Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guo Shize is active.

Publication


Featured researches published by Guo Shize.


international conference on computer science and service system | 2012

A Congestion Control Scheme Based on Improved RED Algorithm in Internet Topology Simulation

Zhao Jianpeng; Guo Shize; Zheng Kangfeng; Zhao Shuang

This paper first introduces existing congestion control algorithms and analyses their weakness. And after discusses the features and requirements of network topology simulation system, a congestion control scheme based on improved RED algorithm named DFCC was presented. DFCC reduces the package loss by adjusting link delay dynamically when congestion happens. And by means of twice optimization of adjusting rate of the link delay, it can ensure the stability of the average length of the queue. The experiment results indicate that when the amount of packets increases gradually, the package loss of DFCC scheme will distinctly less than RED algorithm.


international conference on instrumentation and measurement, computer, communication and control | 2012

Further Improved Deep Differential Fault Analysis on Camellia

Zhao Xinjie; Wang Tao; Guo Shize

This paper presents a further improved deep differential fault analysis (DFA) on Camellia. The proposed method can extend the single byte based fault depth into the r-2th round, recover full 8 bytes of the rth round equivalent key, 5-6 bytes of the r-1th round equivalent key, and 1 byte of the r-2th round equivalent key at one time. Experimental results show that: due to the Feistel structure and permutation function design, Camellia is vulnerable to deep DFA attack. 4 and 20 faulty ciphertexts can reduce the key space of Camellia-128 and Camellia-192/256 to 222.2 and 221.2 respectively.


international conference on instrumentation and measurement computer communication and control | 2013

Subjective Trust Quantification Algorithm in Pervasive Network

Liu Yulong; Tang Ye; Guo Shize; Ding Youzhi

Subjective trust and trust quantification are attracting much attention in pervasive network. In such environment, trust information has become the foundation to build effective systems or work platforms in e-commerce and other services such as file sharing. Subjective trust is expectation to target agents future behavior based on previous experiences, which should be quantified by uncertainty inference. In this paper, the definition of Trust Cloud is presented to describe the uncertainty of subjective trust. Furthermore, Cloud Model-based Trust Quantification Algorithm (CMTQ) is proposed. Simulations show that, compared to some current trust models, the novel algorithm is more consistent and effective.


international conference on instrumentation and measurement, computer, communication and control | 2012

A Routing Computation Strategy Based on Improved Clustering Algorithm

Zhao Jianpeng; Guo Shize; Zheng Kangfeng; Hu Yi-Xun; Dai Fang-Fang

A routing computation strategy based on improved clustering algorithm is proposed in this paper. It uses a clustering algorithm based on K-means and Dijkstra (CAKD) in topology partitioning. The routing information of each node can be computed during the clustering process, and CAKD reduces the time cost in routing computation and the storage in storing routing information. Experiments showed that, compared with using Dijkstra to cluster, CAKD cost less time. Meanwhile, compared with the strategy of global shortest path, the routing computation strategy based on improved clustering algorithm costs less storage in storing routing information.


international conference on instrumentation and measurement, computer, communication and control | 2012

A Fast Routing Selection Method Based on Ant Colony Optimization

Zhao Jianpeng; Guo Shize; Zheng Kangfeng; Hu Yi-Xun; Jia Wei

A fast clustering routing algorithm based on ant colony optimization and Dijkstra Algorithm is proposed on account of the router-level network topology simulation. First, FCRSA takes advantages of ant colony optimization to cluster the nodes in the network, then uses the improved Dijkstra algorithm to search for the shortest paths in the clusters, reducing the time needed for path selecting in router-level network topology simulation effectively. Experimental results show that the FCRSA-based simulation system of network topology is adequate for topology simulation on router-level.


international conference on instrumentation and measurement, computer, communication and control | 2011

Enhanced Side Channel Template Attack with Correlation Analysis

Guo Shize; Deng Gaoming; Cao Jin; Chen Bing

In order to improve the accuracy and efficiency of side channel template attack, interesting points should be selected from side channel leakage traces. A new method combined with correlation analysis is proposed to select interesting points. In this method, a correlation coefficients vector is calculated to reflect secret key dependence of side channel leakage, and the index of the bigger elements in the correlation coefficients vector is selected as the references of interesting points in side channel traces. The experiments showed that the correct ratio of template match with the correlation analysis interesting points select method and PCA method were both higher than that with the sum of absolute average differences method, and the time needed by correlation analysis was about only 50% of that needed by PCA.


international conference on pervasive computing | 2010

Design and Analysis of Security Policy System in GSM/UMTS Hybrid Network

Zhang Lei; Guo Shize; Liu Yulong

In this paper we propose a security policy system in GSM/UMTS hybrid system. Security policy requirement and framework is introduced. Design of security policy framework, description of security policy, usage of security policy and storage of security is discussed in detail. The security policy system provides a unified policy management and configuration mechanism which can manage network device, promote security feature of system, optimize system performance. The disadvantage of the system is also analyzed.


international conference on pervasive computing | 2010

An HRSA Algorithm Facing Router-Level Network Topology Simulation

Zhao Jianpeng; Guo Shize; Zheng Kangfeng; Yang Yixian; Jiang Yao

Analyzed the features of router-level topology simulation, and proposed an algorithm HRSA facing router-level network topology simulation based on Dijkstra algorithm aiming at actual Internet stratified topology structure. By the way of adding the shortest routing table on the core router, the time of searching the shortest path in router-level topology simulation has been reduced effectively. The experiment result shows that the network topology simulation system based on this algorithm is suitable for router-level network topology simulation perfectly.


pacific-asia workshop on computational intelligence and industrial application | 2009

Design of privilege management system based on attribute certificate in mobile network

Zhang Lei; Guo Shize; Zheng Kangfeng; Li Haitao; Zhang ZhenTao

In this paper we analyze certificate structure, discuss on authentication method based certificate in mobile network environment. This paper proposes a privilege management system based on attribute certificate in mobile network environment. The system uses attribute certificate which is a high security privilege management method to provide user privilege in large scale applications. The use of attribute certificate, distribute OCSP service and USIM support are also discussed in this paper.


Archive | 2014

Method and system for information mining of communication network

Guo Shize; Chen Zhe; Wang Xiaojuan; Lu Zheming; Zhao Jianpeng; Kang Guangyu; Zhang Letian

Collaboration


Dive into the Guo Shize's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kang Guangyu

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wang Xiujuan

Beijing University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge