期刊文献+
共找到555篇文章
< 1 2 28 >
每页显示 20 50 100
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
1
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
下载PDF
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
2
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
下载PDF
A Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control
3
作者 Arman Sargolzaei Kang K. Yen +2 位作者 Mohamed N. Abdelghani Abolfazl Mehbodniya Saman Sargolzaei 《Intelligent Control and Automation》 2015年第4期205-214,共10页
In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a p... In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reliable and safe from TDS attacks. Here, we introduce a simple method for preventing time delay switch attack on networked control systems. The method relies on an estimator that will estimate and track time delays introduced by an adversary. Knowing the maximum tolerable time delay of the plant’s optimal controller for which the plant remains stable, a time-delay detector issues an alarm signal when the estimated time delay is larger than the minimum one and directs the system to alarm state. In an alarm state, the plant operates under the control of an emergency controller that is local to the plant and remains in this mode until the networked control system state is restored. This method is an inexpensive and simple way to guarantee that an industrial control system remains stable and secure. 展开更多
关键词 time Delay SWITCH attack Load Frequency Control DETECTION and Estimation EMERGENCY CONTROLLER
下载PDF
Sliding mode control and Lyapunov based guidance law with impact time constraints 被引量:5
4
作者 Xiaojian Zhang Mingyong Liu Yang Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第6期1186-1192,共7页
This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact... This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact time constraints of guidance law(ITCG) is derived by using sliding mode control(SMC) and Lyapunov stability theorem. The expected impact time is realized by using the notion of attack process and estimated time-to-go to design sliding mode surface(SMS). ITCG contains equivalent and discontinuous guidance laws, once state variables arrive at SMS,the equivalent guidance law keeps the state variables on SMS,then the discontinuous guidance law enforces state variables to move and reach SMS. The singularity problem of ITCG is also analyzed. Theoretical analysis and numerical simulation results are given to test the effectiveness of ITCG designed in this paper. 展开更多
