The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
Using the typical characteristics of multi-layered marine and continental transitional gas reservoirs as a basis,a model is developed to predict the related well production rate.This model relies on the fractal theory...Using the typical characteristics of multi-layered marine and continental transitional gas reservoirs as a basis,a model is developed to predict the related well production rate.This model relies on the fractal theory of tortuous capillary bundles and can take into account multiple gas flow mechanisms at the micrometer and nanometer scales,as well as the flow characteristics in different types of thin layers(tight sandstone gas,shale gas,and coalbed gas).Moreover,a source-sink function concept and a pressure drop superposition principle are utilized to introduce a coupled flow model in the reservoir.A semi-analytical solution for the production rate is obtained using a matrix iteration method.A specific well is selected for fitting dynamic production data,and the calculation results show that the tight sandstone has the highest gas production per unit thickness compared with the other types of reservoirs.Moreover,desorption and diffusion of coalbed gas and shale gas can significantly contribute to gas production,and the daily production of these two gases decreases rapidly with decreasing reservoir pressure.Interestingly,the gas production from fractures exhibits an approximately U-shaped distribution,indicating the need to optimize the spacing between clusters during hydraulic fracturing to reduce the area of overlapping fracture control.The coal matrix water saturation significantly affects the coalbed gas production,with higher water saturation leading to lower production.展开更多
A flexible extra broadband metamaterial absorber(MMA)stacked with five layers working at 2 GHz–40 GHz is investigated.Each layer is composed of polyvinyl chloride(PVC),polyimide(PI),and a frequency selective surface(...A flexible extra broadband metamaterial absorber(MMA)stacked with five layers working at 2 GHz–40 GHz is investigated.Each layer is composed of polyvinyl chloride(PVC),polyimide(PI),and a frequency selective surface(FSS),which is printed on PI using conductive ink.To investigate this absorber,both one-dimensional analogous circuit analysis and three-dimensional full-wave simulation based on a physical model are provided.Various crucial electromagnetic properties,such as absorption,effective impedance,complex permittivity and permeability,electric current distribution and magnetic field distribution at resonant peak points,are studied in detail.Analysis shows that the working frequency of this absorber covers entire S,C,X,Ku,K and Ka bands with a minimum thickness of 0.098λ_(max)(λ_(max) is the maximum wavelength in the absorption band),and the fractional bandwidth(FBW)reaches 181.1%.Moreover,the reflection coefficient is less than-10 dB at 1.998 GHz–40.056 GHz at normal incidence,and the absorptivity of the plane wave is greater than 80%when the incident angle is smaller than 50°.Furthermore,the proposed absorber is experimentally validated,and the experimental results show good agreement with the simulation results,which demonstrates the potential applicability of this absorber at 2 GHz–40 GHz.展开更多
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ...As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.展开更多
The polyurethane foam(PU)compressible layer is a viable solution to the problem of damage to the secondary lining in squeezing tunnels.Nevertheless,the mechanical behaviour of the multi-layer yielding supports has not...The polyurethane foam(PU)compressible layer is a viable solution to the problem of damage to the secondary lining in squeezing tunnels.Nevertheless,the mechanical behaviour of the multi-layer yielding supports has not been thoroughly investigated.To fill this gap,large-scale model tests were conducted in this study.The synergistic load-bearing mechanics were analyzed using the convergenceconfinement method.Two types of multi-layer yielding supports with different thicknesses(2.5 cm,3.75 cm and 5 cm)of PU compressible layers were investigated respectively.Digital image correlation(DIC)analysis and acoustic emission(AE)techniques were used for detecting the deformation fields and damage evolution of the multi-layer yielding supports in real-time.Results indicated that the loaddisplacement relationship of the multi-layer yielding supports could be divided into the crack initiation,crack propagation,strain-hardening,and failure stages.Compared with those of the stiff support,the toughness,deformability and ultimate load of the yielding supports were increased by an average of 225%,61%and 32%,respectively.Additionally,the PU compressible layer is positioned between two primary linings to allow the yielding support to have greater mechanical properties.The analysis of the synergistic bearing effect suggested that the thickness of PU compressible layer and its location significantly affect the mechanical properties of the yielding supports.The use of yielding supports with a compressible layer positioned between the primary and secondary linings is recommended to mitigate the effects of high geo-stress in squeezing tunnels.展开更多
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist...This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassificatio...Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training.展开更多
