期刊文献+
共找到326,759篇文章
< 1 2 250 >
每页显示 20 50 100
Resilient Time-Varying Formation-Tracking of Multi-UAV Systems Against Composite Attacks: A Two-Layered Framework 被引量:2
1
作者 Xin Gong Michael V.Basin +2 位作者 Zhiguang Feng Tingwen Huang Yukang Cui 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期969-984,共16页
This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of... This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of-services(DoS)attacks,false-data injection attacks,camouflage attacks,and actuation attacks(AAs).Inspired by the concept of digital twin,a new two-layered protocol equipped with a safe and private twin layer(TL)is proposed,which decouples the above problems into the defense scheme against DoS attacks on the TL and the defense scheme against AAs on the cyber-physical layer.First,a topologyrepairing strategy against frequency-constrained DoS attacks is implemented via a Zeno-free event-triggered estimation scheme,which saves communication resources considerably.The upper bound of the reaction time needed to launch the repaired topology after the occurrence of DoS attacks is calculated.Second,a decentralized adaptive and chattering-relief controller against potentially unbounded AAs is designed.Moreover,this novel adaptive controller can achieve uniformly ultimately bounded convergence,whose error bound can be given explicitly.The practicability and validity of this new two-layered protocol are shown via a simulation example and a UAV swarm experiment equipped with both Ultra-WideBand and WiFi communication channels. 展开更多
关键词 Composite attacks multi-UAV systems resilient control time-varying formation-tracking
下载PDF
4种植物源性成分多重real-time PCR检测方法的建立及其在食用淀粉中的应用
2
作者 范维 高晓月 +4 位作者 董雨馨 刘虹宇 李贺楠 赵文涛 郭文萍 《食品科学》 EI CAS CSCD 北大核心 2024年第1期210-216,共7页
建立一种可同时快速检测红薯、木薯、马铃薯、玉米源性成分的多重实时聚合酶链式反应(real-time polymerase chain reaction,real-time PCR)方法。分别以红薯g3pdh基因、木薯g3pdh基因、马铃薯UGPase基因、玉米zSSIIb基因为靶基因设计... 建立一种可同时快速检测红薯、木薯、马铃薯、玉米源性成分的多重实时聚合酶链式反应(real-time polymerase chain reaction,real-time PCR)方法。分别以红薯g3pdh基因、木薯g3pdh基因、马铃薯UGPase基因、玉米zSSIIb基因为靶基因设计特异性引物和TaqMan探针,以18S rRNA基因为内参基因,建立多重real-time PCR方法,开展方法学验证,并对不同掺入比例模拟样品和实际淀粉样品进行检测。结果显示,该方法具有高通量、特异性强、灵敏度高等优点。与15种非目标源性均无交叉反应;对目标DNA的检测灵敏度可达到3×10^(-3) ng/μL,且具有良好的线性关系和扩增效率;对淀粉样品的检出限可达0.1%,对50份实际样品进行检测,结果与参比方法一致,说明建立的多重real-time PCR法可用于食用淀粉种类掺假鉴别检测。 展开更多
关键词 多重实时聚合酶链式反应 食用淀粉 木薯 红薯 马铃薯 玉米
下载PDF
TimeGAN-Informer长时机场能见度预测
3
作者 马愈昭 张宇航 王凌飞 《安全与环境学报》 CAS CSCD 北大核心 2024年第7期2517-2527,共11页
能见度的预测对机场的业务决策、保障飞机的安全起降具有重要的意义。针对现有能见度预测模型预测时间较短的问题,提出一种基于TimeGAN Informer(Time Generative Adversarial Network-Informer)的机场能见度预测方法。利用2018—2022... 能见度的预测对机场的业务决策、保障飞机的安全起降具有重要的意义。针对现有能见度预测模型预测时间较短的问题,提出一种基于TimeGAN Informer(Time Generative Adversarial Network-Informer)的机场能见度预测方法。利用2018—2022年气象和污染物数据,通过相关系数法和递归特征消除法提取出能见度的主要影响因素,使用TimeGAN时间序列生成对抗网络对数据进行扩充,并将Informer长时间序列预测模型应用于能见度预测。结果显示:当预测步长为1 d、2 d、3 d时,TimeGAN Informer的绝对误差(Mean Absolute Error,MAE)分别为2.42、3.13、3.57,比Informer分别降低了0.29、0.27、0.28,比长短时记忆网络(Long Short-Term Memory,LSTM)分别降低了0.28、0.49、0.63;均方根误差(Root Mean Square Error,RMSE)分别为3.03、3.7、4.09,比Informer分别降低了0.38、0.22、0.24,比长短时记忆网络(LSTM)分别降低了0.3、0.5、1.04;百分误差小于30%的分别占测试样本集的78.07%、70.68%、63.84%。尽管随着步长的增加预测效果变差,但在预测步长为3 d时,多数样本的预测误差仍小于30%,实现了对机场区域较为准确的长时能见度预测。 展开更多
关键词 安全工程 能见度预报 数据扩充 INFORMER 时间序列
下载PDF
基于TimeGAN数据增强的复杂过程故障分类方法
4
作者 杨磊 何鹏举 丑幸幸 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2024年第9期1768-1780,共13页
针对传统基于重构的故障分类方法在故障样本稀疏或失衡情况下效果不佳、故障子空间区分能力弱的问题,提出基于TimeGAN数据增强的复杂过程故障分类方法.针对小子样故障,使用TimeGAN对历史故障数据进行数据增强,生成与历史数据分布相似的... 针对传统基于重构的故障分类方法在故障样本稀疏或失衡情况下效果不佳、故障子空间区分能力弱的问题,提出基于TimeGAN数据增强的复杂过程故障分类方法.针对小子样故障,使用TimeGAN对历史故障数据进行数据增强,生成与历史数据分布相似的虚拟故障样本;采用马氏距离评估虚拟样本的质量,剔除不可信样本,构造平衡的故障样本集.将故障样本映射到高维核空间,并在核空间中提取故障子空间.设计故障分类策略并定义4种故障分类性能评估指标以定量衡量算法的分类性能.Tennessee Eastman应用结果表明,所提数据增强方法可以有效扩充故障样本,进而提高故障重构率.与WGAN-GP和SMOTE方法进行对比,发现基于TimeGAN数据增强的故障分类方法具有更好的分类性能. 展开更多
关键词 故障分类 样本不平衡 数据增强 故障子空间 时间序列生成对抗网络
下载PDF
Brain Time Stack图像融合技术在CT中的应用
5
作者 史佩佩 张磊 +1 位作者 王芬 吴婷 《中外医学研究》 2024年第17期61-66,共6页