关键词 Lyapunov stability sliding mode control impact time salvo attack time-TO-GO guidance law
下载PDF
TDOA-based Sybil attack detection scheme for wireless sensor networks 被引量:5
5
作者 温蜜 李辉 +1 位作者 郑燕飞 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2008年第1期66-70,共5页
As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node w... As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing. 展开更多
关键词 attack detection Sybil attack.time difference of arrival (TDOA) wireless sensor networks (WSN)
下载PDF
Further Analysis of Block Ciphers against Timing Attacks
6
作者 LI Wei GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. 展开更多
关键词 timing attacks block ciphers REDUCTION
下载PDF
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
7
作者 Eloi De Chérisey Sylvain Guilley +1 位作者 Olivier Rioul Darshana Jayasinghe 《Journal of Information Security》 2021年第1期1-33,共33页
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation. 展开更多
关键词 Timing attacks Profiling attacks Dirichlet Priors Success Rates
下载PDF
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
8
作者 Arman Sargolzaei Kang Yen +2 位作者 Mohamed Abdelghani Alireza Abbaspour Saman Sargolzaei 《Intelligent Control and Automation》 2017年第3期164-174,共11页
Networked Control Systems (NCSs) have been implemented in several different industries. The integration with advanced communication networks and computing techniques allows for the enhancement of efficiency of industr... Networked Control Systems (NCSs) have been implemented in several different industries. The integration with advanced communication networks and computing techniques allows for the enhancement of efficiency of industrial control systems. Despite all the advantages that NCSs bring to industry, they remain at risk to a spectrum of physical and cyber-attacks. In this paper, we elaborate on security vulnerabilities of NCSs, and examine how these vulnerabilities may be exploited when attacks occur. A general model of NCS designed with three different controllers, i.e., proportional-integral-derivative (PID) controllers, Model Predictive control (MPC) and Emotional Learning Controller (ELC) are studied. Then