In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog...In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.展开更多
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic secur...The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation.展开更多
Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provid...Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.展开更多
Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is propo...Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time.展开更多
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex...RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.展开更多
The dispatching for monthly generation plan is to manage the congestion considering the security constrains of the power grid, where the monthly generation plan is the result of vary monthly power exchange, including ...The dispatching for monthly generation plan is to manage the congestion considering the security constrains of the power grid, where the monthly generation plan is the result of vary monthly power exchange, including long-term power contract, power exchange among provinces and generation constitution exchanges. The application of monthly security constrained dispatching is with significant meaning for the security and stability of power grid. This paper brings forward the purpose and contents of security dispatching and introduces the working procedure and mathematic models. At last, the practical example of the Anhui Province power grid is introduced to explain the models.展开更多
To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users,...To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The information is imperfect due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between the outputs of the sensors. We build a 5-state game to represent the interaction of the administrator with the user. The states correspond to 1) the user being out of the system in the Internet, and after logging in to the system;2) having low privileges;3) having high privileges;4) when he successfully attacks and 5) gets trapped in a honeypot by the administrator. Each state has its own action set. We present the game with a distinct perceived action set corresponding to each distinct information set of these states. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over the states, we use Euclidean distances between outputs of the sensors. A numerical simulation of an example game is presented to show the evaluation of rewards to the players and the preferred strategies. We also present the conditions for formulating the strategies when dealing with more than one attacker and making collaborations.展开更多
A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat ac...A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat acute toxicity test via mouth, salmonella assay in vitro, mouse micronucleus in vivo test and teratogenesis test were conducted to evaluate its general toxicity, genotoxicity and generative toxicity. The experimental results showed that this type of compounded microbial flocculant was a substantial non-toxic substance based on the fact that LD50 value was over 10 mg/kg. The results from salmonella in vivo test and mouse micronucleus in vivo test revealed that the compounded microbial flocculant is a genetically non-toxic substance. Furthermore, compounded microbial flocculant has little effect on the growth of all the rats, and any morphologic abnormal phenomenon hasn’t appeared.展开更多
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,...In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.展开更多
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener...The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.展开更多
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ...In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability.展开更多
We investigate a kind of chaos generating technique on a type of n-dimensional linear differential systems by adding feedback control items under a discontinuous state. This method is checked with some examples of num...We investigate a kind of chaos generating technique on a type of n-dimensional linear differential systems by adding feedback control items under a discontinuous state. This method is checked with some examples of numeric simulation. A constructive theorem is proposed for generalized synchronization related to the above chaotic system.展开更多
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally har...Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC problems.So the trapdoor in a public key encryption mechanism turns out to be a type of limited resource.In this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search technique.The basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input messages.The architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two generator.The evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors.展开更多
To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event....To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties.展开更多
In this study,the soil-air generator of the thermoelectric safety system working with soil heat was investigated.For this,a special electronic safety device was made and the output parameters of the device were invest...In this study,the soil-air generator of the thermoelectric safety system working with soil heat was investigated.For this,a special electronic safety device was made and the output parameters of the device were investigated.In order to investigate the operation of the thermoelectric“earth-air”generator safety system in real nature conditions,temperatures at the soil depth and soil surface equal to the length of the generator in four different regions of Ankara in four seasons were measured and modeled.Afterwards,physical parameters such as power P(W),voltage U(V)and current I(A)produced by the generator according toΔT were examined by using all this scientific information with a special test setup.According to the results obtained,it has been determined that the Intelligent thermoelectric earth-air generator safety system(ATES)has the feature of notifying the security units in case of area violation by generating its own electricity with the help of the heat in the soil without the need for any electrical cable.In addition,the environmentally friendly ATES system is an innovative product and it has been seen that it will be used in various fields,especially in military applications.展开更多
文摘In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.
文摘The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation.
基金This project is jointly supported by the National Natural Science Foundation of China (No.60074034, 70271068), the Research Fund for the Doctoral Program of Higher Education (N0.200200080004) and the Foundation for University Key Teacher by the Ministry
文摘Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.
