The goal of this study was to investigate the behaviour of rainbow trout(n=30),Oncorhynchus mykiss,in small raceways when either self-feeders(T2) or hand-feeding(t2) were used.The method of food delivery in T2 was def...The goal of this study was to investigate the behaviour of rainbow trout(n=30),Oncorhynchus mykiss,in small raceways when either self-feeders(T2) or hand-feeding(t2) were used.The method of food delivery in T2 was defensible while that of t2 was indefensible.Fish in both raceways were subjected to restricted feeding(RF) for 25 days.Food was available in the morning(09:00-10:00) in the downstream area and in the afternoon(16:00-17:00) in the upstream area of the raceways.The results showed that the behaviour of rainbow trout was significantly different under interference competition(T2) for food compared with that under scramble competition(t2).RF in T2 fish limited food availability to meal times when feeding rewards were available while t2 fish only responded to the location of food delivery.The aggressive fish in T2 were dominant,and t2 fish at high densities showed intense social interactions under the indefensible pattern of food distribution;these interactions did not dampen to a minimum level to suppress the development of dominance hierarchies.Further,the stocking density did not break down the dominance hierarchies between the T2 fish.This suggests that decreased efficiency in the search for food or inefficient foraging,induced by interference competition at high densities,affected the behaviour of rainbow trout.展开更多
This study aims to investigate the defensible character of the Lahore railway station built in response to"the war of independenee in 1857,"which greatly impacted the location and design of the building.This...This study aims to investigate the defensible character of the Lahore railway station built in response to"the war of independenee in 1857,"which greatly impacted the location and design of the building.This study demonstrates the in tegral role played by the railway station in the development of the new colonial city,which the British wants to be defensive in every aspect.Railways were introduced in Pakistan(India)soon after their inauguration in Britain.Beginning from the mode of transportation,the multifaced contribution of railways toward the urban growth,new architectural style,mode of construction,and technology cannot be recanted.The research is based on the documentation and analysis of the history of Lahore railway station design.First,this study uses primary and secondary data to offer a history of the Lahore railway station from its inception to final execution.Second,it explores the criteria adopted by the British for its site selection to make the station a defensible post.The research finding in eludes the visual features that enhanced the architectural character of the building.Qualitative methods are used including several other approaches,namely,literature review,archival data collection,analysis of photographs,and study of architectural drawings and old maps,to achieve the objectives.展开更多
In the realm of Intelligent Railway Transportation Systems,effective multi-party collaboration is crucial due to concerns over privacy and data silos.Vertical Federated Learning(VFL)has emerged as a promising approach...In the realm of Intelligent Railway Transportation Systems,effective multi-party collaboration is crucial due to concerns over privacy and data silos.Vertical Federated Learning(VFL)has emerged as a promising approach to facilitate such collaboration,allowing diverse entities to collectively enhance machine learning models without the need to share sensitive training data.However,existing works have highlighted VFL’s susceptibility to privacy inference attacks,where an honest but curious server could potentially reconstruct a client’s raw data from embeddings uploaded by the client.This vulnerability poses a significant threat to VFL-based intelligent railway transportation systems.In this paper,we introduce SensFL,a novel privacy-enhancing method to against privacy inference attacks in VFL.Specifically,SensFL integrates regularization of the sensitivity of embeddings to the original data into the model training process,effectively limiting the information contained in shared embeddings.By reducing the sensitivity of embeddings to the original data,SensFL can effectively resist reverse privacy attacks and prevent the reconstruction of the original data from the embeddings.Extensive experiments were conducted on four distinct datasets and three different models to demonstrate the efficacy of SensFL.Experiment results show that SensFL can effectively mitigate privacy inference attacks while maintaining the accuracy of the primary learning task.These results underscore SensFL’s potential to advance privacy protection technologies within VFL-based intelligent railway systems,addressing critical security concerns in collaborative learning environments.展开更多
Traumatic brain injury is a prevalent disorder of the central nervous system.In addition to primary brain parenchymal damage,the enduring biological consequences of traumatic brain injury pose long-term risks for pati...Traumatic brain injury is a prevalent disorder of the central nervous system.In addition to primary brain parenchymal damage,the enduring biological consequences of traumatic brain injury pose long-term risks for patients with traumatic brain injury;however,the underlying pathogenesis remains unclear,and effective intervention methods are lacking.Intestinal dysfunction is a significant consequence of traumatic brain injury.Being the most densely innervated peripheral tissue in the body,the gut possesses multiple pathways for the establishment of a bidirectional“brain-gut axis”with the central nervous system.The gut harbors a vast microbial community,and alterations of the gut niche contribute to the progression of traumatic brain injury and its unfavorable prognosis through neuronal,hormonal,and immune pathways.A comprehensive understanding