期刊文献+
共找到55篇文章
< 1 2 3 >
每页显示 20 50 100
Distributed Platooning Control of Automated Vehicles Subject to Replay Attacks Based on Proportional Integral
1
作者 Meiling Xie Derui Ding +3 位作者 Xiaohua Ge Qing-Long Han Hongli Dong Yan Song 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1954-1966,共13页
Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issu... Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy. 展开更多
关键词 Automated vehicles platooning control proportional-integral-observers(PIOs) replay attacks TIME-DELAYS
下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
2
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Sampled-data control through model-free reinforcement learning with effective experience replay 被引量:2
3
作者 Bo Xiao H.K.Lam +4 位作者 Xiaojie Su Ziwei Wang Frank P.-W.Lo Shihong Chen Eric Yeatman 《Journal of Automation and Intelligence》 2023年第1期20-30,共11页
Reinforcement Learning(RL)based control algorithms can learn the control strategies for nonlinear and uncertain environment during interacting with it.Guided by the rewards generated by environment,a RL agent can lear... Reinforcement Learning(RL)based control algorithms can learn the control strategies for nonlinear and uncertain environment during interacting with it.Guided by the rewards generated by environment,a RL agent can learn the control strategy directly in a model-free way instead of investigating the dynamic model of the environment.In the paper,we propose the sampled-data RL control strategy to reduce the computational demand.In the sampled-data control strategy,the whole control system is of a hybrid structure,in which the plant is of continuous structure while the controller(RL agent)adopts a discrete structure.Given that the continuous states of the plant will be the input of the agent,the state–action value function is approximated by the fully connected feed-forward neural networks(FCFFNN).Instead of learning the controller at every step during the interaction with the environment,the learning and acting stages are decoupled to learn the control strategy more effectively through experience replay.In the acting stage,the most effective experience obtained during the interaction with the environment will be stored and during the learning stage,the stored experience will be replayed to customized times,which helps enhance the experience replay process.The effectiveness of proposed approach will be verified by simulation examples. 展开更多
关键词 Reinforcement learning Neural networks Sampled-data control MODEL-FREE Effective experience replay
下载PDF
浅谈Multiple Replay自由视角在体育赛事上的应用
4
作者 梁均浩 《现代电视技术》 2023年第11期93-97,共5页
在视频直播制作过程中,为达到更好的视觉效果,360°快速动、静态“时间凝结”的画面会让视觉效果更为丰富。本文通过自由视角环绕拍摄的应用实例介绍自由视角拍摄系统。通过视频帧采集、帧对齐、多机位帧画面矫正、动画效果渲染等... 在视频直播制作过程中,为达到更好的视觉效果,360°快速动、静态“时间凝结”的画面会让视觉效果更为丰富。本文通过自由视角环绕拍摄的应用实例介绍自由视角拍摄系统。通过视频帧采集、帧对齐、多机位帧画面矫正、动画效果渲染等处理技术,来实现多台摄像机中获取的画面在空间上和时间上的一致性,从而解决360°视频画面在视角切换时的平滑效果问题,满足自由视角在直播中的应用。 展开更多
关键词 360°视频画面 Multiple replay 自由视角 多机位拍摄
下载PDF
Path Planning for Intelligent Robots Based on Deep Q-learning With Experience Replay and Heuristic Knowledge 被引量:16
5
作者 Lan Jiang Hongyun Huang Zuohua Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1179-1189,共11页
