期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于AdvGAN的无线通信信号反侦察方法
1
作者 陈奕功 张江 +1 位作者 乔晓强 龙伟军 《国外电子测量技术》 2024年第5期1-8,共8页
深度学习技术凭借其强大的特征提取能力,在信号认知方面取得广泛应用,这对有保密需求的无线通信系统的保密性安全带来极大威胁。针对上述问题,提出一种基于对抗生成网络(generating adversarial examples with adversarial networks,Adv... 深度学习技术凭借其强大的特征提取能力,在信号认知方面取得广泛应用,这对有保密需求的无线通信系统的保密性安全带来极大威胁。针对上述问题,提出一种基于对抗生成网络(generating adversarial examples with adversarial networks,AdvGAN)的无线通信信号反侦察方法。首先实现两种不同的调制信号识别模型;再使用3种对抗样本生成方法构造伪装信号;最后叠加在原始信号上并在调制信号识别模型上进行测试。实验结果表明,所提方法能够使侦收方的智能调制识别模型的识别准确率大幅下降,在信噪比10 dB条件下,使侦收方未知模型识别准确率下降约66%,从而有效反制侦收方的智能识别模型。 展开更多
关键词 调制信号识别 深度学习 通信反侦察 信号伪装 生成对抗网络
下载PDF
多阶段信号博弈的装备保障信息网络主动防御 被引量:3
2
作者 王增光 卢昱 李玺 《火力与指挥控制》 CSCD 北大核心 2020年第12期142-148,共7页
为了解决装备保障信息网络的安全防御问题,从信号伪装的角度对装备保障信息网络的主动防御进行研究,设计了一种最优伪装信号选取方法。该方法基于多阶段信号博弈理论对装备保障信息网络攻防过程进行建模;在考虑信号伪装成本的基础上对... 为了解决装备保障信息网络的安全防御问题,从信号伪装的角度对装备保障信息网络的主动防御进行研究,设计了一种最优伪装信号选取方法。该方法基于多阶段信号博弈理论对装备保障信息网络攻防过程进行建模;在考虑信号伪装成本的基础上对攻防收益进行量化;给出了精炼贝叶斯均衡的求解方法,并设计了多阶段最优伪装信号选取算法。通过实验对该方法的合理性和有效性进行验证,并分析总结了装备保障信息网络安全防御的一般规律。 展开更多
关键词 装备保障信息网络 多阶段信号博弈 精炼贝叶斯均衡 最优伪装信号
下载PDF
基于信号博弈的网络主动防御研究
3
作者 王增光 卢昱 李玺 《火力与指挥控制》 CSCD 北大核心 2020年第8期119-124,共6页
针对现有被动防御方式难以有效确保军事信息网络安全的问题,从信号伪装的角度对军事信息网络的主动防御进行研究,提出了一种最优伪装信号选取方法。在分析军事信息网络攻防对抗的基础上,基于信号博弈理论对网络攻防过程进行建模;提出了... 针对现有被动防御方式难以有效确保军事信息网络安全的问题,从信号伪装的角度对军事信息网络的主动防御进行研究,提出了一种最优伪装信号选取方法。在分析军事信息网络攻防对抗的基础上,基于信号博弈理论对网络攻防过程进行建模;提出了网络攻防收益量化方法;在精炼贝叶斯纳什均衡分析的基础上,设计了最优伪装信号的选取算法。通过实验验证了方法的合理性和可行性,为军事信息网络安全防御提供了一种新的思路。 展开更多
关键词 军事信息网络 不完全信息 信号博弈 精炼贝叶斯纳什均衡 最优伪装信号
下载PDF
Mimicry and masquerade from the avian visual perspec-tive 被引量:2
4
作者 Mary Caswell STODDARD 《Current Zoology》 SCIE CAS CSCD 2012年第4期630-648,共19页
Several of the most celebrated examples of visual mimicry, like mimetic eggs laid by avian brood parasites and pala-table insects mimicking distasteful ones, involve signals directed at the eyes of birds. Despite this... Several of the most celebrated examples of visual mimicry, like mimetic eggs laid by avian brood parasites and pala-table insects mimicking distasteful ones, involve signals directed at the eyes of birds. Despite this, studies of mimicry from the avian visual perspective have been rare, particularly with regard to defensive mimicry and masquerade. Defensive visual mimicry, which includes Batesian and Mtillerian mimicry, occurs when organisms share a visual signal that functions to deter predators. Masquerade occurs when an organism mimics an inedible or uninteresting object, such as a leaf, stick, or pebble. In this paper, I present five case studies covering diverse examples of defensive mimicry and masquerade as seen by birds. The best-known cases of defensive visual mimicry typically come from insect prey, but birds themselves can exhibit defensive visual mimicry in an at- tempt to escape mobbing or dissuade avian predators. Using examples of defensive visual mimicry by both insects and birds, I show how quantitative models of avian color, luminance, and pattern vision can be used to enhance our understanding of mimicry in many systems and produce new hypotheses about the evolution and diversity of signals. Overall, I investigate examples of Batesian mimicry (1 and 2), Miillerian mimicry (3 and 4), and masquerade (5) as follows: 1) Polymorphic mimicry in African mocker swallowtail butterflies; 2) Cuckoos mimicking sparrowhawks; 3) Mimicry rings in Neotropical butterflies; 4) Plumage mimicry in toxic pitohuis; and 5) Dead leaf-mimicking butterflies and mantids. 展开更多
关键词 MIMICRY MASQUERADE Protective coloration Avian vision PATTERN LUMINANCE
原文传递
Evolutionary implications of deception in mimicry and masquerade 被引量:1
5
作者 Ximena J. NELSON 《Current Zoology》 SCIE CAS CSCD 2014年第1期6-15,共10页
Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the ... Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the receiver or through the lack of response of the receiver. Reviewing selected examples, I discuss some of the difficulties in ascribing a model for the mimic. I also discuss how a single animal can have multiple ploys in its armoury of deceptive signals, thus belonging within two or more categories of deceptive signalling. In addition to aggressive mimicry, these may include crypsis or camouflage, mas- querade (mimicry of inanimate objects), and Batesian or protective mimicry. Each of these examples of deception has multiple evolutionary pathways, and some deceptive signals may be more costly to receivers than others, but no single organism is subject to a single selection pressure, leading to the reality that many evolutionary pathways contribute to the diversity we see around us. New technologies are opening new channels of investigation into deceptive signaling in many different sensory modalities, and this is reflected in the recent increase in studies investigating the structure and function of deceptive signals. In turn, these studies are beginning to expose the fascinating complexity of deceptive signaling systems, allowing us to discover the myriad, non-mutually exclusive, solutions that can be selected for to obtain prey 展开更多
关键词 MIMICRY MASQUERADE CRYPSIS Deceptive communication Cleaner fish Pre-existing biases
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部