of microbiota-mediated peripheral neuroimmunomodulation mechanisms is needed to enhance treatment strategies for traumatic brain injury and its associated complications.We comprehensively reviewed alterations in the gut microecological environment following traumatic brain injury,with a specific focus on the complex biological processes of peripheral nerves,immunity,and microbes triggered by traumatic brain injury,encompassing autonomic dysfunction,neuroendocrine disturbances,peripheral immunosuppression,increased intestinal barrier permeability,compromised responses of sensory nerves to microorganisms,and potential effector nuclei in the central nervous system influenced by gut microbiota.Additionally,we reviewed the mechanisms underlying secondary biological injury and the dynamic pathological responses that occur following injury to enhance our current understanding of how peripheral pathways impact the outcome of patients with traumatic brain injury.This review aimed to propose a conceptual model for future risk assessment of central nervous system-related diseases while elucidating novel insights into the bidirectional effects of the“brain-gut-microbiota axis.”展开更多
Simultaneous stresses of salinity and drought often coincide during rice-growing seasons in saline lands,primarily due to insufficient water resources and inadequate irrigation facilities.Consequently,combined salinit...Simultaneous stresses of salinity and drought often coincide during rice-growing seasons in saline lands,primarily due to insufficient water resources and inadequate irrigation facilities.Consequently,combined salinity-drought stress poses a major threat to rice production.In this study,two salinity levels(NS,non-salinity;HS,high salinity)along with three drought treatments(CC,control condition;DJ,drought stress imposed at jointing;DH,drought stress imposed at heading)were performed to investigate their combined influences on leaf photosynthetic characteristics,biomass accumulation,and rice yield formation.Salinity,drought,and their combination led to a shortened growth period from heading to maturity,resulting in a reduced overall growth duration.Grain yield was reduced under both salinity and drought stress,with a more substantial reduction under the combined salinity-drought stress.The combined stress imposed at heading caused greater yield losses in rice compared with the stress imposed at jointing.Additionally,the combined salinity-drought stress induced greater decreases in shoot biomass accumulation from heading to maturity,as well as in shoot biomass and nonstructural carbohydrate(NSC)content in the stem at heading and maturity.However,it increased the harvest index and NSC remobilization reserve.Salinity and drought reduced the leaf area index and SPAD value of flag leaves and weakened the leaf photosynthetic characteristics as indicated by lower photosynthetic rates,transpiration rates,and stomatal conductance.These reductions were more pronounced under the combined stress.Salinity,drought,and especially their combination,decreased the activities of ascorbate peroxidase,catalase,and superoxide dismutase,while increasing the contents of malondialdehyde,hydrogen peroxide,and superoxide radical.Our results indicated a more significant yield loss in rice when subjected to combined salinity-drought stress.The individual and combined stresses of salinity and drought diminished antioxidant enzyme activities,inhibited leaf photosynthetic functions,accelerated leaf senescence,and subsequently lowered assimilate accumulation and grain yield.展开更多
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ...The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality.展开更多
Painful stimuli elicit first-line reflexive defensive reactions and,in many cases,also evoke second-line recuperative behaviors,the latter of which reflects the sensing of tissue damage and the alleviation of sufferin...Painful stimuli elicit first-line reflexive defensive reactions and,in many cases,also evoke second-line recuperative behaviors,the latter of which reflects the sensing of tissue damage and the alleviation of suffering.The lateral parabrachial nucleus(lPBN),composed of external-(elPBN),dorsal-(dlPBN),and central/superior-subnuclei(jointly referred to as slPBN),receives sensory inputs from spinal projection neurons and plays important roles in processing affective information from external threats and body integrity disruption.However,the organizational rules of lPBN neurons that provoke diverse behaviors in response to different painful stimuli from cutaneous and deep tissues remain unclear.In this study,we used region-specific neuronal depletion or silencing approaches combined with a battery of behavioral assays to show that slPBN neurons expressing substance P receptor(NK1R)(lPBNNK1R)are crucial for driving pain-associated self-care behaviors evoked by sustained noxious thermal and mechanical stimuli applied to skin or bone/muscle,while elPBN neurons are dispensable for driving such reactions.Notably,lPBNNK1R neurons are specifically required for forming sustained somatic pain-induced negative teaching signals and aversive memory but are not necessary for fear-learning or escape behaviors elicited by external threats.Lastly,both lPBNNK1R and elPBN neurons contribute to chemical irritant-induced nocifensive reactions.Our results reveal the functional organization of parabrachial substrates that drive distinct behavioral outcomes in response to sustained pain versus external danger under physiological conditions.展开更多
