scispace - formally typeset
Search or ask a question

Showing papers by "Qi Xia published in 2013"


Journal ArticleDOI
TL;DR: The results show that use of the integrated framework leads to a comparable accuracy and meet the real‐time filtration requirement.
Abstract: Purpose – The purpose of this paper is to provide an intelligent spam filtering method to meet the real‐time processing requirement of the massive short message stream and reduce manual operation of the system.Design/methodology/approach – An integrated framework based on a series of algorithms is proposed. The framework consists of message filtering module, log analysis module and rules handling module, and dynamically filters the short message spam, while generating the filtering rules. Experiments using Java are used to execute the proposed work.Findings – The experiments are carried out both on the simulation model (off‐line) and on the actual plant (on‐line). All experiment data are considered in both normal and spam real short messages. The results show that use of the integrated framework leads to a comparable accuracy and meet the real‐time filtration requirement.Originality/value – The approach in the design of the filtering system is novel. In addition, implementation of the proposed integrated ...

11 citations


Proceedings ArticleDOI
09 Sep 2013
TL;DR: This paper describes a new and efficient proxy signature scheme from DL assumption, in which the proxy signing efficiency is highly efficient and the construction makes use of a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature.
Abstract: Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrates that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide.

1 citations


Journal ArticleDOI
TL;DR: Experimental results verified that the proposed symmetrical method to extract smooth signal from linear mixtures in the frequency domain has a significant improvement compared with the SOFI algorithm.
Abstract: Purpose – The purpose of this paper is to present a symmetrical method to extract smooth signal from linear mixtures in the frequency domain; with experimentations, the method is thereafter evaluated.Design/methodology/approach – The Second‐order Frequency Identification (SOFI) algorithm has been presented to retrieve baseband signals which have inactive bands and different bandwidths in the frequency domain. However, the SOFI method will bring about accumulative error, therefore an improved method is proposed in this paper by using symmetric extraction mode. In contrast to the SOFI algorithm, the ISOFI method can extract simultaneously the signal with the highest degree of smoothness and the signal with the lowest degree of smoothness. This means that the signals are not extracted one by one; instead, they are extracted in parallel. Experimental results in both noise‐free and noisy scenarios verified that the proposed method has a significant improvement compared with the SOFI algorithm.Findings – An imp...