three different types of attacks are applied to evaluate the system performance. For the case study, a networked pacemaker system using the Zeeman nonlinear heart model (ZHM) as the plant combined with the above-mentioned controllers to test the system performance when under attacks. The results show that with Emotional Learning Controller (ELC), the pacemaker is able to track the ECG signal with high fidelity even under different attack scenarios. 展开更多
关键词 Security of Control Systems DENIAL of Service (DoS) attack time-Delay-Switch (TDS) attack False Data Injection (FDI) attack
下载PDF
Robust first two rounds access driven cache timing attack on AES
9
作者 ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan 《通讯和计算机(中英文版)》 2009年第6期20-25,共6页
关键词 高速缓存 多进程共享 计算机技术 加密方法
下载PDF
Timing Attack Analysis on AA<sub>β</sub>Cryptosystem
10
作者 A. H. A. Ghafar M. R. K. Ariffin 《Journal of Computer and Communications》 2014年第4期1-9,共9页
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys... Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. 展开更多
关键词 TIMING attack Side-Channel attack Public-Key CRYPTOSYSTEM AAβ Public Key CRYPTOSYSTEM
下载PDF
计及DoS攻击和通信时滞的电力系统负荷频率控制
11
作者 刘星月 田永强 +2 位作者 施开波 周坤 唐琳 《工程科学与技术》 EI CAS CSCD 北大核心 2024年第3期249-258,共10页
针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采... 针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采样信号连续丢失数,并分别考虑通信网络中通信时滞和输出信号采样特性,建立包含输出状态反馈控制器的电力系统LFC模型。其次,基于此模型,利用含有控制命令更新周期、DoS攻击导致的最大采样信号连续丢失数、通信时滞、H_(∞)稳定指标的双边闭环Lyapunov泛函、LMI技术,提出LFC系统满足一定H_(∞)指标的稳定准则,并给出离散状态输出反馈LFC控制器的设计及求解方法。最后,本文以单区域和双区域LFC系统为例进行了仿真验证。结果表明:与已有文献方法相比,本文方法在保持系统H_(∞)渐近稳定前提下,能够容忍更大的通信时滞,且结果的保守性更低;同时可以看出本文所设计的控制器在保证H_(∞)稳定性能的基础上,对一定能量限制的DoS攻击具有弹性的防御性能。因此本文方案的有效性和优越性得到了验证。 展开更多
关键词 时滞 DOS攻击 负荷频率控制方案 采样特性 LYAPUNOV泛函
下载PDF
盐渍土环境下考虑耐久性损伤的输电塔风振时程分析
12
作者 梁岩 赵付林 +1 位作者 冯浩琪 刘昌海 《建筑结构》 北大核心 2024年第8期74-84,共11页
长期服役于盐渍土环境下的输电塔耐久性损伤较为严重,当其材料力学性能退化到一定程度时,在强风作用下,输电塔可能会发生破坏,危害线路的安全运行。基于±800kV天中线特高压直流输电工程直线塔,考虑基础钢筋锈蚀、基础混凝土侵蚀、... 长期服役于盐渍土环境下的输电塔耐久性损伤较为严重,当其材料力学性能退化到一定程度时,在强风作用下,输电塔可能会发生破坏,危害线路的安全运行。基于±800kV天中线特高压直流输电工程直线塔,考虑基础钢筋锈蚀、基础混凝土侵蚀、输电塔杆塔钢材锈蚀以及基础箍筋的约束效应,在ABAQUS有限元软件中建立塔-线-基础耦合模型,研究不同风攻角和材料耐久性损伤对塔身动力响应的影响。结果表明:90°风攻角下塔身顺风向位移最大,为最不利风向基本工况;90°风攻角下输电塔塔顶顺风向位移响应贡献主要以背景分量为主,但共振分量也有一定贡献,主要以输电塔1阶振型频率为主,且随着服役时间的增加,振型频率逐渐降低,相应响应的贡献程度逐渐提高;相同风荷载作用下,随着服役时间的增加,塔身位移逐渐增大,相同服役时间下,随着塔身高度的增加,塔身位移响应峰值增长速度变快,结构振动更加明显,材料耐久性损伤对输电塔的位移响应影响较大。 展开更多