With the development of tourism at home and abroad,Rapeseed(Brassica napus)has become an important ornamental plant.However,its ornamental value at the inflorescence stage is greatly reduced by Sclerotinia sclerotioru...With the development of tourism at home and abroad,Rapeseed(Brassica napus)has become an important ornamental plant.However,its ornamental value at the inflorescence stage is greatly reduced by Sclerotinia sclerotiorum.Identification of important genes in the defense responses is critical for molecular breeding,which is an important strategy for controlling the disease.In this study,we isolated a B.napus WRKY transcription factor gene,BnaWRKY75.BnaWRKY75 was found to encode a nucleus-localized protein and exhibited relatively high expression in the stems.Arabidopsis thaliana transgenic plants expressing BnaWRKY75 showed enhanced resistance to S.sclerotiorum,and both ProBnaWRKY75:GUS and gene expression analyses showed that BnaWRKY75 was highly responsive to S.sclerotiorum infection,indicating the involvement of BnaWRKY75 in response to this infection.Furthermore,overexpression(OE)of BnaWRKY75 in B.napus significantly enhanced the resistance to S.sclerotiorum,whereas the resistance was reduced in RNAi transgenic B.napus plants.Moreover,the BnaWRKY75-OE B.napus plants exhibited constitutive activation of salicylic acid-,jasmonic acid-,and ethylene-mediated defense responses and the inhibition of both H_(2)O_(2)and O_(2)·^(-)accumulation in response to this pathogen.By contrast,BnaWRKY75-RNAi plants showed a reverse pattern,suggesting that BnaWRKY75 is involved in hormonal signaling pathways and in the control of reactive oxygen species accumulation.In conclusion,these data indicate that BnaWRKY75,a regulator of multiple defense responses,positively regulates resistance against S.sclerotiorum,which may guide the improvement of resistance in rapeseed.展开更多
This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance system...This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live ...During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live in disaster-prone areas.The objective of this article is to present a chronological review of the principal policies and programmes at the national,state,and municipal levels,with an emphasis on their key actions aimed at mitigating the impact of disasters related to natural hazards,particularly landslides.Our analysis was based on official records of public policies from the national,state,and municipal governments.The results show that several initiatives were initially developed at the local and regional level.However,it was not until the late 1980s that a comprehensive organisation of civil protection at the national level emerged as a response measure.It is possible to highlight three phases(understanding,coexistence,and prevention)of institutional action focused on risk management in the face of disasters.Despite the growing knowledge of risk scenarios,disasters continue to occur in Brazil on an annual basis,revealing several obstacles to reducing their impact,particularly given the social and economic disparities between Brazilian regions and the applicability of public policies that must overcome the limitations of each municipality.展开更多
The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through a...The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense.展开更多
Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global supe...Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global superpest that mostly damages rice crops.Yeast-like symbionts(YLS)exist in the abdominal fat body tissue and are tightly associated with the development,growth,and reproduction of BPH.Our previous research demonstrated that mating behavior promotes the release of YLS from the fat body into the hemolymph in the BPH,thereby triggering an immune response.Additionally,the fitness costs related to life-history traits of BPH(such as survival rate)have a strong dependence on the relative abundance of YLS.However,the possible relationship between reproduction and the immune response in BPH has not been identified.In this study,an omics-based approach was used to analyze the transcriptome of fat body tissues in mated and unmated BPH at 72 h post-eclosion,from which two antimicrobial peptide genes,NlDefensin A(NlDfA)and NlDefensin B(NlDfB),were selected since they were highly expressed in mated BPH.Subsequently,the full-length cDNA sequences of the NlDfA and NlDfB genes were cloned and analyzed.qPCR results showed up-regulation of the NlDfA and NlDfB genes in mated BPH when compared to unmated BPH.Spatial-temporal expression analysis indicated that the NlDfA and NlDfB genes were expressed in all tissues and developmental stages,and they were most highly expressed in the fat body at 24 h post-eclosion.Moreover,the symbionts in BPH were significantly inhibited by the in vitro expression of the NlDfA and NlDfB proteins.Furthermore,RNA interference(RNAi)-mediated suppression of NlDfA and NlDfB dramatically increased the relative abundance of YLS in the fat body,while YLS in the hemolymph decreased significantly.These BPHs also displayed some fitness disadvantages in survival,fecundity,hatchability,and possibly the vertical transmission of YLS from hemolymph to egg.Our results indicated that mating could heighten the immunity of BPH by upregulating the expression of the NlDfA and NlDfB genes,which protect the host from pathogen challenges during reproduction.However,the reduced content of YLS may act as a fitness disadvantage in dictating the life-history traits of BPH.This work has significant theoretical and practical implications for the precise green control technology that involves crucial gene targeting,as well as for the“endosymbionts for pest control”strategy in insects.展开更多
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ...The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.展开更多