This article investigates the characteristics of shock wave overpressure generated by multi-layer composite charge under different detonation modes.Combining dimensional analysis and the explosion mechanism of the cha...This article investigates the characteristics of shock wave overpressure generated by multi-layer composite charge under different detonation modes.Combining dimensional analysis and the explosion mechanism of the charge,a peak overpressure prediction model for the composite charge under singlepoint detonation and simultaneous detonation was established.The effects of the charge structure and initiation method on the overpressure field characteristics were investigated in AUTODYN simulation.The accuracy of the prediction model and the reliability of the numerical simulation method were subsequently verified in a series of static explosion experiments.The results reveal that the mass of the inner charge was the key factor determining the peak overpressure of the composite charge under single-point detonation.The peak overpressure in the radial direction improved apparently with an increase in the aspect ratio of the charge.The overpressure curves in the axial direction exhibited a multi-peak phenomenon,and the secondary peak overpressure even exceeded the primary peak at distances of 30D and 40D(where D is the charge diameter).The difference in peak overpressure among azimuth angles of 0-90°gradually decreased with an increase in the propagation distance of the shock wave.The coupled effect of the detonation energy of the inner and outer charge under simultaneous detonation improved the overpressure in both radial and axial directions.The difference in peak overpressure obtained from model prediction and experimental measurements was less than 16.4%.展开更多
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model...In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.展开更多
Multi-layer sandstone reservoirs occur globally and are currently in international production. The 3D characteristics of these reservoirs are too complicated to be accurately delineated by general structural-facies-re...Multi-layer sandstone reservoirs occur globally and are currently in international production. The 3D characteristics of these reservoirs are too complicated to be accurately delineated by general structural-facies-reservoir modelling. In view of the special geological features, such as the vertical architecture of sandstone and mudstone interbeds, the lateral stable sedimentation and the strong heterogeneity of reservoir poroperm and fluid distribution, we developed a new three-stage and six-phase procedure for 3D characterization of multi-layer sandstone reservoirs. The procedure comprises two-phase structural modelling, two-phase facies modelling and modelling of two types of reservoir properties. Using this procedure, we established models of the formation structure, sand body structure and microfacies, reservoir facies and properties including porosity, permeability and gas saturation and provided a 3D fine-scale, systematic characterization of the Sebei multi-layer sandstone gas field, China. This new procedure, validated by the Sebei gas field, can be applied to characterize similar multi-layer sandstone reservoirs.展开更多
Explosive synchronization(ES)is a kind of first-order jump phenomenon that exists in physical and biological systems.In recent years,researchers have focused on ES between single-layer and multi-layer networks.Most re...Explosive synchronization(ES)is a kind of first-order jump phenomenon that exists in physical and biological systems.In recent years,researchers have focused on ES between single-layer and multi-layer networks.Most research on complex networks with delay has focused on single-layer or double-layer networks,multi-layer networks are seldom explored.In this paper,we propose a Kuramoto model of frequency weights in multi-layer complex networks with delay and star connections between layers.Through theoretical analysis and numerical verification,the factors affecting the backward critical coupling strength are analyzed.The results show that the interaction between layers and the average node degree has a direct effect on the backward critical coupling strength of each layer network.The location of the delay,the size of the delay,the number of network layers,the number of nodes,and the network topology are revealed to have no direct impact on the backward critical coupling strength of the network.Delay is introduced to explore the influence of delay and other related parameters on ES.展开更多
In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper c...In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper crust is actually a response to the plastic flow network in the lower lithosphere including the lower crust and lithospheric mantle. The existence of the unified plastic flow system confirms that the driving force for intraplate tectonic deformation results mainly from the compression of the India plate, while the long-range transmission of the force is carried out chiefly by means of plastic flow. The plastic flow network has a control over the intraplate tectonic deformation.展开更多
This paper introduces the construction of the multi-layered biaxial weft knitted fabric (MBWK fabric) and studies the locking angle of this kind of fabric. Moreover, a locking angle model of the MBWK fabric is estab...This paper introduces the construction of the multi-layered biaxial weft knitted fabric (MBWK fabric) and studies the locking angle of this kind of fabric. Moreover, a locking angle model of the MBWK fabric is established for the first time according to its unique construction. Two kinds of locking angles are considered under different restraint conditions: the locking angle θ1 controlled by the inserting yarns and the locking angle θ2 controlled by the stitch yarns. It is concluded that the ultimate value of the locking angle θ is the larger one of the two angles.展开更多
Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune s...Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics between the CASoSSWF and the BIS, and then designs the models of components and the architecture for a monitoring agent, a regulating agent, a killer agent, a pre-warning agent and a communicating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dynamic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CASoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship formation operation simulation system.展开更多
In this paper, the new model of the real gas filtration problem has been presented multi-layered gas reservoir, when a gas well output and wellbore storage may be variable, and have obtained the exact solutions of pre...In this paper, the new model of the real gas filtration problem has been presented multi-layered gas reservoir, when a gas well output and wellbore storage may be variable, and have obtained the exact solutions of pressure distribution for each reservoir bed under three kinds of typical out-boundary conditions. As a special case, according to the new model have also obtained the qxact solutions of presssure distribution in homogeneous reservoir and is given important application in gas reservoir development.展开更多
The large-scale population accumulation in modem cities has become one of their important characteristics. With the development of urbanization in the world, the large-scale gathering activities are increasing, and th...The large-scale population accumulation in modem cities has become one of their important characteristics. With the development of urbanization in the world, the large-scale gathering activities are increasing, and the accidents caused by them are also rising. At the same time, the evacuation of visitors is faced with severe challenges in the event of an emergency such as terrorist attacks. The main problem for tourists is how to evacuate quickly and safely in an emergency. The Louvre is one of the largest and most visited art museums in the world.Visitors are large and come from all over the world, the volume of passengers varies greatly, and the interior architecture design is complicated, etc. These characteristics challenge the design of evacuation paths. Based on the consideration of these factors, we should develop the optimal evacuation scheme and minimize the accident risk and evacuation cost.展开更多
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give...Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.展开更多
Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as dev...Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as developing a real one requires lots of manpower and resources. BMDS is a typical complex system for its nonlinear, adaptive and uncertainty characteristics. The agent-based modeling method is well suited for the complex system whose overall behaviors are determined by interactions among individual elements. A multi-agent decision support system (DSS), which includes missile agent, radar agent and command center agent, is established based on the studies of structure and function of BMDS. Considering the constraints brought by radar, intercept missile, offensive missile and commander, the objective function of DSS is established. In order to dynamically generate the optimal interception plan, the variable neighborhood negative selection particle swarm optimization (VNNSPSO) algorithm is proposed to support the decision making of DSS. The proposed algorithm is compared with the standard PSO, constriction factor PSO (CFPSO), inertia weight linear decrease PSO (LDPSO), variable neighborhood PSO (VNPSO) algorithm from the aspects of convergence rate, iteration number, average fitness value and standard deviation. The simulation results verify the efficiency of the proposed algorithm. The multi-agent DSS is developed through the Repast simulation platform and the constructed DSS can generate intercept plans automatically and support three-dimensional dynamic display of missile defense process.展开更多
Based on the static compression experiments, the compressive stress-strain curve of multi-layer corrugated boards is simplified into three sections of linear elasticity, sub-buckling going with local collapse and dens...Based on the static compression experiments, the compressive stress-strain curve of multi-layer corrugated boards is simplified into three sections of linear elasticity, sub-buckling going with local collapse and densification. By considering the structure factors of multi-layer corrugated boards, the energy absorption model is obtained and characterized by the structure factors of corrugated cell-wall. The model is standardized by the solid modulus and it is universal for corrugated structures of different basis material. In the liner-elastic section, with the increase of the load, the energy absorption per unit volume of multi-layer corrugated boards gradually increases; in the sub-buckling section going with local collapse, the compression resistance of multi-layer corrugated boards goes on under a nearly constant load, but the energy absorption per unit volume rapidly increases with the increase of the compression strain. It is shown as an ascending curve in the energy absorption diagram. In the densification section, the corrugated sandwich core has no energy absorption capability. A good consistency is achieved between theoretical and experimental energy absorption curves. In designing the cushioning package, the cushioning properties can be evaluated by the theoretical model without more experiments. The suggested method to develop the energy absorption diagram for corrugated boards can be used to characterize the cushioning properties and optimize the structures of corrugated sandwich structures.展开更多
