Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in...Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.展开更多
In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users,this paper takes microblog as the research object to study the detection of privacy disclosure ...In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users,this paper takes microblog as the research object to study the detection of privacy disclosure in social networks.First,we perform fast privacy leak detection on the currently published text based on the fastText model.In the case that the text to be published contains certain private information,we fully consider the aggregation effect of the private information leaked by different channels,and establish a convolution neural network model based on multi-dimensional features(MF-CNN)to detect privacy disclosure comprehensively and accurately.The experimental results show that the proposed method has a higher accuracy of privacy disclosure detection and can meet the real-time requirements of detection.展开更多
针对无线传感网络WSNs(Wireless Sensor Networks)的定位问题,提出基于TDOA(Time Different of Arrival)测距模型的SOCP(Second order cone programming)和Taylor混合定位方案,记为SOCP+Taylor。SOCP+Taylor方案首先分析了网络可定位性...针对无线传感网络WSNs(Wireless Sensor Networks)的定位问题,提出基于TDOA(Time Different of Arrival)测距模型的SOCP(Second order cone programming)和Taylor混合定位方案,记为SOCP+Taylor。SOCP+Taylor方案首先分析了网络可定位性,并结合刚论(rigid),提出了评判节点可定位的条件。然后,建立TDOA测距模型,并用最大似然估计建立距离测量值的最大似然函数,再通过松弛约束理论将非凸优问题转换成凸优问题,引入惩罚因子,进而利用SOCP估计节点位置,并将此节点位置作为泰勒级数展开法Taylor迭代的初始值,最后,利用Taylor估计节点的最终位置。在不同参考节点数目以及变化的噪声环境下对算法进行仿真。仿真结果表明,提出的定位方案具有高的定位精度,定位误差逼近于CRLB,同时分析了惩罚因子对定位精度的影响,并确定了惩罚因子的最佳取值区域。展开更多
Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHS...Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHSAS is developed for national backbone network,large network operators,large enterprises and other large-scale network.This paper describes its architecture and key technologies:Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis,Knowledge Representation and Management of Super Large-Scale Network Security,Multi-Level,Multi-Granularity and Multi-Dimensional Network Security Index Construction Method,Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology,and so on.The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction.The system meets the demands of analysis and prediction for large-scale network security situation.展开更多
针对飞行器纵向模型的不确定性参数和随机干扰,研究了一类飞行器航迹倾角的自适应跟踪控制问题。在控制器设计过程中,将多维泰勒网(multidimensional Taylor network,MTN)的逼近特性和自适应backstepping方法相结合,利用MTN网络逼近未...针对飞行器纵向模型的不确定性参数和随机干扰,研究了一类飞行器航迹倾角的自适应跟踪控制问题。在控制器设计过程中,将多维泰勒网(multidimensional Taylor network,MTN)的逼近特性和自适应backstepping方法相结合,利用MTN网络逼近未知光滑非线性函数,提出了一种新的自适应MTN控制方法。通过Lyapunov稳定性理论证明了闭环系统的所有信号依概率有界,跟踪误差收敛到原点附近任意小的邻域。仿真结果表明,该方法能够在简化控制器设计的同时保证飞行器航迹倾角跟踪上预定轨迹。展开更多
Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring ...Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring your own device(BYOD). It is observed that advanced targeted cyber-attacks usually follow a cyber kill chain;for instance, advanced targeted attacks often rely on network scanning techniques to gather information about potential targets. In response to this attack method, we propose a novel approach, i.e., an "isolating and dynamic"cyber defense, which cuts these potential chains to reduce the cumulative availability of the gathered information.First, we build a zero-trust network environment through network isolation, and then multiple network properties are maneuvered so that the host characteristics and locations needed to identify vulnerabilities cannot be located.Second, we propose a software-defined proactive cyber defense solution(SPD) for enterprise networks and design a general framework to strategically maneuver the IP address, network port, domain name, and path, while limiting the performance impact on the benign network user. Third, we implement our SPD proof-of-concept system over a software-defined network controller(OpenDaylight). Finally, we build an experimental platform to verify the system's ability to prevent scanning, eavesdropping, and denial-of-service attacks. The results suggest that our system can significantly reduce the availability of network reconnaissance scan information, block network eavesdropping, and sharply increase the cost of cyber-attacks.展开更多
文摘Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.