关键词 输电塔 耐久性 风攻角 谐波叠加法 时程分析
下载PDF
视场角限制下的攻击时间和角度三维矢量制导律设计
13
作者 熊天昊 王长元 +2 位作者 张科 苏雨 郭正玉 《航空兵器》 CSCD 北大核心 2024年第4期49-56,共8页
为了提高导弹精确打击目标的能力,控制攻击时间和攻击角度三维制导问题在实际应用中具有重要的意义。针对这一问题,本文基于三维矢量制导模型提出了一种视场角约束下的攻击时间和攻击角度控制律。首先,通过将平面矢量制导律扩展至三维空... 为了提高导弹精确打击目标的能力,控制攻击时间和攻击角度三维制导问题在实际应用中具有重要的意义。针对这一问题,本文基于三维矢量制导模型提出了一种视场角约束下的攻击时间和攻击角度控制律。首先,通过将平面矢量制导律扩展至三维空间,提出了一种三维矢量攻击角度约束制导律;其次,在上述制导指令的拦截分量中引入剩余时间偏置项,设计了一种在视场角约束下的三维矢量制导律,并进行了稳定性分析。保证导弹能在视场角约束的条件下,以期望的攻击时间和角度击中目标,并且误差均小于0.01;最后,通过数值模拟验证了所设计制导律的正确性和有效性。 展开更多
关键词 导弹 矢量制导律 视场角限制 攻击时间约束 攻击角度约束 耦合非线性
下载PDF
基于落角和时间约束的巡飞弹末端协同打击策略
14
作者 赵军民 王荣刚 +1 位作者 李新国 张栋 《西北工业大学学报》 EI CAS CSCD 北大核心 2024年第3期386-395,共10页
为解决集群巡飞弹末制导阶段协同定向打击问题,提出了一种具有落角约束的巡飞弹末端协同打击策略。基于小偏差方法,推导了一种具有落角约束的偏置比例制导律,以解决纵向平面定向打击问题。结合所提制导方案,推导了综合考虑比例控制项和... 为解决集群巡飞弹末制导阶段协同定向打击问题,提出了一种具有落角约束的巡飞弹末端协同打击策略。基于小偏差方法,推导了一种具有落角约束的偏置比例制导律,以解决纵向平面定向打击问题。结合所提制导方案,推导了综合考虑比例控制项和角度控制项剩余时间估计方法。在侧向平面内,设计了一种具有时变系数且不存在除零奇异问题的时间控制偏置项,以解决时间控制问题。此外,以剩余时间为协调变量,利用双层协同架构来解决多枚巡飞弹协同定向打击问题。仿真结果验证了该协同制导策略良好的落角控制和协同打击性能。 展开更多
关键词 协同打击 末制导 时间约束 落角约束
下载PDF
基于GSCPN的硬件木马攻击建模与安全性分析
15
作者 梅波 郭威 +2 位作者 曹志鹏 李沛杰 张文博 《网络与信息安全学报》 2024年第4期72-84,共13页
针对硬件木马(hardware trojan,HT)的研究主要集中在HT设计和防御的具体策略,缺乏面向HT攻击的系统安全性量化评估模型的问题,提出了基于广义随机着色petri网(generalized stochastic coloring petri net,GSCPN)的HT攻击和安全评估模型... 针对硬件木马(hardware trojan,HT)的研究主要集中在HT设计和防御的具体策略,缺乏面向HT攻击的系统安全性量化评估模型的问题,提出了基于广义随机着色petri网(generalized stochastic coloring petri net,GSCPN)的HT攻击和安全评估模型。基于单个基本单元的HT攻击行为和状态之间的时序关系,构建了单个基本单元的HT攻击GSCPN模型,根据系统工作状态下基本单元的通信依赖关系,给出了构建系统HT攻击GSCPN模型的通用方法。求解了与GSCPN模型同构的马尔可夫链的解析解,以及采用蒙特卡罗模拟方法的仿真解,二者的误差仅为0.00183,验证了所提方法建模的准确性。通过案例分析了不同场景下系统的安全性,实验结果表明,木马攻击强度、木马恢复时间和任务执行时间均对安全性有不同程度的影响。 展开更多
关键词 硬件木马 广义随机着色petri网 攻击建模 连续时间马尔可夫链
下载PDF
基于三步迭代滤波器的缓变型时间同步攻击防护方案
16
作者 刘钰沐 张林秀 +2 位作者 黄建刚 罗正华 李城鑫 《成都大学学报(自然科学版)》 2024年第2期160-165,共6页
针对卫星接收机可能遭受转发式欺骗干扰而造成缓变型时间同步攻击的情形,提出了基于三步迭代滤波器的攻击防护方案.该方案首先引入缓变型时间同步攻击模型和缓变型时间同步攻击感知模型,并利用三步迭代滤波器估计缓变型时间同步攻击感... 针对卫星接收机可能遭受转发式欺骗干扰而造成缓变型时间同步攻击的情形,提出了基于三步迭代滤波器的攻击防护方案.该方案首先引入缓变型时间同步攻击模型和缓变型时间同步攻击感知模型,并利用三步迭代滤波器估计缓变型时间同步攻击感知模型的时钟偏差与时钟漂移,最后依据构建的纠偏模型对钟差与钟漂进行校正.仿真实验结果表明,该方案能在1 s内及时检测出缓变型时间同步攻击,并进行有效抑制,有效降低时间同步攻击对授时精度的影响. 展开更多
关键词 三步迭代滤波器 缓变型 时间同步攻击 卫星授时
下载PDF
基于安全态势监测模型的泛在终端种类攻击自动识别研究
17
作者 韩世海 徐鑫 朱珠 《计算机应用与软件》 北大核心 2024年第4期327-332,共6页
