Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

72results about How to "Improve attack efficiency" patented technology

Adversarial sample attack defense method and device based on speech enhancement algorithm

The embodiment of the invention provides an adversarial sample attack defense method and device based on a voice enhancement algorithm. The method comprises the steps of obtaining a to-be-identified voice sample and spectrum features of the to-be-identified voice sample; according to the spectrum characteristics of the to-be-identified voice sample, calculating a noise spectrum of the to-be-identified voice sample through a preset algorithm, and denoising the to-be-identified voice sample by using the estimated noise spectrum obtained through calculation to obtain a denoised voice sample, wherein the algorithm comprises a spectral subtraction method based on continuous minimum tracking and a logarithm minimum mean square error algorithm MMSE algorithm combined with speech existence probability; and recognizing the denoised voice sample through a pre-trained voice recognition model to obtain a recognition result. Therefore, after the to-be-identified voice sample is obtained and de-noising processing is carried out on the to-be-identified voice sample, the de-noised voice sample is identified, so that the voice identification accuracy is improved and the efficiency of defending against the attack of the countermeasure sample is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Centralized control unmanned aerial vehicle resisting system based on sound wave attacking

InactiveCN107167037AFull preparation timeEnough buffer timeDefence devicesResonanceDisplay device
The invention discloses a centralized control unmanned aerial vehicle resisting system based on sound wave attacking. The centralized control unmanned aerial vehicle resisting system comprises a master control and display device, an early warning equipment group, a positioning track equipment group and a sound wave attacking equipment group; early warning equipment transmits detected early warning zone target position information to the master control and display device in real time, movement locus display is carried out through the master control and display device, when a target enters a track zone, positioning track equipment and sound wave attacking equipment are selected for the target, early warning detection on the target is stopped, meanwhile, the position information of the target is obtained through the positioning track equipment, and real-time aiming of the sound wave attacking equipment on the target is achieved; and when it is detected that the target enters an attacking zone, the sound wave attacking equipment is controlled to issue sound wave attacking, crashing caused by resonance of the target is avoided, whether the target is crashed or not is detected through a detector of the positioning track equipment, and the sound wave attacking equipment is controlled to stop attacking if the target is crashed. According to the embodiment, intelligent judgment and physical crashing can be carried out on multiple unmanned aerial vehicle targets at the same time.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary

The invention discloses a side channel energy analytical attack method by the aid of multiplication output during implementation of power residue computing algorithms M-ary in RSA (Rivest, Shamir and Adleman) cipher algorithms. A core of the side channel energy analytical attack method includes that multiplication output is used as an attack object to implement CPA (correlation power attack) when power residue computing is implemented by the aid of the algorithms M-ary. The method includes steps of (1), acquiring signals and building sampling matrixes; (2), selecting the multiplication output to be used as the attack object; (3), determining correlation models; (4), guessing circulation index values and acquiring intermediate value matrixes by means of computing; (5), acquiring simulation energy consumption matrixes by means of computing; (6), acquiring linear correlation coefficients among the matrixes determined in the steps (1) and (5) by means of computing and obtaining correct circulation indexes by means of attacking; (7), repeatedly carrying out steps (4), (5) and (6) to obtain all correct circulation indexes by means of attacking, and serially connecting all the correct circulation indexes with one another to obtain complete indexes. The side channel energy analytical attack method has the advantages that the RSA cipher algorithm analytical attack flexibility and effectiveness can be enhanced by the aid of the novel side channel attack method for the algorithms M-ary, and an RSA cipher algorithm analytical attack success rate can be increased by the aid of the novel side channel attack method for the algorithms M-ary.
Owner:CHENGDU UNIV OF INFORMATION TECH +3