The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture wi...The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture with electrical dimensions of 0.12λ_(0)×0.22λ_(0)×0.01λ_(0)attains a vast bandwidth over 3.1-34.5 GHz Super High Frequency(SHF)frequency band at S_(11)≤-10 dB,peak gain of 7.14 dBi and proportionately homogeneous radiation pattern.The fractional bandwidth(%BW)acquired is 168%that envelopes diversified frequency spectrum inclusive of X band specifically targeted to all kinds of defense and military operations.The proposed antenna can be worn on a soldier's uniform and hence the Specific Absorption Rate simulation is accomplished.The Peak SAR Value over 1 g of tissue is 1.48 W/kg and for 10 g of tissue is 0.27 W/kg well under the safety standards.The flexibility is proven by analyzing the full electromagnetic simulations for various bending conditions.Time response analysis is attained with its Fidelity Factor and Group Delay.Communication excellence is determined using Link Budget Analysis and it is seen that margin at 100 Mbps is 62 m and at 200 Mbps is 59 m.Prototype is fabricated along with experimental validation.All the results show harmony in shaping the antenna to provide critical situational awareness and data sharing capabilities required in defense beacon technology for location identification.展开更多
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ...Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.展开更多
Animals deploy diverse color-based defenses against predators,including crypsis,mimicry,aposematism,and masquerade.While crypsis,mimicry,aposematism have been extensively studied,the strategy of masquerade-where organ...Animals deploy diverse color-based defenses against predators,including crypsis,mimicry,aposematism,and masquerade.While crypsis,mimicry,aposematism have been extensively studied,the strategy of masquerade-where organisms imitate inedible or inanimate objects such as leaves,twigs,stones,and bird droppings-remains comparatively underexplored,particularly in adult butterflies.The Indian oakleaf butterfly(Kallima inachus)exemplifies this phenomenon,with its wings resembling dead leaves,providing a classic example of natural selection.Although it has long been postulated that these butterflies evade predation by being misidentified as dead leaves,direct experimental evidence is lacking.In the current study,using domestic chicks as predators,we manipulated their prior experience with dead leaves(model objects)while maintaining constant exposure to butterflies to test whether dead-leaf masquerade provides a protective advantage by preventing recognition.Results showed a marked delay in the initiation of attacks by chicks familiar with dead leaves compared to those with no prior exposure or those exposed to visually altered leaves.Chicks with prior dead-leaf experience required a similar amount of time to attack the butterflies as they did to attack dead leaves.These findings provide the first empirical demonstration of dead-leaf masquerade in Kallima butterflies,shedding light on its evolutionary significance.Our study highlights the effectiveness of masquerade in inducing the misclassification of butterflies as inanimate objects,showcasing the precise mimicry achieved by these organisms when viewed in isolation from the model objects.This study advances our understanding of the evolution of masquerade and its role as a potent antipredator strategy in nature.展开更多
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vu...Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in three dimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot’s movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for.展开更多
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning o...The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.展开更多
In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body wa...In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body walls. In this study,based on transcriptome data, a chorismate mutase gene of Radopholus similis(RsCM) was identified and cloned,which is a single copy gene specifically expressed in the oesophageal gland and highly expressed in juveniles and females. Transient expression of RsCM in tobacco leaves showed that it was localised in the cytoplasm and nucleus of tobacco leaf cells, which inhibited the pattern-triggered immunity(PTI) induced by flg22, including callose deposition and defence gene expression, and cell death induced by immune elicitors BAX, but could not inhibit cell death induced by immune elicitors Gpa2/RBP-1. The RNA interference(RNAi) transgenic tomato of RsCM obviously inhibited the infection, pathogenicity, and reproduction of R. similis. However, the resistance of the overexpression transgenic tomato of RsCM to R. similis infection was significantly reduced, and the expression levels of two salicylic acid(SA) pathway genes(PR1 and PR5) in roots infected by the nematode were significantly down-regulated,which indicated that RsCM might be involved in the inhibition of SA pathway. The results of this study demonstrate that RsCM suppresses the host immune system and might be a new target for the control of R. similis, which also provides new data for the function and mechanism of CM genes of migratory parasitic plant nematodes.展开更多
文摘The goal of this study was to investigate the behaviour of rainbow trout(n=30),Oncorhynchus mykiss,in small raceways when either self-feeders(T2) or hand-feeding(t2) were used.The method of food delivery in T2 was defensible while that of t2 was indefensible.Fish in both raceways were subjected to restricted feeding(RF) for 25 days.Food was available in the morning(09:00-10:00) in the downstream area and in the afternoon(16:00-17:00) in the upstream area of the raceways.The results showed that the behaviour of rainbow trout was significantly different under interference competition(T2) for food compared with that under scramble competition(t2).RF in T2 fish limited food availability to meal times when feeding rewards were available while t2 fish only responded to the location of food delivery.The aggressive fish in T2 were dominant,and t2 fish at high densities showed intense social interactions under the indefensible pattern of food distribution;these interactions did not dampen to a minimum level to suppress the development of dominance hierarchies.Further,the stocking density did not break down the dominance hierarchies between the T2 fish.This suggests that decreased efficiency in the search for food or inefficient foraging,induced by interference competition at high densities,affected the behaviour of rainbow trout.