目的:分析Brain Time Stack图像融合技术在CT中的应用。方法:选取2021年3月—2022年9月衡水市第四人民医院收治的50例CT检查患者作为研究对象。所有患者进行CT检查并进行Brain Time Stack后处理。比较四组不同部位CT值、标准差(SD)、信... 目的:分析Brain Time Stack图像融合技术在CT中的应用。方法:选取2021年3月—2022年9月衡水市第四人民医院收治的50例CT检查患者作为研究对象。所有患者进行CT检查并进行Brain Time Stack后处理。比较四组不同部位CT值、标准差(SD)、信噪比(SNR)。比较四组图像主观质量评分。分析不同部位CT值、SD、SNR与图像主观质量评分的相关性。结果:B组的延髓、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉CT值明显低于A组;C组的延髓、脑室、额叶白质、小脑内侧、小脑外侧、颞肌肌肉CT值高于A组;D组延髓、额叶灰质、颞肌肌肉CT值明显低于A组,脑室、额叶白质、小脑外侧CT值明显高于A组;C组延髓、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉CT值明显高于B组;D组延髓、脑室、额叶白质、小脑内侧、小脑外侧、颞肌肌肉CT值明显高于B组;D组延髓、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉CT值明显低于C组;D组脑室CT值明显高于C组,差异有统计学意义(P<0.05)。B组、C组、D组延髓、脑室、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉SD值明显低于A组;C组延髓、脑室、额叶白质、小脑内侧、小脑外侧、颞肌肌肉SD值均明显高于B组;C组额叶灰质SD明显低于B组;D组延髓、脑室、额叶灰质、额叶白质、小脑内侧、小脑外侧、肌肉SD均明显低于B组、C组,差异有统计学意义(P<0.05)。B组、C组、D组延髓、脑室、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉SNR均明显高于A组;C组、D组延髓、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉SNR值明显高于B组;C组、D组脑室SNR明显低于B组;D组延髓、脑室、额叶灰质、额叶白质、小脑内侧、小脑外侧、颞肌肌肉SNR明显高于C组,差异有统计学意义(P<0.05)。D组图像主观质量评分最高,差异有统计学意义(P<0.05)。延髓、脑室、额叶灰质、额叶白质、小脑内侧、小脑外侧及颞肌肌肉SD与主观质量评分呈明显负相关,SNR与主观质量评分间呈明显正相关,差异有统计学意义(P<0.05)。结论:利用Brain Time Stack图像融合技术对头部CT扫描检查图像处理,动脉期结合前一期及后一期的图像数据在处理后具有更好的质量和更少的噪音。 展开更多
关键词 Brain time Stack 图像融合 头部CT 检查 扫描质量
下载PDF
Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems
6
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 SCIE EI 2023年第9期3189-3218,共30页
Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a n... Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a new non-linear generalized model to describe Cyber-Physical Systems.This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and randomeffects in the physical and computationalworlds.Besides,the digitalization stage in hardware devices is represented too.Attackers and most critical sparse sensor attacks are described through a stochastic process.The reconstruction and protectionmechanisms are based on aweighted stochasticmodel.Error probability in data samples is estimated through different indicators commonly employed in non-linear dynamics(such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.An experimental validation based on simulation tools and real deployments is also carried out.Both,the new technology performance and scalability are studied.Results prove that the proposed solution protects Cyber-Physical Systems against up to 92%of attacks and perturbations,with a computational delay below 2.5 s.The proposed model shows a linear complexity,as recursive or iterative structures are not employed,just algebraic and probabilistic functions.In conclusion,the new model and reconstructionmechanism can protect successfully Cyber-Physical Systems against sparse sensor attacks,even in dense or pervasive deployments and scenarios. 展开更多
关键词 Cyber-physical systems sparse sensor attack non-linear models stochastic models security
下载PDF
Association of daily sitting time and leisure-time physical activity with body fat among U.S.adults 被引量:1
7
作者 Jingwen Liao Min Hu +4 位作者 Kellie Imm Clifton J.Holmes Jie Zhu Chao Cao Lin Yang 《Journal of Sport and Health Science》 SCIE CAS CSCD 2024年第2期195-203,共9页
Background:Prolonged sitting and reduced physical activity lead to low energy expenditures.However,little is known about the joint impact of daily sitting time and physical activity on body fat distribution.We investi... Background:Prolonged sitting and reduced physical activity lead to low energy expenditures.However,little is known about the joint impact of daily sitting time and physical activity on body fat distribution.We investigated the independent and joint associations of daily sitting time and physical activity with body fat among adults.Methods:This was a cross-sectional analysis of U.S.nationally representative data from the National Health and Nutrition Examination Survey2011-2018 among adults aged 20 years or older.Daily sitting time and leisure-time physical activity(LTPA)were self-reported using the Global Physical Activity Questionnaire.Body fat(total and trunk fat percentage)was determined via dual X-ray absorptiometry.Results:Among 10,808 adults,about 54.6%spent 6 h/day or more sitting;more than one-half reported no LTPA(inactive)or less than 150 min/week LTPA(insufficiently active)with only 43.3%reported 150 min/week or more LTPA(active)in the past week.After fully adjusting for sociodemographic data,lifestyle behaviors,and chronic conditions,prolonged sitting time and low levels of LTPA were associated with higher total and trunk fat percentages in both sexes.When stratifying by LTPA,the association