Fighting robot capable of gouging and lifting simultaneously

PendingCN109364496AAvoid heads upImproves Gouge EfficiencySelf-moving toy figuresManipulatorReducerDrive motor
The invention provides a fighting robot capable of gouging and lifting simultaneously. The robot is driven to advance/fall back by a driving mechanism, a chassis is taken as a base plate, a gouging lifting mechanism is installed between a pair of main side plates which are symmetrically arranged in left and right on the part, located in the middle, of the upper end of the base plate, the fightingrobot is structurally characterized in that a driving motor is installed on the base plate, output power is reduced by a reducer, transmitted by a gouging transmission and a lifting transmission mechanism and transmitted to the gouging mechanism and the lifting mechanism respectively to drive a weapon rod of the gouging mechanism and a lifting plate member of the lifting mechanism to move around an output shaft of the gouging transmission mechanism and an output shaft of the lifting transmission mechanism to synchronously rotate reversely in the opposite reverse rotation directions, the weaponrod of the gouging mechanism is used as a gouging executing end, and the gouging weapon is installed at a free end of the weapon rod; a front protecting plate and a rear protecting plate on front andrear sides of the base plate are arranged in a splayed shape on the side face of the robot body. The robot can reduce the probability of gouging missing, and the stability of the robot body is improved.
Owner:ANHUI UNIVERSITY OF ARCHITECTURE

Method for modular multiplication remainder input side channel attacks aiming at M-ary implementation of RSA

The invention discloses a method for modular multiplication remainder input side channel energy analysis attacks aiming at M-ary implementation of an RSA cryptographic algorithm. The core of the method is that when M-ary implementation is used by modular exponentiation, modular multiplication remainder input serves as an attack target to implement CPA (correlation power analysis) attacks. The method comprises the steps that (1) signals are acquired, and a sampling matrix is established; (2) the modular multiplication remainder input is selected to serve as the attack target; (3) a correlation model is determined; (4) cycle index values are guessed, and a median matrix is calculated; (5) a simulated energy consumption matrix is calculated; (6) linear correlation coefficients between corresponding measuring points in the step (1) and the matrix determined in the step (5) are calculated, correct modular multiplication remainder input values of all cycles are attacked, and all corresponding correct cycle indexes are found out, and are connected in series, so that a complete index is obtained. According to the method, a novel M-ary side channel attack method is provided, and the flexibility, the effectiveness and the success rate of RSA cryptographic algorithm analysis attacks are improved.
Owner:CHENGDU UNIV OF INFORMATION TECH +3

Method for attacking elliptical curve encryption algorithm and attacking device

ActiveCN104717060AThe timing of error injection is easy to controlImprove attack efficiencyPublic key for secure communicationPlaintextCiphertext
The invention discloses a method for attacking the elliptical curve encryption algorithm and an attacking device. The method comprises the steps that the attacking device acquires the corresponding relation between the coordinates of an error base point with one byte error, parameters of an elliptical curve where the error base point is located and order in advance, wherein the order meets the condition that the length of a maximum prime factor is smaller than or equal to a preset threshold value; the attacking device injects one byte error into the coordinates of a base point of an elliptical curve used by the elliptical curve encryption algorithm in an encryption unit to obtain the coordinates of the error base point; the attacking device controls the encryption unit to encrypt a plaintext by means of the elliptical curve encryption algorithm according to the coordinates of the error base point so that error ciphertext output can be obtained; the attacking device calculates the parameters of the elliptical curve where the error base point is located according to the error ciphertext output and finds the coordinates and order of the error base point corresponding to the curve parameters in the corresponding relation; the attacking device acquires the plaintext according to the coordinates and order of the error base point, the curve parameters obtained through calculation, and error ciphertext output. By the adoption of the method for attacking the elliptical curve encryption algorithm and the attacking device, attacking efficiency is improved.
Owner:DATANG MICROELECTRONICS TECH CO LTD +1

Portable self-rotating rocket projectile weapon

The invention provides a portable self-rotating rocket projectile weapon. The portable self-rotating rocket projectile weapon adopts a launcher-rocket projectile integrated structure, fully utilizes the characteristics of low launching condition, high direct shooting precision and simple structure of a self-rotating rocket projectile, and is provided with a special disposable launcher to form theportable self-rotating rocket projectile weapon; and the defects that a traditional rocket projectile weapon is high in production cost, a launching position is easily exposed, and an individual soldier is not easy to carry and operate can be overcome. The rocket projectile weapon comprises a launcher and a rocket projectile, and the rocket projectile is a self-rotating rocket projectile with a turbine nozzle; the launcher is a disposable launcher and comprises a launcher body, four launcher supports, a sighting device and an ignition device. The launcher body serves as a storage and transportation barrel and a launching tube of rocket projectiles at the same time, and the launcher body can stretch and retract relatively in the axial direction; the launcher support can be folded and unfolded relative to the launcher body, and the sighting device and the ignition device are installed on the launcher body; and the ignition device is used for igniting and launching rocket projectiles.
Owner:白澔烔 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products