基金supported by the National Natural Science Foundation of China(No.51778123).
文摘This study aims to investigate the defensible character of the Lahore railway station built in response to"the war of independenee in 1857,"which greatly impacted the location and design of the building.This study demonstrates the in tegral role played by the railway station in the development of the new colonial city,which the British wants to be defensive in every aspect.Railways were introduced in Pakistan(India)soon after their inauguration in Britain.Beginning from the mode of transportation,the multifaced contribution of railways toward the urban growth,new architectural style,mode of construction,and technology cannot be recanted.The research is based on the documentation and analysis of the history of Lahore railway station design.First,this study uses primary and secondary data to offer a history of the Lahore railway station from its inception to final execution.Second,it explores the criteria adopted by the British for its site selection to make the station a defensible post.The research finding in eludes the visual features that enhanced the architectural character of the building.Qualitative methods are used including several other approaches,namely,literature review,archival data collection,analysis of photographs,and study of architectural drawings and old maps,to achieve the objectives.
基金supported by Systematic Major Project of Shuohuang Railway Development Co.,Ltd.,National Energy Group(Grant Number:SHTL-23-31)Beijing Natural Science Foundation(U22B2027).
文摘In the realm of Intelligent Railway Transportation Systems,effective multi-party collaboration is crucial due to concerns over privacy and data silos.Vertical Federated Learning(VFL)has emerged as a promising approach to facilitate such collaboration,allowing diverse entities to collectively enhance machine learning models without the need to share sensitive training data.However,existing works have highlighted VFL’s susceptibility to privacy inference attacks,where an honest but curious server could potentially reconstruct a client’s raw data from embeddings uploaded by the client.This vulnerability poses a significant threat to VFL-based intelligent railway transportation systems.In this paper,we introduce SensFL,a novel privacy-enhancing method to against privacy inference attacks in VFL.Specifically,SensFL integrates regularization of the sensitivity of embeddings to the original data into the model training process,effectively limiting the information contained in shared embeddings.By reducing the sensitivity of embeddings to the original data,SensFL can effectively resist reverse privacy attacks and prevent the reconstruction of the original data from the embeddings.Extensive experiments were conducted on four distinct datasets and three different models to demonstrate the efficacy of SensFL.Experiment results show that SensFL can effectively mitigate privacy inference attacks while maintaining the accuracy of the primary learning task.These results underscore SensFL’s potential to advance privacy protection technologies within VFL-based intelligent railway systems,addressing critical security concerns in collaborative learning environments.
基金supported by the National Natural Science Foundation of China,No.82174112(to PZ)Science and Technology Project of Haihe Laboratory of Modern Chinese Medicine,No.22HHZYSS00015(to PZ)State-Sponsored Postdoctoral Researcher Program,No.GZC20231925(to LN)。
文摘Traumatic brain injury is a prevalent disorder of the central nervous system.In addition to primary brain parenchymal damage,the enduring biological consequences of traumatic brain injury pose long-term risks for patients with traumatic brain injury;however,the underlying pathogenesis remains unclear,and effective intervention methods are lacking.Intestinal dysfunction is a significant consequence of traumatic brain injury.Being the most densely innervated peripheral tissue in the body,the gut possesses multiple pathways for the establishment of a bidirectional“brain-gut axis”with the central nervous system.The gut harbors a vast microbial community,and alterations of the gut niche contribute to the progression of traumatic brain injury and its unfavorable prognosis through neuronal,hormonal,and immune pathways.A comprehensive understanding of microbiota-mediated peripheral neuroimmunomodulation mechanisms is needed to enhance treatment strategies for traumatic brain injury and its associated complications.We comprehensively reviewed alterations in the gut microecological environment following traumatic brain injury,with a specific focus on the complex biological processes of peripheral nerves,immunity,and microbes triggered by traumatic brain injury,encompassing autonomic dysfunction,neuroendocrine disturbances,peripheral immunosuppression,increased intestinal barrier permeability,compromised responses of sensory nerves to microorganisms,and potential effector nuclei in the central nervous system influenced by gut microbiota.Additionally,we reviewed the mechanisms underlying secondary biological injury and the dynamic pathological responses that occur following injury to enhance our current understanding of how peripheral pathways impact the outcome of patients with traumatic brain injury.This review aimed to propose a conceptual model for future risk assessment of central nervous system-related diseases while elucidating novel insights into the bidirectional effects of the“brain-gut-microbiota axis.”