between daily sitting time and body fat appeared to be stronger in those who were inactive/insuufficiently active.In the joint analyses,inactive/insuufficiently active adults who reported sitting more than 8 h/day had the highest total(female:3.99%(95%confidence interval(95%CI):3.09%-4.88%);male:3.79%(95%CI:2.75%-4.82%))and trunk body fat percentages(female:4.21%(95%CI:3.09%-5.32%);male:4.07%(95%CI:2.95%-5.19%))when compared with those who were active and sitting less than 4 h/day.Conclusion:Prolonged daily sitting time was associated with increased body fat among U.S.adults.The higher body fat associated with 6 h/day sitting may not be offset by achieving recommended levels of physical activity. 展开更多
关键词 ADULTS Body fat distribution Physical activity Sitting time
下载PDF
Prescribed Performance Tracking Control of Time-Delay Nonlinear Systems With Output Constraints 被引量:1
8
作者 Jin-Xi Zhang Kai-Di Xu Qing-Guo Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1557-1565,共9页
The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requ... The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requirements, i.e., boundedness and the local Lipschitz condition, are assumed for the allowable time delays. Moreover, we focus on the case where the reference is unknown beforehand, which renders the standard prescribed performance control designs under output constraints infeasible. To conquer these challenges, a novel robust prescribed performance control approach is put forward in this paper.Herein, a reverse tuning function is skillfully constructed and automatically generates a performance envelop for the tracking error. In addition, a unified performance analysis framework based on proof by contradiction and the barrier function is established to reveal the inherent robustness of the control system against the time delays. It turns out that the system output tracks the reference with a preassigned settling time and good accuracy,without constraint violations. A comparative simulation on a two-stage chemical reactor is carried out to illustrate the above theoretical findings. 展开更多
关键词 Nonlinear systems output constraints prescribed performance reference tracking time delays
下载PDF
Real-time Rescue Target Detection Based on UAV Imagery for Flood Emergency Response 被引量:1
9
作者 ZHAO Bofei SUI Haigang +2 位作者 ZHU Yihao LIU Chang WANG Wentao 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期74-89,共16页
Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including hig... Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including high-resolution imagery and exceptional mobility,making them well suited for monitoring flood extent and identifying rescue targets during floods.However,there are some challenges in interpreting rescue information in real time from flood images captured by UAVs,such as the complexity of the scenarios of UAV images,the lack of flood rescue target detection datasets and the limited real-time processing capabilities of the airborne on-board platform.Thus,we propose a real-time rescue target detection method for UAVs that is capable of efficiently delineating flood extent and identifying rescue targets(i.e.,pedestrians and vehicles trapped by floods).The proposed method achieves real-time rescue information extraction for UAV platforms by lightweight processing and fusion of flood extent extraction model and target detection model.The flood inundation range is extracted by the proposed method in real time and detects targets such as people and vehicles to be rescued based on this layer.Our experimental results demonstrate that the Intersection over Union(IoU)for flood water extraction reaches an impressive 80%,and the IoU for real-time flood water extraction stands at a commendable 76.4%.The information on flood stricken targets extracted by this method in real time can be used for flood emergency rescue. 展开更多
关键词 UAV flood extraction target rescue detection real time
下载PDF
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
10
作者 S.Padmapriya R.Shankar +3 位作者 R.Thiagarajan N.Partheeban A.Daniel S.Arun 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期491-505,共15页
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t... The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio. 展开更多