以提升泛在终端种类攻击自动识别精度为目的,研究基于安全态势监测模型的泛在终端种类攻击自动识别方法。对初始数据序列实施等时距处理,依照累加数列所表现出的反“S”形摆动特征,通过灰色Verhulst模型确定泛在终端风险值。将支持向量... 以提升泛在终端种类攻击自动识别精度为目的,研究基于安全态势监测模型的泛在终端种类攻击自动识别方法。对初始数据序列实施等时距处理,依照累加数列所表现出的反“S”形摆动特征,通过灰色Verhulst模型确定泛在终端风险值。将支持向量机的参数与分类精度分别作为改进粒子群算法的粒子和目标函数,通过全局搜索过程确定支持向量机的最优参数,构建多分类识别模型,将泛在终端风险值作为输入,利用识别模型自动识别泛在终端攻击类型。实验分析结果显示该方法攻击类型查准率为97.81%,DCP值最高达到0.0063%。 展开更多
关键词 安全态势 泛在终端 种类攻击 自动识别 等时距处理
下载PDF
基于局部检测信息的电力系统时间同步攻击定位方法
18
作者 徐飞阳 孔贺 +3 位作者 常乃超 顾雷 马婧 薛安成 《华北电力大学学报(自然科学版)》 CAS 北大核心 2024年第1期10-19,共10页
卫星时间同步攻击可造成电力系统设备时间紊乱,PMU相角量测错误,危及系统安全运行。鉴于基于线路两端PMU数据的攻击检测方法无法判断线路哪端节点受到攻击,提出了一种基于局部攻击检测信息及同步区域搜索聚合的卫星时间同步攻击定位方... 卫星时间同步攻击可造成电力系统设备时间紊乱,PMU相角量测错误,危及系统安全运行。鉴于基于线路两端PMU数据的攻击检测方法无法判断线路哪端节点受到攻击,提出了一种基于局部攻击检测信息及同步区域搜索聚合的卫星时间同步攻击定位方法。首先,结合同步攻击特性构建了电力系统等效图及邻接矩阵。其次,结合线路两端攻击检测信息,利用广度优先搜索获取报警线路分割形成的各内部同步的区域子系统。再次,根据子系统是否两两相连分为简单情形和复杂情形;针对复杂情形,结合相角差偏差估计与同步子系统聚合将其转化为简单情形。最后,基于正常节点数量占优假设定位受攻击节点。IEEE 39节点系统测试表明,该方法在不同攻击下可有效定位攻击,可区分受不同攻击的节点,对微小攻击的定位能力强。 展开更多
关键词 时间同步攻击 攻击定位 卫星授时 同步相量数据 攻击检测
下载PDF
氯盐与硫酸盐复合侵蚀下钢筋混凝土锈裂行为 被引量:2
19
作者 俞小彤 常西栋 +2 位作者 周文涛 廖迎娣 陈达 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2024年第2期151-160,共10页
为评估海洋、盐湖等环境中钢筋混凝土结构耐久性,通过试验与理论相结合探究氯盐与硫酸盐复合侵蚀下钢筋混凝土锈裂特性。通电腐蚀5%(质量分数)NaCl、5%NaCl+5%Na_(2)SO_(4)溶液中钢筋混凝土试件,对比分析混凝土表观形貌、钢筋锈蚀特征... 为评估海洋、盐湖等环境中钢筋混凝土结构耐久性,通过试验与理论相结合探究氯盐与硫酸盐复合侵蚀下钢筋混凝土锈裂特性。通电腐蚀5%(质量分数)NaCl、5%NaCl+5%Na_(2)SO_(4)溶液中钢筋混凝土试件,对比分析混凝土表观形貌、钢筋锈蚀特征。设计伴随的混凝土腐蚀试验,类比保护层腐蚀劣化,分析混凝土力学性能。结果表明:硫酸盐的存在改变胀裂前混凝土形貌,使得单一氯盐侵蚀下的“白须”消失,表面粉化并出现盐结晶,延长胀裂时间;复合侵蚀下钢筋锈蚀率低于单一氯盐侵蚀,二者均显著低于法拉第定律理论值;锈胀裂缝宽度与钢筋锈蚀率线性相关,硫酸盐的存在增大裂缝随钢筋锈蚀发展的速率;通电环境中,受腐蚀混凝土的抗压强度先升高后降低,劈裂抗拉强度不断降低。提出受腐蚀混凝土的抗拉强度演化经验公式。在经典锈胀模型的基础上考虑锈蚀产物对裂缝的填充作用,并将硫酸盐的影响考虑至混凝土抗拉强度、钢筋腐蚀电流密度中,建立复合侵蚀下钢筋混凝土胀裂时间预测模型,并验证了模型的有效性。 展开更多
关键词 氯盐-硫酸盐侵蚀 混凝土腐蚀 锈胀力 胀裂时间
下载PDF
基于局部扰动的时间序列预测对抗攻击
20
作者 张耀元 原继东 +2 位作者 刘海洋 王志海 赵培翔 《软件学报》 EI CSCD 北大核心 2024年第11期5210-5227,共18页
时间序列预测模型已广泛应用于日常生活中的各个行业,针对这些预测模型的对抗攻击关系到各行业数据的安全性.目前,时间序列的对抗攻击多在全局范围内进行大规模扰动,导致对抗样本易被感知.同时,对抗攻击的效果会随着扰动幅度的降低而明... 时间序列预测模型已广泛应用于日常生活中的各个行业,针对这些预测模型的对抗攻击关系到各行业数据的安全性.目前,时间序列的对抗攻击多在全局范围内进行大规模扰动,导致对抗样本易被感知.同时,对抗攻击的效果会随着扰动幅度的降低而明显下降.因此,如何在生成不易察觉的对抗样本的同时保持较好的攻击效果,是当前时间序列预测对抗攻击领域亟需解决的问题之一.首先提出一种基于滑动窗口的局部扰动策略,缩小对抗样本的扰动区间;其次,使用差分进化算法寻找最优攻击点位,并结合分段函数分割扰动区间,进一步降低扰动范围,完成半白盒攻击.和已有的对抗攻击方法在多个不同深度模型上的对比实验表明,所提出的方法能够生成不易感知的对抗样本,并有效改变模型的预测趋势,在股票交易、电力消耗、太阳黑子观测和气温预测这4个具有挑战性的任务中均取得了较好的攻击效果. 展开更多
关键词 时间序列预测 对抗攻击 对抗样本 半白盒攻击 滑动窗口 差分进化
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部