基金financed by the National Key Research and Development Program,China(Grant Nos.2022YFE0113400 and 2022YFD1500402)National Natural Science Foundation of China(Grant No.32001466)+3 种基金Scientific and Technological Innovation Fund of Carbon Emissions Peak and Neutrality of Jiangsu Provincial Department of Science and Technology,China(Grant Nos.BE2022304 and BE2022305)Joints Funds of the National Natural Science Foundation of China(Grant No.U20A2022)Postdoctoral Research Foundation of China(Grant No.2020M671628)the Priority Academic Program Development of Jiangsu Higher Education Institutions,China.
文摘Simultaneous stresses of salinity and drought often coincide during rice-growing seasons in saline lands,primarily due to insufficient water resources and inadequate irrigation facilities.Consequently,combined salinity-drought stress poses a major threat to rice production.In this study,two salinity levels(NS,non-salinity;HS,high salinity)along with three drought treatments(CC,control condition;DJ,drought stress imposed at jointing;DH,drought stress imposed at heading)were performed to investigate their combined influences on leaf photosynthetic characteristics,biomass accumulation,and rice yield formation.Salinity,drought,and their combination led to a shortened growth period from heading to maturity,resulting in a reduced overall growth duration.Grain yield was reduced under both salinity and drought stress,with a more substantial reduction under the combined salinity-drought stress.The combined stress imposed at heading caused greater yield losses in rice compared with the stress imposed at jointing.Additionally,the combined salinity-drought stress induced greater decreases in shoot biomass accumulation from heading to maturity,as well as in shoot biomass and nonstructural carbohydrate(NSC)content in the stem at heading and maturity.However,it increased the harvest index and NSC remobilization reserve.Salinity and drought reduced the leaf area index and SPAD value of flag leaves and weakened the leaf photosynthetic characteristics as indicated by lower photosynthetic rates,transpiration rates,and stomatal conductance.These reductions were more pronounced under the combined stress.Salinity,drought,and especially their combination,decreased the activities of ascorbate peroxidase,catalase,and superoxide dismutase,while increasing the contents of malondialdehyde,hydrogen peroxide,and superoxide radical.Our results indicated a more significant yield loss in rice when subjected to combined salinity-drought stress.The individual and combined stresses of salinity and drought diminished antioxidant enzyme activities,inhibited leaf photosynthetic functions,accelerated leaf senescence,and subsequently lowered assimilate accumulation and grain yield.
基金funded by the National Natural Science Foundation of China (Nos. 31970427 and 32270526 to WL)。
文摘The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality.
基金supported by the Shenzhen Key Laboratory of Drug Addiction (ZDSYS20190902093601675)CAS Key Laboratory of Brain Connectome and Manipulation (2019DP173024)+2 种基金National Natural Science Foundation of China (82274358)Shenzhen-Hong Kong Institute of Brain ScienceGuangdong Basic and Applied Basic Research Foundation (2023B1515040009)
文摘Painful stimuli elicit first-line reflexive defensive reactions and,in many cases,also evoke second-line recuperative behaviors,the latter of which reflects the sensing of tissue damage and the alleviation of suffering.The lateral parabrachial nucleus(lPBN),composed of external-(elPBN),dorsal-(dlPBN),and central/superior-subnuclei(jointly referred to as slPBN),receives sensory inputs from spinal projection neurons and plays important roles in processing affective information from external threats and body integrity disruption.However,the organizational rules of lPBN neurons that provoke diverse behaviors in response to different painful stimuli from cutaneous and deep tissues remain unclear.In this study,we used region-specific neuronal depletion or silencing approaches combined with a battery of behavioral assays to show that slPBN neurons expressing substance P receptor(NK1R)(lPBNNK1R)are crucial for driving pain-associated self-care behaviors evoked by sustained noxious thermal and mechanical stimuli applied to skin or bone/muscle,while elPBN neurons are dispensable for driving such reactions.Notably,lPBNNK1R neurons are specifically required for forming sustained somatic pain-induced negative teaching signals and aversive memory but are not necessary for fear-learning or escape behaviors elicited by external threats.Lastly,both lPBNNK1R and elPBN neurons contribute to chemical irritant-induced nocifensive reactions.Our results reveal the functional organization of parabrachial substrates that drive distinct behavioral outcomes in response to sustained pain versus external danger under physiological conditions.
基金supported by the National Natural Science Foundation of China(Grant No.31771836)the National Key Research and Development Program of China(Grant No.2018YFD0201003).