Path planning and obstacle avoidance are two challenging problems in the study of intelligent robots. In this paper, we develop a new method to alleviate these problems based on deep Q-learning with experience replay ... Path planning and obstacle avoidance are two challenging problems in the study of intelligent robots. In this paper, we develop a new method to alleviate these problems based on deep Q-learning with experience replay and heuristic knowledge. In this method, a neural network has been used to resolve the "curse of dimensionality" issue of the Q-table in reinforcement learning. When a robot is walking in an unknown environment, it collects experience data which is used for training a neural network;such a process is called experience replay.Heuristic knowledge helps the robot avoid blind exploration and provides more effective data for training the neural network. The simulation results show that in comparison with the existing methods, our method can converge to an optimal action strategy with less time and can explore a path in an unknown environment with fewer steps and larger average reward. 展开更多
关键词 Deep Q-learning(DQL) experience replay(ER) heuristic knowledge(HK) path planning
下载PDF
Resilience Against Replay Attacks:A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems 被引量:5
6
作者 Giuseppe Franzè Francesco Tedesco Domenico Famularo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第3期628-640,共13页
In this paper,a resilient distributed control scheme against replay attacks for multi-agent networked systems subject to input and state constraints is proposed.The methodological starting point relies on a smart use ... In this paper,a resilient distributed control scheme against replay attacks for multi-agent networked systems subject to input and state constraints is proposed.The methodological starting point relies on a smart use of predictive arguments with a twofold aim:1)Promptly detect malicious agent behaviors affecting normal system operations;2)Apply specific control actions,based on predictive ideas,for mitigating as much as possible undesirable domino effects resulting from adversary operations.Specifically,the multi-agent system is topologically described by a leader-follower digraph characterized by a unique leader and set-theoretic receding horizon control ideas are exploited to develop a distributed algorithm capable to instantaneously recognize the attacked agent.Finally,numerical simulations are carried out to show benefits and effectiveness of the proposed approach. 展开更多
关键词 Distributed model predictive control leader-follower networks multi-agent systems replay attacks resilient control
下载PDF
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs 被引量:1
7
作者 Aziz Baayer Nourddine Enneya Mohammed Elkoutbi 《Journal of Information Security》 2012年第3期224-230,共7页
Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anyt... Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. In this paper, we propose an enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer. 展开更多
关键词 MANET replay Attack DENIAL-OF-SERVICE (DoS) 802.11 MAC Layer Network Allocation Vector (NAV) Security Countermeasure
下载PDF
A Zonotopic-Based Watermarking Design to Detect Replay Attacks
8
作者 Carlos Trapiello Vicenc Puig 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第11期1924-1938,共15页
This paper suggests the use of zonotopes for the design of watermark signals.The proposed approach exploits the recent analogy found between stochastic and zonotopic-based estimators to propose a deterministic counter... This paper suggests the use of zonotopes for the design of watermark signals.The proposed approach exploits the recent analogy found between stochastic and zonotopic-based estimators to propose a deterministic counterpart to current approaches that study the replay attack in the context of stationary Gaussian processes.In this regard,the zonotopic analogous case where the control loop is closed based on the estimates of a zonotopic Kalman filter(ZKF)is analyzed.This formulation allows