基金Project supported by the China Postdoctoral Science Foundation (Grant No. 20080431142)
文摘Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time.
基金Supported by National Laboratory for Modern Communications Foundation (No. 5143 6010404DZ0235)
文摘RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
文摘The dispatching for monthly generation plan is to manage the congestion considering the security constrains of the power grid, where the monthly generation plan is the result of vary monthly power exchange, including long-term power contract, power exchange among provinces and generation constitution exchanges. The application of monthly security constrained dispatching is with significant meaning for the security and stability of power grid. This paper brings forward the purpose and contents of security dispatching and introduces the working procedure and mathematic models. At last, the practical example of the Anhui Province power grid is introduced to explain the models.
文摘To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The information is imperfect due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between the outputs of the sensors. We build a 5-state game to represent the interaction of the administrator with the user. The states correspond to 1) the user being out of the system in the Internet, and after logging in to the system;2) having low privileges;3) having high privileges;4) when he successfully attacks and 5) gets trapped in a honeypot by the administrator. Each state has its own action set. We present the game with a distinct perceived action set corresponding to each distinct information set of these states. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over the states, we use Euclidean distances between outputs of the sensors. A numerical simulation of an example game is presented to show the evaluation of rewards to the players and the preferred strategies. We also present the conditions for formulating the strategies when dealing with more than one attacker and making collaborations.
文摘A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat acute toxicity test via mouth, salmonella assay in vitro, mouse micronucleus in vivo test and teratogenesis test were conducted to evaluate its general toxicity, genotoxicity and generative toxicity. The experimental results showed that this type of compounded microbial flocculant was a substantial non-toxic substance based on the fact that LD50 value was over 10 mg/kg. The results from salmonella in vivo test and mouse micronucleus in vivo test revealed that the compounded microbial flocculant is a genetically non-toxic substance. Furthermore, compounded microbial flocculant has little effect on the growth of all the rats, and any morphologic abnormal phenomenon hasn’t appeared.
基金supported by the Fundamental Research Funds for the Center University of China under Grant HIT. MKSTISP. 2016 13
文摘In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.
文摘The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.
基金This paper was supported by the National Natural Science Foundation of China(No.U1204606)the Key Programs for Science and Technology Development of Henan Province(No.172102210335)Key Scientific Research Projects in Henan Universities(No.16A520058).
文摘In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability.
基金Supported by the National Nature Science Foundation of China under Grant No 70271068.
文摘We investigate a kind of chaos generating technique on a type of n-dimensional linear differential systems by adding feedback control items under a discontinuous state. This method is checked with some examples of numeric simulation. A constructive theorem is proposed for generalized synchronization related to the above chaotic system.
基金the National Natural Science Foundation of China(No.61572521,U1636114)National Key Project of Research and Development Plan(2017YFB0802000)+2 种基金Natural Science Foundation of Shaanxi Province(2021JM-252)Innovative Research Team Project of Engineering University of APF(KYTD201805)Fundamental Research Project of Engineering University of PAP(WJY201910).
文摘Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC problems.So the trapdoor in a public key encryption mechanism turns out to be a type of limited resource.In this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search technique.The basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input messages.The architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two generator.The evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors.
文摘To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties.
文摘In this study,the soil-air generator of the thermoelectric safety system working with soil heat was investigated.For this,a special electronic safety device was made and the output parameters of the device were investigated.In order to investigate the operation of the thermoelectric“earth-air”generator safety system in real nature conditions,temperatures at the soil depth and soil surface equal to the length of the generator in four different regions of Ankara in four seasons were measured and modeled.Afterwards,physical parameters such as power P(W),voltage U(V)and current I(A)produced by the generator according toΔT were examined by using all this scientific information with a special test setup.According to the results obtained,it has been determined that the Intelligent thermoelectric earth-air generator safety system(ATES)has the feature of notifying the security units in case of area violation by generating its own electricity with the help of the heat in the soil without the need for any electrical cable.In addition,the environmentally friendly ATES system is an innovative product and it has been seen that it will be used in various fields,especially in military applications.