文摘With the development of tourism at home and abroad,Rapeseed(Brassica napus)has become an important ornamental plant.However,its ornamental value at the inflorescence stage is greatly reduced by Sclerotinia sclerotiorum.Identification of important genes in the defense responses is critical for molecular breeding,which is an important strategy for controlling the disease.In this study,we isolated a B.napus WRKY transcription factor gene,BnaWRKY75.BnaWRKY75 was found to encode a nucleus-localized protein and exhibited relatively high expression in the stems.Arabidopsis thaliana transgenic plants expressing BnaWRKY75 showed enhanced resistance to S.sclerotiorum,and both ProBnaWRKY75:GUS and gene expression analyses showed that BnaWRKY75 was highly responsive to S.sclerotiorum infection,indicating the involvement of BnaWRKY75 in response to this infection.Furthermore,overexpression(OE)of BnaWRKY75 in B.napus significantly enhanced the resistance to S.sclerotiorum,whereas the resistance was reduced in RNAi transgenic B.napus plants.Moreover,the BnaWRKY75-OE B.napus plants exhibited constitutive activation of salicylic acid-,jasmonic acid-,and ethylene-mediated defense responses and the inhibition of both H_(2)O_(2)and O_(2)·^(-)accumulation in response to this pathogen.By contrast,BnaWRKY75-RNAi plants showed a reverse pattern,suggesting that BnaWRKY75 is involved in hormonal signaling pathways and in the control of reactive oxygen species accumulation.In conclusion,these data indicate that BnaWRKY75,a regulator of multiple defense responses,positively regulates resistance against S.sclerotiorum,which may guide the improvement of resistance in rapeseed.
基金the National Natural Science Foundation of China(Grant No.12072090).
文摘This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by the National Council for Scientific and Technological Development(Grant No.310709/2020-2 and 409314/2023-4)the São Paulo Research Foundation(Grant No.2022/13591-6 and 2021/04621-6).
文摘During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live in disaster-prone areas.The objective of this article is to present a chronological review of the principal policies and programmes at the national,state,and municipal levels,with an emphasis on their key actions aimed at mitigating the impact of disasters related to natural hazards,particularly landslides.Our analysis was based on official records of public policies from the national,state,and municipal governments.The results show that several initiatives were initially developed at the local and regional level.However,it was not until the late 1980s that a comprehensive organisation of civil protection at the national level emerged as a response measure.It is possible to highlight three phases(understanding,coexistence,and prevention)of institutional action focused on risk management in the face of disasters.Despite the growing knowledge of risk scenarios,disasters continue to occur in Brazil on an annual basis,revealing several obstacles to reducing their impact,particularly given the social and economic disparities between Brazilian regions and the applicability of public policies that must overcome the limitations of each municipality.
基金the generous support from the Deanship of Research-Jordan University of Science and Technology,IrbidJordan(Grant number 318/2021)。
文摘The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense.
基金supported by the National Natural Science Foundation of China(U21A20223 and 32302354)the Zhejiang Provincial Programs for Science and Technology Development,China(2022C02047).
文摘Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global superpest that mostly damages rice crops.Yeast-like symbionts(YLS)exist in the abdominal fat body tissue and are tightly associated with the development,growth,and reproduction of BPH.Our previous research demonstrated that mating behavior promotes the release of YLS from the fat body into the hemolymph in the BPH,thereby triggering an immune response.Additionally,the fitness costs related to life-history traits of BPH(such as survival rate)have a strong dependence on the relative abundance of YLS.However,the possible relationship between reproduction and the immune response in BPH has not been identified.In this study,an omics-based approach was used to analyze the transcriptome of fat body tissues in mated and unmated BPH at 72 h post-eclosion,from which two antimicrobial peptide genes,NlDefensin A(NlDfA)and NlDefensin B(NlDfB),were selected since they were highly expressed in mated BPH.Subsequently,the full-length cDNA sequences of the NlDfA and NlDfB genes were cloned and analyzed.qPCR results showed up-regulation of the NlDfA and NlDfB genes in mated BPH when compared to unmated BPH.Spatial-temporal expression analysis indicated that the NlDfA and NlDfB genes were expressed in all tissues and developmental stages,and they were most highly expressed in the fat body at 24 h post-eclosion.Moreover,the symbionts in BPH were significantly inhibited by the in vitro expression of the NlDfA and NlDfB proteins.Furthermore,RNA interference(RNAi)-mediated suppression of NlDfA and NlDfB dramatically increased the relative abundance of YLS in the fat body,while YLS in the hemolymph decreased significantly.These BPHs also displayed some fitness disadvantages in survival,fecundity,hatchability,and possibly the vertical transmission of YLS from hemolymph to egg.Our results indicated that mating could heighten the immunity of BPH by upregulating the expression of the NlDfA and NlDfB genes,which protect the host from pathogen challenges during reproduction.However,the reduced content of YLS may act as a fitness disadvantage in dictating the life-history traits of BPH.This work has significant theoretical and practical implications for the precise green control technology that involves crucial gene targeting,as well as for the“endosymbionts for pest control”strategy in insects.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62172377,61872205]the Shandong Provincial Natural Science Foundation[grant number ZR2019MF018]the Startup Research Foundation for Distinguished Scholars No.202112016.
