747 Views
18 Pages

29 June 2021

This paper studies binary hypothesis testing with a single sensor that communicates with two decision centers over a memoryless broadcast channel. The main focus lies on the tradeoff between the two type-II error exponents achievable at the two decis...

  • Article
  • Open Access
14 Citations
10,566 Views
24 Pages

4 August 2010

Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used t...

  • Article
  • Open Access
2 Citations
2,664 Views
21 Pages

21 November 2021

The steady-state assumption commonly used in object-based tracking algorithms may be insufficient to determine the right track when a convective storm goes through a complicated evolution. Such an issue is exacerbated by the relatively coarse output...

  • Article
  • Open Access
1 Citations
3,469 Views
24 Pages

6 September 2022

Probability distributions for the center of gravity are fundamental tools for track fitting. The center of gravity is a widespread algorithm for position reconstruction in tracker detectors for particle physics. Its standard use is always accompanied...

  • Article
  • Open Access
1 Citations
1,172 Views
18 Pages

13 March 2025

Symmetric private information retrieval (SPIR) protocol is proposed for users to retrieve items from a database holder without revealing the retrieval address, and meanwhile the users cannot learn any additional entries of the database. Quantum key d...

  • Article
  • Open Access
25 Citations
5,817 Views
22 Pages

Human-Mimetic Estimation of Food Volume from a Single-View RGB Image Using an AI System

  • Zhengeng Yang,
  • Hongshan Yu,
  • Shunxin Cao,
  • Qi Xu,
  • Ding Yuan,
  • Hong Zhang,
  • Wenyan Jia,
  • Zhi-Hong Mao and
  • Mingui Sun

It is well known that many chronic diseases are associated with unhealthy diet. Although improving diet is critical, adopting a healthy diet is difficult despite its benefits being well understood. Technology is needed to allow an assessment of dieta...

  • Review
  • Open Access
1 Citations
3,379 Views
32 Pages

13 February 2022

Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characte...

  • Article
  • Open Access
11 Citations
7,938 Views
19 Pages

19 October 2020

Despite their well-known weaknesses, passwords are still the de-facto authentication method for most online systems. Due to its importance, password cracking has been vibrantly researched both for offensive and defensive purposes. Hashcat and John th...

  • Article
  • Open Access
22 Citations
7,900 Views
18 Pages

A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices

  • Adnan Ali,
  • Hamaad Rafique,
  • Talha Arshad,
  • Mohammed A. Alqarni,
  • Sajjad Hussain Chauhdary and
  • Ali Kashif Bashir

7 February 2019

The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device....

  • Article
  • Open Access
19 Citations
4,044 Views
14 Pages

29 November 2019

Recently, it has been shown that the reaction mechanism in self-healing diphenyl dichalcogenide-based polymers involves the formation of sulfenyl and selenyl radicals. These radicals are able to attack a neighbouring dichalcogenide bond via a three-m...

  • Article
  • Open Access
27 Citations
12,547 Views
17 Pages

21 August 2022

Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in hum...

  • Article
  • Open Access
6 Citations
4,499 Views
22 Pages

Effects of Exogenous and Endogenous Attention on Metacontrast Masking

  • Sevda Agaoglu,
  • Bruno Breitmeyer and
  • Haluk Ogmen

10 October 2018

To efficiently use its finite resources, the visual system selects for further processing only a subset of the rich sensory information. Visual masking and spatial attention control the information transfer from visual sensory-memory to visual short-...

  • Article
  • Open Access
26 Citations
5,686 Views
16 Pages

RST Analysis of Anomalous TIR Sequences in Relation with Earthquakes Occurred in Turkey in the Period 2004–2015

  • Carolina Filizzola,
  • Angelo Corrado,
  • Nicola Genzano,
  • Mariano Lisi,
  • Nicola Pergola,
  • Roberto Colonna and
  • Valerio Tramutoli

14 January 2022

The paper provides, for the first time, a long-term (>10 years) analysis of anomalous transients in Earth’s emitted radiation over Turkey and neighbouring regions. The RST (Robust Satellite Techniques) approach is used to identify Significan...

  • Article
  • Open Access
3 Citations
2,232 Views
19 Pages

24 May 2023

Polar lows (PLs) are mesoscale, up to 1000 km, rather short lifetime (less than 15–30 h) cyclonic atmospheric systems formed in polar latitudes and associated with cold outbreak events. Strong winds, higher than 15 m/s, can then generate high s...

  • Editorial
  • Open Access
70 Citations
14,973 Views
20 Pages

The grand goal of Machine Learning is to develop software which can learn from previous experience—similar to how we humans do. Ultimately, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) t...

  • Article
  • Open Access
1 Citations
2,944 Views
12 Pages

Background: Over the past twenty years, a multifaceted anti-doping system was established to detect, deter, and prevent doping among athletes. However, perception of the whereabouts system has been a controversial issue. This pilot study aimed to eva...

  • Article
  • Open Access
983 Views
15 Pages

6 October 2025

Indoor air pollution is a major cause of noncommunicable diseases, and increasing people’s knowledge about the related risks is a key action for prevention. Many studies describe questionnaires for evaluating knowledge on indoor air quality tha...