Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved AdaBoost algorithm based on base classifier coefficients and diversity
ZHU Liang, XU Hua, CUI Xin
Journal of Computer Applications    2021, 41 (8): 2225-2231.   DOI: 10.11772/j.issn.1001-9081.2020101584
Abstract413)      PDF (1058KB)(466)       Save
Aiming at the low efficiency of linear combination of base classifiers and over-adaptation of the traditional AdaBoost algorithm, an improved algorithm based on coefficients and diversity of base classifiers - WD AdaBoost (AdaBoost based on Weight and Double-fault measure) was proposed. Firstly, according to the error rates of the base classifiers and the distribution status of the sample weights, a new method to solve the base classifier coefficients was given to improve the combination efficiency of the base classifiers. Secondly, the double-fault measure was introduced into WD AdaBoost algorithm in the selection strategy of base classifiers for increasing the diversity among base classifiers. On five datasets of different actual application fields, compared with the traditional AdaBoost algorithm, CeffAda algorithm uses the new base classifier coefficient solution method to make the test error reduced by 1.2 percentage points on average; meanwhile, WD AdaBoost algorithm has the lower error rate compared with WLDF_Ada, AD_Ada (Adaptive to Detection AdaBoost), sk_AdaBoost and other algorithms. Experimental results show that WD AdaBoost algorithm can integrate base classifiers more efficiently, resist overfitting, and improve the classification performance.
Reference | Related Articles | Metrics
Integral attack on PICO algorithm based on division property
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang
Journal of Computer Applications    2020, 40 (10): 2967-2972.   DOI: 10.11772/j.issn.1001-9081.2019122228
Abstract446)      PDF (810KB)(543)       Save
PICO proposed in recent years is a bit-based ultra lightweight block cipher algorithm. The security of this algorithm to resist integral cryptanalysis was evaluated. Firstly, by analyzing the structure of PICO cipher algorithm, a Mixed-Integer Linear Programming (MILP) model of the algorithm was established based on division property. Then, according to the set constraints, the linear inequalities were generated to describe the propagation rules of division property, and the MILP problem was solved with the help of the mathematical software, the success of constructing the integral distinguisher was judged based on the objective function value. Finally, the automatic search of integral distinguisher of PICO algorithm was realized. Experimental results showed that, the 10-round integral distinguisher of PICO algorithm was searched, which is the longest one so far. However, the small number of plaintexts available is not conducive to key recovery. In order to obtain better attack performance, the searched 9-round distinguisher was used to perform 11-round key recovery attack on PICO algorithm. It is shown that the proposed attack can recover 128-bit round key, the data complexity of the attack is 2 63.46, the time complexity is 2 76 11-round encryptions, and the storage complexity is 2 20.
Reference | Related Articles | Metrics
Topological evolution on synchronization of dynamic complex networks
ZHU Liang HAN Ding-ding
Journal of Computer Applications    2012, 32 (02): 330-339.   DOI: 10.3724/SP.J.1087.2012.00330
Abstract1115)      PDF (1004KB)(629)       Save
After qualitative discussion of the synchronization performance in complex network models, simulation analysis of the networks with relatively larger size was presented. Through data analysis, network topology visualization, and topology evolution with simulated annealing algorithm, some rules of synchronization optimization were found, that is, making the degree distribution and average distance uniform and centralized, and proper clustering coefficient can reduce network connection without influencing synchronization. Considering the situation of future power grid, optimization strategies for the stability of synchronization were developed and tested on the data of the actual power grid, exploring the application value of optimizing practical networks from the angle of topology and satisfying the requirement of real-time quality, stability and distribution. The optimization is proved to be effective.
Reference | Related Articles | Metrics