文摘The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
基金the Defense Institute of Advanced Technology,Pune(DIAT,Pune)IIT Delhi。
文摘The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture with electrical dimensions of 0.12λ_(0)×0.22λ_(0)×0.01λ_(0)attains a vast bandwidth over 3.1-34.5 GHz Super High Frequency(SHF)frequency band at S_(11)≤-10 dB,peak gain of 7.14 dBi and proportionately homogeneous radiation pattern.The fractional bandwidth(%BW)acquired is 168%that envelopes diversified frequency spectrum inclusive of X band specifically targeted to all kinds of defense and military operations.The proposed antenna can be worn on a soldier's uniform and hence the Specific Absorption Rate simulation is accomplished.The Peak SAR Value over 1 g of tissue is 1.48 W/kg and for 10 g of tissue is 0.27 W/kg well under the safety standards.The flexibility is proven by analyzing the full electromagnetic simulations for various bending conditions.Time response analysis is attained with its Fidelity Factor and Group Delay.Communication excellence is determined using Link Budget Analysis and it is seen that margin at 100 Mbps is 62 m and at 200 Mbps is 59 m.Prototype is fabricated along with experimental validation.All the results show harmony in shaping the antenna to provide critical situational awareness and data sharing capabilities required in defense beacon technology for location identification.
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China under Grant No.61521003the National Natural Science Foundation of China under Grant No.62072467 and 62002383.
文摘Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.
基金supported by the National Natural Science Foundation of China(32270531,32370530)Singapore Ministry of Education AcRF Tier 1 Grants(A-0008615-00,A-8001085-00-00)。
文摘Animals deploy diverse color-based defenses against predators,including crypsis,mimicry,aposematism,and masquerade.While crypsis,mimicry,aposematism have been extensively studied,the strategy of masquerade-where organisms imitate inedible or inanimate objects such as leaves,twigs,stones,and bird droppings-remains comparatively underexplored,particularly in adult butterflies.The Indian oakleaf butterfly(Kallima inachus)exemplifies this phenomenon,with its wings resembling dead leaves,providing a classic example of natural selection.Although it has long been postulated that these butterflies evade predation by being misidentified as dead leaves,direct experimental evidence is lacking.In the current study,using domestic chicks as predators,we manipulated their prior experience with dead leaves(model objects)while maintaining constant exposure to butterflies to test whether dead-leaf masquerade provides a protective advantage by preventing recognition.Results showed a marked delay in the initiation of attacks by chicks familiar with dead leaves compared to those with no prior exposure or those exposed to visually altered leaves.Chicks with prior dead-leaf experience required a similar amount of time to attack the butterflies as they did to attack dead leaves.These findings provide the first empirical demonstration of dead-leaf masquerade in Kallima butterflies,shedding light on its evolutionary significance.Our study highlights the effectiveness of masquerade in inducing the misclassification of butterflies as inanimate objects,showcasing the precise mimicry achieved by these organisms when viewed in isolation from the model objects.This study advances our understanding of the evolution of masquerade and its role as a potent antipredator strategy in nature.
基金Science and Technology Innovation 2030 Program(2018AAA0101605).
文摘Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in three dimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot’s movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for.
基金supported by Systematic Major Project of China State Railway Group Corporation Limited(Grant Number:P2023W002).
文摘The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.
基金funded by the Guangdong Basic and Applied Basic Research Foundation,China(2021A1515011273)he National Natural Science Foundation of China(31071665)。
文摘In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body walls. In this study,based on transcriptome data, a chorismate mutase gene of Radopholus similis(RsCM) was identified and cloned,which is a single copy gene specifically expressed in the oesophageal gland and highly expressed in juveniles and females. Transient expression of RsCM in tobacco leaves showed that it was localised in the cytoplasm and nucleus of tobacco leaf cells, which inhibited the pattern-triggered immunity(PTI) induced by flg22, including callose deposition and defence gene expression, and cell death induced by immune elicitors BAX, but could not inhibit cell death induced by immune elicitors Gpa2/RBP-1. The RNA interference(RNAi) transgenic tomato of RsCM obviously inhibited the infection, pathogenicity, and reproduction of R. similis. However, the resistance of the overexpression transgenic tomato of RsCM to R. similis infection was significantly reduced, and the expression levels of two salicylic acid(SA) pathway genes(PR1 and PR5) in roots infected by the nematode were significantly down-regulated,which indicated that RsCM might be involved in the inhibition of SA pathway. The results of this study demonstrate that RsCM suppresses the host immune system and might be a new target for the control of R. similis, which also provides new data for the function and mechanism of CM genes of migratory parasitic plant nematodes.