to propose a new performance metric that is related to the Frobenius norm of the prediction zonotope.Hence,the steadystate operation of the system can be related with the size of the minimal Robust Positive Invariant set of the estimation error.Furthermore,analogous expressions concerning the impact that a zonotopic/Gaussian watermark signal has on the system operation are derived.Finally,a novel zonotopically bounded watermark signal that ensures the attack detection by causing the residual vector to exit the healthy residual set during the replay phase of the attack is introduced.The proposed approach is illustrated in simulation using a quadruple-tank process. 展开更多
关键词 Optimal control physical watermarking replay attack ZONOTOPES
下载PDF
Replay Attack and Defense of Electric Vehicle Charging on GB/T 27930-2015 Communication Protocol
9
作者 Yafei Li Yong Wang +1 位作者 Min Wu Haiming Li 《Journal of Computer and Communications》 2019年第12期20-30,共11页
The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast ... The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging. 展开更多
关键词 EV CHARGING GB/T 27930-2015 replay ATTACK RSA Digital SIGNATURE Adding Random NUMBERS
下载PDF
Help your customers replay their favourites, and they will help you profit from it
10
《ZTE Communications》 2006年第2期70-70,共1页
关键词 ZTE Help your customers replay their favourites WILL
下载PDF
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack
11
作者 Minmin Xie Yong Wang +2 位作者 Chunming Zou Yingjie Tian Naiwang Guo 《Journal of Computer and Communications》 2020年第11期88-101,共14页
Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers. However, the IEC 61850 protocol lacks an authentication security mechanism, which will make the... Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers. However, the IEC 61850 protocol lacks an authentication security mechanism, which will make the communication face four threats: eavesdropping, interception, forgery, and alteration. In order to verify the IEC 61850 protocol communication problems, we used the simulation software to build the main operating equipment in the IEC 61850 network environment of the communication system. We verified IEC 61850 transmission protocol security defects, under DoS attack and Reply attack. In order to enhance security agreement, an improved algorithm was proposed based on identity authentication (W-EAP, Whitelist Based ECC & AES Protocol). Experimental results showed that the method can enhance the ability to resist attacks. 展开更多
关键词 IEC 61850 DoS Attack replay Attack W-EAP Identity Authentication
下载PDF
Aspects of Replayability and Software Engineering: Towards a Methodology of Developing Games
12
作者 Joseph Krall Tim Menzies 《Journal of Software Engineering and Applications》 2012年第7期459-466,共8页
One application of software engineering is the vast and widely popular video game entertainment industry. Success of a video game product depends on how well the player base receives it. Of research towards understand... One application of software engineering is the vast and widely popular video game entertainment industry. Success of a video game product depends on how well the player base receives it. Of research towards understanding factors of success behind releasing a video game, we are interested in studying a factor known as Replayability. Towards a software engineering oriented game design methodology, we collect player opinions on Replayability via surveys and provide methods to analyze the data. We believe these results can help game designers to more successfully produce entertaining games with longer lasting appeal by utilizing our software engineering techniques. 展开更多