基金This work was supported by the National Natural Science Foundation of China(No.61672101)the Beijing Key Laboratory of Internet Culture and Digital Dissemination Research(ICDDXN004)Key Lab of Information Network Security,Ministry of Public Security,China(No.C18601).
文摘In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users,this paper takes microblog as the research object to study the detection of privacy disclosure in social networks.First,we perform fast privacy leak detection on the currently published text based on the fastText model.In the case that the text to be published contains certain private information,we fully consider the aggregation effect of the private information leaked by different channels,and establish a convolution neural network model based on multi-dimensional features(MF-CNN)to detect privacy disclosure comprehensively and accurately.The experimental results show that the proposed method has a higher accuracy of privacy disclosure detection and can meet the real-time requirements of detection.
文摘针对无线传感网络WSNs(Wireless Sensor Networks)的定位问题,提出基于TDOA(Time Different of Arrival)测距模型的SOCP(Second order cone programming)和Taylor混合定位方案,记为SOCP+Taylor。SOCP+Taylor方案首先分析了网络可定位性,并结合刚论(rigid),提出了评判节点可定位的条件。然后,建立TDOA测距模型,并用最大似然估计建立距离测量值的最大似然函数,再通过松弛约束理论将非凸优问题转换成凸优问题,引入惩罚因子,进而利用SOCP估计节点位置,并将此节点位置作为泰勒级数展开法Taylor迭代的初始值,最后,利用Taylor估计节点的最终位置。在不同参考节点数目以及变化的噪声环境下对算法进行仿真。仿真结果表明,提出的定位方案具有高的定位精度,定位误差逼近于CRLB,同时分析了惩罚因子对定位精度的影响,并确定了惩罚因子的最佳取值区域。
基金This work is funded by the National Natural Science Foundation of China under Grant U1636215the National key research and development plan under Grant Nos.2018YFB0803504,2016YFB0800303.
文摘Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHSAS is developed for national backbone network,large network operators,large enterprises and other large-scale network.This paper describes its architecture and key technologies:Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis,Knowledge Representation and Management of Super Large-Scale Network Security,Multi-Level,Multi-Granularity and Multi-Dimensional Network Security Index Construction Method,Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology,and so on.The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction.The system meets the demands of analysis and prediction for large-scale network security situation.
文摘针对飞行器纵向模型的不确定性参数和随机干扰,研究了一类飞行器航迹倾角的自适应跟踪控制问题。在控制器设计过程中,将多维泰勒网(multidimensional Taylor network,MTN)的逼近特性和自适应backstepping方法相结合,利用MTN网络逼近未知光滑非线性函数,提出了一种新的自适应MTN控制方法。通过Lyapunov稳定性理论证明了闭环系统的所有信号依概率有界,跟踪误差收敛到原点附近任意小的邻域。仿真结果表明,该方法能够在简化控制器设计的同时保证飞行器航迹倾角跟踪上预定轨迹。
基金Project supported by the Information Engineering University Emerging Direction Cultivation Fund,China(No.2016610708)the Science and Technology Research Project of Henan,China(No.172102210615)+1 种基金the National Natural Science Foundation of China(Nos.61521003 and 61602509)the National Key Research and Development Program of China(Nos.2016YFB0800100 and 2016YFB0800101)
文摘Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring your own device(BYOD). It is observed that advanced targeted cyber-attacks usually follow a cyber kill chain;for instance, advanced targeted attacks often rely on network scanning techniques to gather information about potential targets. In response to this attack method, we propose a novel approach, i.e., an "isolating and dynamic"cyber defense, which cuts these potential chains to reduce the cumulative availability of the gathered information.First, we build a zero-trust network environment through network isolation, and then multiple network properties are maneuvered so that the host characteristics and locations needed to identify vulnerabilities cannot be located.Second, we propose a software-defined proactive cyber defense solution(SPD) for enterprise networks and design a general framework to strategically maneuver the IP address, network port, domain name, and path, while limiting the performance impact on the benign network user. Third, we implement our SPD proof-of-concept system over a software-defined network controller(OpenDaylight). Finally, we build an experimental platform to verify the system's ability to prevent scanning, eavesdropping, and denial-of-service attacks. The results suggest that our system can significantly reduce the availability of network reconnaissance scan information, block network eavesdropping, and sharply increase the cost of cyber-attacks.