期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments
1
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Hyperparameter on-line learning of stochastic resonance based threshold networks
2
作者 Weijin Li Yuhao Ren Fabing Duan 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第8期289-295,共7页
Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optim... Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optimized by various gradientbased optimizers. The introduction of injected noise extends the noise level into the parameter space of the designed threshold network, but leads to a highly non-convex optimization landscape of the loss function. Thus, the hyperparameter on-line learning procedure with respective to network weights and noise levels becomes of challenge. It is shown that the Adam optimizer, as an adaptive variant of stochastic gradient descent, manifests its superior learning ability in training the stochastic resonance based threshold network effectively. Experimental results demonstrate the significant improvement of performance of the designed threshold network trained by the Adam optimizer for function approximation and image classification. 展开更多
关键词 noise injection adaptive stochastic resonance threshold neural network hyperparameter learning
下载PDF
Slat Noise Suppression Using Upstream Mass Injection
3
作者 黄华 李伟鹏 王福新 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第5期620-629,共10页
A new approach,mass injection near the slat cusp,is proposed for the suppression of slat noise.The mechanism and efciency of the slat noise suppression using upstream mass injection are numerically studied with hybrid... A new approach,mass injection near the slat cusp,is proposed for the suppression of slat noise.The mechanism and efciency of the slat noise suppression using upstream mass injection are numerically studied with hybrid Reynolds-averaged Navier-Stokes simulation/Large eddy simulation(RANS/LES)of a three-component high-lift model.Ffowcs-Williams and Hawking(FW-H)integration is employed to obtain far-field acoustic characteristics.Results show that with injection,aerodynamic capability of the high-lift devices is sustained.In addition,a considerable noise reduction is observed in the downward direction.With detailed analysis of the time-averaged and instantaneous flow fields,two mechanisms are identified as the reason accounting for the noise suppression:upstream mass injection significantly reduces the scale and strength of the vortices stemming from the cusp;the shear layer is lifted up,which relieves the shear layer impingement on the slat lower surface. 展开更多
关键词 slat noise upstream mass injection detached-eddy-simulation(DES)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部