关键词 GAMES ENTERTAINMENT Design Software Engineering replayability
下载PDF
读者REPLAY点评
13
作者 兜子 《电子竞技》 2008年第2期4-8,共5页
这期我们邀请的点评嘉宾是来自Colorful战队的Wulin选手,做为2007年成长最快的新人之一,Wulin也逐渐成为中国魔兽界中最具实力的选手。Wulin:精灵族选手在对于战术的理解还不是很到位,首先对抗人族就一定要做到两点。第一点是要第一时... 这期我们邀请的点评嘉宾是来自Colorful战队的Wulin选手,做为2007年成长最快的新人之一,Wulin也逐渐成为中国魔兽界中最具实力的选手。Wulin:精灵族选手在对于战术的理解还不是很到位,首先对抗人族就一定要做到两点。第一点是要第一时间侦察对方有没有要速矿的打算.第二点是自己对与经济的扩张要及时。上来人族并没有出兵营,如果NE侦察到的话可以第一时间判断出对手可能会打非常规战术。而人族选手选择的是隐形炮手的战术,这个战术中期人族是基本不出门的,只能依靠一个大法师来骚扰,这样精灵至少要选择开出一片到两片矿来。而且整场比赛来看精灵并没对对手采取任何侦察。对方家里确实有很多塔,而且很多关键建筑可能建造的比较靠里。 展开更多
关键词 游戏时间 replay 专家点评 大法师
下载PDF
点评REPLAY
14
《电子竞技》 2006年第14期16-21,共6页
上期由于点评了《电子竞技》第一届读者WAR3大赛的四强Replay,所以很多给我们发来录像的朋友都没能看到自己的Replay被点评,对此,我们表示深深的歉意,并在本期杂志中将两个月发来的大家的Replay做精彩的点评.希望大家满意。这里要说的... 上期由于点评了《电子竞技》第一届读者WAR3大赛的四强Replay,所以很多给我们发来录像的朋友都没能看到自己的Replay被点评,对此,我们表示深深的歉意,并在本期杂志中将两个月发来的大家的Replay做精彩的点评.希望大家满意。这里要说的是.因为每天都有很多的朋友为我们发来Replay,有的朋友一次性就发了十几个甚至几十个。由于篇幅有限,我们无法对每一个Replay都做出详细的点评,甚至不能照顾到每一个给我们发送录像的朋友都能看到自己的录像被点评。我们也在考虑在不久的将来增加本栏目的版面。现阶段.对于大家的每一个Replay,小编和点评的高手嘉宾都是认真看过的,我们会挑选比较有代表性、大家经常犯的错误比较多的Replay来进行讲解,这点希望大能够理解.继续一如既往地支持我们的工作,为我们发来更多更好的Replay。有关录像点评的问题,大家可以更多地在QQ群和论坛(http://www.china-ea.net/bbs)中讨论,大家互相指正错误.互相提出建议,创造良好的研讨气氛,共同提高。我们也会在论坛的WAR3技术交流区开设专用的帖子供大家发录像,大家自己上传,自己点评,自己做主。闲言少叙,马上进入本期的Replay点评!这可是”积压”了两个月的录像啊……哦,对了,忘记介绍我们本期的点评嘉宾了。当当当当……他就是在8月上半月刊中做客《名人堂》 展开更多
关键词 电子竞技 NE replay 专家点评
下载PDF
星际replay点评
15
《电子竞技》 2008年第2期12-13,共2页
此时小编正踩着07年的尾巴写这一期的点评,而当读者看到这期点评时,时间已经是08年了。感谢一年来读者对《电子竞技》和点评栏目的支持。祝大家在新的一年里,万事顺利,学子学业有成,工作了的财运亨通,大家的星际越打越好,仍然能从这款... 此时小编正踩着07年的尾巴写这一期的点评,而当读者看到这期点评时,时间已经是08年了。感谢一年来读者对《电子竞技》和点评栏目的支持。祝大家在新的一年里,万事顺利,学子学业有成,工作了的财运亨通,大家的星际越打越好,仍然能从这款游戏得到十足的快乐。首先点评的是本杂志的热心读者,一位93年生的小弟弟的战报。感动一下,这么老的游戏,还能吸引这么年轻的玩家,说明了星际争霸的确是一款经典的游戏。 展开更多
关键词 电子竞技 replay 财运亨通 星际争霸
下载PDF
读者REPLAY点评
16
作者 兜子 白冰 《电子竞技》 2007年第23期2-4,共3页
这次Disable同学给编辑部发来了连续三场兽族在VS的录象,正好这期我们邀请到Bet.WHO这位韩国兽王来当老师,所以,顺水推舟,我们就让这个老兽王点评一下小兽王的录象咯。Who:这位兽族玩家的建筑属于外开内合布局风格,这样可以在二本时候... 这次Disable同学给编辑部发来了连续三场兽族在VS的录象,正好这期我们邀请到Bet.WHO这位韩国兽王来当老师,所以,顺水推舟,我们就让这个老兽王点评一下小兽王的录象咯。Who:这位兽族玩家的建筑属于外开内合布局风格,这样可以在二本时候保护好灵魂归宿和善栏等科技性建筑。前期的商店建造位置也是很有侵略性的,建造在精灵家一侧的商店有利于前期去抢练两点钟的商店或者直接打四点钟的主矿。 展开更多
关键词 replay 专家点评 游戏时间
下载PDF
星际replay点评
17
《电子竞技》 2008年第6期10-11,共2页
各位读者好。小编开始这期点评时,韩国星际界风云正起,15岁的少年flash短期内在重要赛事连胜三大神族anytime、bisu和stork,并夺得了GomTV大赛的冠军,对近年低迷的人族带来新的希望。今年的星际一定会很精彩,大家一定要继续关注星际,和... 各位读者好。小编开始这期点评时,韩国星际界风云正起,15岁的少年flash短期内在重要赛事连胜三大神族anytime、bisu和stork,并夺得了GomTV大赛的冠军,对近年低迷的人族带来新的希望。今年的星际一定会很精彩,大家一定要继续关注星际,和支持我们电子竞技的星际栏目啊。 展开更多
关键词 电子竞技 replay 职业选手
下载PDF
星际Replays点评
18
《电子竞技》 2008年第10期14-15,共2页
NO.1小编好,我对《电子竞技》一直都是非常的关注,上期给您发的Replay我用的是T.其实我是用Z的玩家,只是非常喜欢听TANK的轰鸣声,才玩TVT和TVP的,喜望小编再帮我点评一下我的这盘ZvT,我是那个YUL(?)88119925,再祝电子(?)技越办越好!
关键词 电子竞技 replays 阵地战 APM
下载PDF
魔兽replay点评
19
《电子竞技》 2008年第8期6-8,共3页
小编点评:ID为DUKANG_DK的玩家给我们寄来了一盘不死内战的REP,看完后的第一感觉.就是这位朋友需要多看看高手的REP了。你的不死内战路数有很多需要改进的。第一,你选择了死亡骑士开局,那就应该严格执行双线操作。死亡骑士去骚扰对方MF... 小编点评:ID为DUKANG_DK的玩家给我们寄来了一盘不死内战的REP,看完后的第一感觉.就是这位朋友需要多看看高手的REP了。你的不死内战路数有很多需要改进的。第一,你选择了死亡骑士开局,那就应该严格执行双线操作。死亡骑士去骚扰对方MF,而自己的食尸鬼则去MF一些怪点。而你的食尸鬼却没有进行双线。 展开更多
关键词 游戏时间 replay
下载PDF
Replay点评
20
《电子竞技》 2007年第Z2期8-13,共6页
大家最喜欢的录像点评栏目又来了,由于制作新年特刊,我们的发行周期在1、2月间进行了调整,我们的1、2月下半月刊也合二为一。所以本期的录像点评让大家足足多等了半个多月的时间,不过我们也增加了2页篇幅,来为大家多点评几个录像。本周... 大家最喜欢的录像点评栏目又来了,由于制作新年特刊,我们的发行周期在1、2月间进行了调整,我们的1、2月下半月刊也合二为一。所以本期的录像点评让大家足足多等了半个多月的时间,不过我们也增加了2页篇幅,来为大家多点评几个录像。本周对于魔兽迷来说最重大的事情莫过于新版本1.21的推出,这个版本让我们盼星星盼月亮地等了1年多了,才千呼万唤始出来。版本改动给游戏究竟带来了怎样的影响,哪个种族在本次的版本改动中获利,这并不是我们在这里要讨论的重点,有兴趣的朋友可以关注我们3月上半月刊有关这个事件的选题。量近也有很多朋友在QQ群中询问小编有关版本改动的具体细节问题,其实只要在网上搜索一下就可以知道了。但是小编还是特意把1.21的具体改动详细地列出来,方便大家查阅。 展开更多
关键词 电子竞技 replay
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部