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
文摘Using the typical characteristics of multi-layered marine and continental transitional gas reservoirs as a basis,a model is developed to predict the related well production rate.This model relies on the fractal theory of tortuous capillary bundles and can take into account multiple gas flow mechanisms at the micrometer and nanometer scales,as well as the flow characteristics in different types of thin layers(tight sandstone gas,shale gas,and coalbed gas).Moreover,a source-sink function concept and a pressure drop superposition principle are utilized to introduce a coupled flow model in the reservoir.A semi-analytical solution for the production rate is obtained using a matrix iteration method.A specific well is selected for fitting dynamic production data,and the calculation results show that the tight sandstone has the highest gas production per unit thickness compared with the other types of reservoirs.Moreover,desorption and diffusion of coalbed gas and shale gas can significantly contribute to gas production,and the daily production of these two gases decreases rapidly with decreasing reservoir pressure.Interestingly,the gas production from fractures exhibits an approximately U-shaped distribution,indicating the need to optimize the spacing between clusters during hydraulic fracturing to reduce the area of overlapping fracture control.The coal matrix water saturation significantly affects the coalbed gas production,with higher water saturation leading to lower production.
基金Project supported by the China Post-doctoral Science Foundation(Grant No.2020M671834)the Anhui Province Post-doctoral Science Foundation,China(Grant No.2020A397).
文摘A flexible extra broadband metamaterial absorber(MMA)stacked with five layers working at 2 GHz–40 GHz is investigated.Each layer is composed of polyvinyl chloride(PVC),polyimide(PI),and a frequency selective surface(FSS),which is printed on PI using conductive ink.To investigate this absorber,both one-dimensional analogous circuit analysis and three-dimensional full-wave simulation based on a physical model are provided.Various crucial electromagnetic properties,such as absorption,effective impedance,complex permittivity and permeability,electric current distribution and magnetic field distribution at resonant peak points,are studied in detail.Analysis shows that the working frequency of this absorber covers entire S,C,X,Ku,K and Ka bands with a minimum thickness of 0.098λ_(max)(λ_(max) is the maximum wavelength in the absorption band),and the fractional bandwidth(FBW)reaches 181.1%.Moreover,the reflection coefficient is less than-10 dB at 1.998 GHz–40.056 GHz at normal incidence,and the absorptivity of the plane wave is greater than 80%when the incident angle is smaller than 50°.Furthermore,the proposed absorber is experimentally validated,and the experimental results show good agreement with the simulation results,which demonstrates the potential applicability of this absorber at 2 GHz–40 GHz.
基金supported by the National Natural Science Foundation of China(61771154)the Fundamental Research Funds for the Central Universities(3072022CF0601)supported by Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology,Harbin Engineering University,Harbin,China.
文摘As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
基金supported by the National Key Research and Development Program of China (Grant No.2021YFB2600800)the National Key Research and Development 451 Program of China (Grant No.2021YFC3100803)the Guangdong Innovative and Entrepreneurial Research Team Program (Grant No.2016ZT06N340).
文摘The polyurethane foam(PU)compressible layer is a viable solution to the problem of damage to the secondary lining in squeezing tunnels.Nevertheless,the mechanical behaviour of the multi-layer yielding supports has not been thoroughly investigated.To fill this gap,large-scale model tests were conducted in this study.The synergistic load-bearing mechanics were analyzed using the convergenceconfinement method.Two types of multi-layer yielding supports with different thicknesses(2.5 cm,3.75 cm and 5 cm)of PU compressible layers were investigated respectively.Digital image correlation(DIC)analysis and acoustic emission(AE)techniques were used for detecting the deformation fields and damage evolution of the multi-layer yielding supports in real-time.Results indicated that the loaddisplacement relationship of the multi-layer yielding supports could be divided into the crack initiation,crack propagation,strain-hardening,and failure stages.Compared with those of the stiff support,the toughness,deformability and ultimate load of the yielding supports were increased by an average of 225%,61%and 32%,respectively.Additionally,the PU compressible layer is positioned between two primary linings to allow the yielding support to have greater mechanical properties.The analysis of the synergistic bearing effect suggested that the thickness of PU compressible layer and its location significantly affect the mechanical properties of the yielding supports.The use of yielding supports with a compressible layer positioned between the primary and secondary linings is recommended to mitigate the effects of high geo-stress in squeezing tunnels.