关键词 Mobile ad-hoc network(MANET) wireless ad hoc network ADOV attackS denial of service
下载PDF
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
11
作者 Shahad Alzahrani Hatim Alsuwat Emad Alsuwat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1635-1654,共20页
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables.However,the reliability and integrity of learned Bayesian network models are highly dependent ... Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables.However,the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams.One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks,wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance.In this research paper,we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms.Our framework utilizes latent variables to quantify the amount of belief between every two nodes in each causal model over time.We use our innovative methodology to tackle an important issue with data poisoning assaults in the context of Bayesian networks.With regard to four different forms of data poisoning attacks,we specifically aim to strengthen the security and dependability of Bayesian network structure learning techniques,such as the PC algorithm.By doing this,we explore the complexity of this area and offer workablemethods for identifying and reducing these sneaky dangers.Additionally,our research investigates one particular use case,the“Visit to Asia Network.”The practical consequences of using uncertainty as a way to spot cases of data poisoning are explored in this inquiry,which is of utmost relevance.Our results demonstrate the promising efficacy of latent variables in detecting and mitigating the threat of data poisoning attacks.Additionally,our proposed latent-based framework proves to be sensitive in detecting malicious data poisoning attacks in the context of stream data. 展开更多
关键词 Bayesian networks data poisoning attacks latent variables structure learning algorithms adversarial attacks
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
12
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Novel cyber-physical collaborative detection and localization method against dynamic load altering attacks in smart energy grids
13
作者 Xinyu Wang Xiangjie Wang +2 位作者 Xiaoyuan Luo Xinping Guan Shuzheng Wang 《Global Energy Interconnection》 EI CSCD 2024年第3期362-376,共15页
Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical a... Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs. 展开更多
关键词 Smart energy grids Cyber-physical system Dynamic load altering attacks attack prediction Detection and localization
下载PDF
General multi-attack detection for continuous-variable quantum key distribution with local local oscillator
14
作者 康茁 刘维琪 +1 位作者 齐锦 贺晨 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期255-262,共8页
Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main ... Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main attack modes referred to as reference pulse attack and polarization attack presently.However,there is currently no general defense strategy against such attacks,and the security of the system needs further investigation.Here,we employ a deep learning framework called generative adversarial networks(GANs)to detect both attacks.We first analyze the data in different cases,derive a feature vector as input to a GAN model,and then show the training and testing process of the GAN model for attack classification.The proposed model has two parts,a discriminator and a generator,both of which employ a convolutional neural network(CNN)to improve accuracy.Simulation results show that the proposed scheme can detect and classify attacks without reducing the secret key rate and the maximum transmission distance.It only establishes a detection model by monitoring features of the pulse without adding additional devices. 展开更多
关键词 CVQKD generative adversarial network attack classification
下载PDF
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
15
作者 Chengsheng Yuan Baojie Cui +2 位作者 Zhili Zhou Xinting Li Qingming Jonathan Wu 《Computers, Materials & Continua》 SCIE EI 2024年第1期899-914,共16页
