Tian Junfeng
Hebei University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tian Junfeng.
international symposium on computer science and computational technology | 2008
Jiao Hongqiang; Tian Junfeng; Wang Baomin
This paper utilizes Stern-Brocot tree to produce secret key and designs an encryption schemes, which achieve one-time padding. Then, the security and compute complexity analysis for the scheme is finished.
Intelligent Automation and Soft Computing | 2016
Tian Junfeng; Jiao Hongqiang
This paper proposed a kind of dynamic software behavior trust model, which is based on improved Jøsang’s Subjective Logic. It used to build the trust model through turning Basic Rate and Uncertainty Factors into dynamic ones and Trace of Software Behavior (TSB) is introduced to describe the feature of Software Behavior (SB), so as to provide characteristic information, which supports the trustiness of Software Behavior. Finally, the sensitivity and efficiency of the model are demonstrated by simulation experiments, and the model can better adapt to the dynamic evaluation situation.
wri world congress on software engineering | 2009
Du Ruizhong; Tian Junfeng; Wang Zixian; Ma Xiaoxue
As P2P system has dynamic open and anonymous characteristics, and these seriously restrict P2P system of cooperation between the users and system reliability and availability. To solve the above problems, a trust model of P2P network based on reputation and risk is presented. Taking into account the influence on the calculation of confidence at different periods of trading, time decay function which different weight is distributed in accordance with the trading range of different periods has been introduced. At the same time, taking into account uncertainty that the dynamic behavior of the nodes effects the calculation of confidence, the risk factors have been introduced, which makes the impact of node trust by the malicious acts more sensitive through adjusting weight of credibility of the value and risk value appropriately. The simulation experiments and analysis shows that the model is able to identify malicious nodes effectively to a certain extent, and increase the successful proportion of transactions of the system.
international conference on information systems | 2009
Tian Junfeng; Lu Yu-zhen; Yuan Peng
The trusted computing has become an effective method to resolve trust related problems in current network security environment. In order to improve the trustworthiness of trust evaluation, a model based on weighted closeness of trust combination (WCTC) is presented. The model chooses the trusted path with considering the transition fading, time decay, weight of the path and so on. The model decreases the time complexity in the search of the trusted paths. The model uses weighted closeness to combine the recommendation paths. Through building the trusted network, the validity of the model is analyzed by mathematics method, and the policy to inhibit the malicious recommendation is given. Finally, the experiment has shown that this model has improved the trustworthiness of trust evaluation, the trust combination based on weighted closeness of the trust combination can be used in various trust models and it has better adaptability.The trusted computing has become an effective method to resolve trust related problems in current network security environment. In order to improve the trustworthiness of trust evaluation, a model based on weighted closeness of trust combination (WCTC) is presented. The model chooses the trusted path with considering the transition fading, time decay, weight of the path and so on. The model decreases the time complexity in the search of the trusted paths. The model uses weighted closeness to combine the recommendation paths. Through building the trusted network, the validity of the model is analyzed by mathematics method, and the policy to inhibit the malicious recommendation is given. Finally, the experiment has shown that this model has improved the trustworthiness of trust evaluation, the trust combination based on weighted closeness of the trust combination can be used in various trust models and it has better adaptability.
Wuhan University Journal of Natural Sciences | 2006
Tian Junfeng; Liu Yongli
Based on citing Realm, a new Honeynet Model-BRHNS (Based Realm Honeynet) is presented. BRHNS makes use of cooperation between Realms, the efficiency of Honeynet is improved, in intrusion behavior analysis module, unknown attack data are classified by unsupervised clustering algorithm, accordingly, prepared for extracting intrusion rules and adding the new rules to IDS rule-lib, consequently, the detection efficiency of IDS is improved and the workload of Honeynet is effectively reduced. Had performed experiments through cross-validate, we found it was effective to classify the attack data by unsupervised clustering algorithm.
international conference on measuring technology and mechatronics automation | 2015
Tian Junfeng; Zhou Heng
Since the resource provide cannot finish all the task of users, a QoS-driven task scheduling algorithm is proposed. It integrates the advantage of Min-min algorithm in throughput and linear programming global optimization, which takes into account the tasks with higher priority first. Our strategy classifies the tasks according to their length and necessity, to establish task computing resource relation matrix and corresponding constraints. The linear programming model is constructed based on object function. Finally we provide the key process of scheduling algorithm. The simulation show he improved strategy can improve the success rate of task execution and utilization of system resource, shortening the total time to complete the task.
Wuhan University Journal of Natural Sciences | 2007
Liu Yuling; Wang Huiran; Tian Junfeng
Due to the amount of data that an IDS needs to examine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of reduced features better than primary features by experimental results.
Wuhan University Journal of Natural Sciences | 2006
Liu Yuling; Pan Shiying; Tian Junfeng
This paper puts forward a survivability evaluation model, SQEM (Survivability Quantitative Evaluation Model), based on lucubrating the main method existed. Then it defines the measurement factors and parses the survivability mathematically, introduces state change probability and the idea of setting the weights of survivability factors dynamically into the evaluating process of SQEM, which improved the accuracy of evaluation. An example is presented to illustrate the way SQEM works, which demonstrated the validity and feasibility of the method.
Wuhan University Journal of Natural Sciences | 2006
Tian Junfeng; Xiao Bing; Wang Zixian; Zhang Yuzhu
The most significant strategic development in information technology over the past years has been “trusted computing” and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.
international conference on innovative computing technology | 2013
Tian Junfeng; Cao Xun