文摘This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
基金Taif University,Taif,Saudi Arabia through Taif University Researchers Supporting Project Number(TURSP-2020/115).
文摘Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training.
基金funded by the National Natural Science Foundation of China(Grant No.11972018,No.12002336)China Postdoctoral Science Foundation(Grant No.2021M701710)。
文摘This article investigates the characteristics of shock wave overpressure generated by multi-layer composite charge under different detonation modes.Combining dimensional analysis and the explosion mechanism of the charge,a peak overpressure prediction model for the composite charge under singlepoint detonation and simultaneous detonation was established.The effects of the charge structure and initiation method on the overpressure field characteristics were investigated in AUTODYN simulation.The accuracy of the prediction model and the reliability of the numerical simulation method were subsequently verified in a series of static explosion experiments.The results reveal that the mass of the inner charge was the key factor determining the peak overpressure of the composite charge under single-point detonation.The peak overpressure in the radial direction improved apparently with an increase in the aspect ratio of the charge.The overpressure curves in the axial direction exhibited a multi-peak phenomenon,and the secondary peak overpressure even exceeded the primary peak at distances of 30D and 40D(where D is the charge diameter).The difference in peak overpressure among azimuth angles of 0-90°gradually decreased with an increase in the propagation distance of the shock wave.The coupled effect of the detonation energy of the inner and outer charge under simultaneous detonation improved the overpressure in both radial and axial directions.The difference in peak overpressure obtained from model prediction and experimental measurements was less than 16.4%.
基金supported by the National Natural Science Foundation of China(61272011)
文摘In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.
基金granted by the National Basic Research Program of China(grant no.2014CB239205)National Science and Technology Major Project of China (grant no.20011ZX05030-005-003)
文摘Multi-layer sandstone reservoirs occur globally and are currently in international production. The 3D characteristics of these reservoirs are too complicated to be accurately delineated by general structural-facies-reservoir modelling. In view of the special geological features, such as the vertical architecture of sandstone and mudstone interbeds, the lateral stable sedimentation and the strong heterogeneity of reservoir poroperm and fluid distribution, we developed a new three-stage and six-phase procedure for 3D characterization of multi-layer sandstone reservoirs. The procedure comprises two-phase structural modelling, two-phase facies modelling and modelling of two types of reservoir properties. Using this procedure, we established models of the formation structure, sand body structure and microfacies, reservoir facies and properties including porosity, permeability and gas saturation and provided a 3D fine-scale, systematic characterization of the Sebei multi-layer sandstone gas field, China. This new procedure, validated by the Sebei gas field, can be applied to characterize similar multi-layer sandstone reservoirs.
文摘Explosive synchronization(ES)is a kind of first-order jump phenomenon that exists in physical and biological systems.In recent years,researchers have focused on ES between single-layer and multi-layer networks.Most research on complex networks with delay has focused on single-layer or double-layer networks,multi-layer networks are seldom explored.In this paper,we propose a Kuramoto model of frequency weights in multi-layer complex networks with delay and star connections between layers.Through theoretical analysis and numerical verification,the factors affecting the backward critical coupling strength are analyzed.The results show that the interaction between layers and the average node degree has a direct effect on the backward critical coupling strength of each layer network.The location of the delay,the size of the delay,the number of network layers,the number of nodes,and the network topology are revealed to have no direct impact on the backward critical coupling strength of the network.Delay is introduced to explore the influence of delay and other related parameters on ES.
基金This project (No. 49070196) is funded by the National Science Foundation of China.
文摘In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper crust is actually a response to the plastic flow network in the lower lithosphere including the lower crust and lithospheric mantle. The existence of the unified plastic flow system confirms that the driving force for intraplate tectonic deformation results mainly from the compression of the India plate, while the long-range transmission of the force is carried out chiefly by means of plastic flow. The plastic flow network has a control over the intraplate tectonic deformation.