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint de... In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint detection(DFFD)models are not resistant to attacks by adversarial examples,which are generated by the introduction of subtle perturbations in the fingerprint image,allowing the model to make fake judgments.Most of the existing adversarial example generation methods are based on gradient optimization,which is easy to fall into local optimal,resulting in poor transferability of adversarial attacks.In addition,the perturbation added to the blank area of the fingerprint image is easily perceived by the human eye,leading to poor visual quality.In response to the above challenges,this paper proposes a novel adversarial attack method based on local adaptive gradient variance for DFFD.The ridge texture area within the fingerprint image has been identified and designated as the region for perturbation generation.Subsequently,the images are fed into the targeted white-box model,and the gradient direction is optimized to compute gradient variance.Additionally,an adaptive parameter search method is proposed using stochastic gradient ascent to explore the parameter values during adversarial example generation,aiming to maximize adversarial attack performance.Experimental results on two publicly available fingerprint datasets show that ourmethod achieves higher attack transferability and robustness than existing methods,and the perturbation is harder to perceive. 展开更多
关键词 FLD adversarial attacks adversarial examples gradient optimization transferability
下载PDF
ATSSC:An Attack Tolerant System in Serverless Computing
16
作者 Zhang Shuai Guo Yunfei +2 位作者 Hu Hongchao Liu Wenyan Wang Yawen 《China Communications》 SCIE CSCD 2024年第6期192-205,共14页
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ... Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs. 展开更多
关键词 active defense attack tolerant cloud computing SECURITY serverless computing
下载PDF
RPL-Based IoT Networks under Decreased Rank Attack:Performance Analysis in Static and Mobile Environments
17
作者 Amal Hkiri Mouna Karmani +3 位作者 Omar Ben Bahri Ahmed Mohammed Murayr Fawaz Hassan Alasmari Mohsen Machhout 《Computers, Materials & Continua》 SCIE EI 2024年第1期227-247,共21页
The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks r... The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks remains a concern.This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static andmobilenetwork environments.We employ the Random Direction Mobility Model(RDM)for mobile scenarios within the Cooja simulator.Our systematic evaluation focuses on critical performance metrics,including Packet Delivery Ratio(PDR),Average End to End Delay(AE2ED),throughput,Expected Transmission Count(ETX),and Average Power Consumption(APC).Our findings illuminate the disruptive impact of this attack on the routing hierarchy,resulting in decreased PDR and throughput,increased AE2ED,ETX,and APC.These results underscore the urgent need for robust security measures to protect RPL-based IoT networks.Furthermore,our study emphasizes the exacerbated impact of the attack in mobile scenarios,highlighting the evolving security requirements of IoT networks. 展开更多
关键词 RPL decreased rank attacks MOBILITY random direction model
下载PDF
Distributed Platooning Control of Automated Vehicles Subject to Replay Attacks Based on Proportional Integral
18
作者 Meiling Xie Derui Ding +3 位作者 Xiaohua Ge Qing-Long Han Hongli Dong Yan Song 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1954-1966,共13页
Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issu... Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy. 展开更多
关键词 Automated vehicles platooning control proportional-integral-observers(PIOs) replay attacks time-DELAYS
下载PDF
K-core attack, equilibrium K-core,and kinetically constrained spin system
19
作者 周海军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期14-26,共13页
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi... Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions. 展开更多
关键词 Fredrickson–Andersen model K-core attack spin glass jamming
下载PDF
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
20
作者 Abdulatif Alabdulatif Mada Alharbi +1 位作者 Abir Mchergui Tarek Moulahi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期2005-2021,共17页
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno... The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks. 展开更多
关键词 Blockchain data privacy machine learning routing attacks smart contract VANET
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部