文摘This paper introduces the construction of the multi-layered biaxial weft knitted fabric (MBWK fabric) and studies the locking angle of this kind of fabric. Moreover, a locking angle model of the MBWK fabric is established for the first time according to its unique construction. Two kinds of locking angles are considered under different restraint conditions: the locking angle θ1 controlled by the inserting yarns and the locking angle θ2 controlled by the stitch yarns. It is concluded that the ultimate value of the locking angle θ is the larger one of the two angles.
文摘Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics between the CASoSSWF and the BIS, and then designs the models of components and the architecture for a monitoring agent, a regulating agent, a killer agent, a pre-warning agent and a communicating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dynamic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CASoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship formation operation simulation system.
文摘In this paper, the new model of the real gas filtration problem has been presented multi-layered gas reservoir, when a gas well output and wellbore storage may be variable, and have obtained the exact solutions of pressure distribution for each reservoir bed under three kinds of typical out-boundary conditions. As a special case, according to the new model have also obtained the qxact solutions of presssure distribution in homogeneous reservoir and is given important application in gas reservoir development.
文摘The large-scale population accumulation in modem cities has become one of their important characteristics. With the development of urbanization in the world, the large-scale gathering activities are increasing, and the accidents caused by them are also rising. At the same time, the evacuation of visitors is faced with severe challenges in the event of an emergency such as terrorist attacks. The main problem for tourists is how to evacuate quickly and safely in an emergency. The Louvre is one of the largest and most visited art museums in the world.Visitors are large and come from all over the world, the volume of passengers varies greatly, and the interior architecture design is complicated, etc. These characteristics challenge the design of evacuation paths. Based on the consideration of these factors, we should develop the optimal evacuation scheme and minimize the accident risk and evacuation cost.
基金supported by the Research Fund for the National Committee of China under Grant No. 05XN09
文摘Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.
文摘Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as developing a real one requires lots of manpower and resources. BMDS is a typical complex system for its nonlinear, adaptive and uncertainty characteristics. The agent-based modeling method is well suited for the complex system whose overall behaviors are determined by interactions among individual elements. A multi-agent decision support system (DSS), which includes missile agent, radar agent and command center agent, is established based on the studies of structure and function of BMDS. Considering the constraints brought by radar, intercept missile, offensive missile and commander, the objective function of DSS is established. In order to dynamically generate the optimal interception plan, the variable neighborhood negative selection particle swarm optimization (VNNSPSO) algorithm is proposed to support the decision making of DSS. The proposed algorithm is compared with the standard PSO, constriction factor PSO (CFPSO), inertia weight linear decrease PSO (LDPSO), variable neighborhood PSO (VNPSO) algorithm from the aspects of convergence rate, iteration number, average fitness value and standard deviation. The simulation results verify the efficiency of the proposed algorithm. The multi-agent DSS is developed through the Repast simulation platform and the constructed DSS can generate intercept plans automatically and support three-dimensional dynamic display of missile defense process.
基金Funded by the National Natural Science Foundation of China (No.50905120)
文摘Based on the static compression experiments, the compressive stress-strain curve of multi-layer corrugated boards is simplified into three sections of linear elasticity, sub-buckling going with local collapse and densification. By considering the structure factors of multi-layer corrugated boards, the energy absorption model is obtained and characterized by the structure factors of corrugated cell-wall. The model is standardized by the solid modulus and it is universal for corrugated structures of different basis material. In the liner-elastic section, with the increase of the load, the energy absorption per unit volume of multi-layer corrugated boards gradually increases; in the sub-buckling section going with local collapse, the compression resistance of multi-layer corrugated boards goes on under a nearly constant load, but the energy absorption per unit volume rapidly increases with the increase of the compression strain. It is shown as an ascending curve in the energy absorption diagram. In the densification section, the corrugated sandwich core has no energy absorption capability. A good consistency is achieved between theoretical and experimental energy absorption curves. In designing the cushioning package, the cushioning properties can be evaluated by the theoretical model without more experiments. The suggested method to develop the energy absorption diagram for corrugated boards can be used to characterize the cushioning properties and optimize the structures of corrugated sandwich structures.