One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish au...One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish autonomous tasks. The characteristic model(CM) based all-coefficient adaptive control(ACAC) designed for PPF systems in horizontal and vertical trajectory control is proposed. The method is easy to use and convenient to adjust and test. Just a few parameters are adapted during the control process. In application, vertical and horizontal CMs are designed and ACAC controllers are constructed to control vertical altitude and horizontal trajectory of PPF based on the proposed CMs, respectively. Result analysis of different simulations shows that the applied ACAC control method is effective for trajectory tracking of the PPF systems and the approach guarantees the transient performance of the PPF systems with better disturbance rejection ability.展开更多
In order to realize safe and accurate homing of parafoil system,a multiphase homing trajectory planning scheme is proposed according to the maneuverability and basic flight characteristics of the vehicle.In this scena...In order to realize safe and accurate homing of parafoil system,a multiphase homing trajectory planning scheme is proposed according to the maneuverability and basic flight characteristics of the vehicle.In this scenario,on the basis of geometric relationship of each phase trajectory,the problem of trajectory planning is transformed to parameter optimizing,and then auxiliary population-based quantum differential evolution algorithm(AP-QDEA)is applied as a tool to optimize the objective function,and the design parameters of the whole homing trajectory are obtained.The proposed AP-QDEA combines the strengths of differential evolution algorithm(DEA)and quantum evolution algorithm(QEA),and the notion of auxiliary population is introduced into the proposed algorithm to improve the searching precision and speed.The simulation results show that the proposed AP-QDEA is proven its superior in both effectiveness and efficiency by solving a set of benchmark problems,and the multiphase homing scheme can fulfill the requirement of fixed-points and upwind landing in the process of homing which is simple in control and facile in practice as well.展开更多
As the form of cyber threats becomes more complex,which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence.Basing on the content ...As the form of cyber threats becomes more complex,which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence.Basing on the content analysis method,introduces the precision,recall rate and timely rate on the basis of the change of time dimension,and analyzes the threat intelligence provider from three aspects.The validity of this method is verified by the test of massive source of threat data,which improves the efficiency of CIF analysis and makes it easy to analyze and extract the threat intelligence information quickly.展开更多
Homing trajectory planning is a core task of autonomous homing of parafoil system.This work analyzes and establishes a simplified kinematic mathematical model,and regards the homing trajectory planning problem as a ki...Homing trajectory planning is a core task of autonomous homing of parafoil system.This work analyzes and establishes a simplified kinematic mathematical model,and regards the homing trajectory planning problem as a kind of multi-objective optimization problem.Being different from traditional ways of transforming the multi-objective optimization into a single objective optimization by weighting factors,this work applies an improved non-dominated sorting genetic algorithm Ⅱ(NSGA Ⅱ) to solve it directly by means of optimizing multi-objective functions simultaneously.In the improved NSGA Ⅱ,the chaos initialization and a crowding distance based population trimming method were introduced to overcome the prematurity of population,the penalty function was used in handling constraints,and the optimal solution was selected according to the method of fuzzy set theory.Simulation results of three different schemes designed according to various practical engineering requirements show that the improved NSGA Ⅱ can effectively obtain the Pareto optimal solution set under different weighting with outstanding convergence and stability,and provide a new train of thoughts to design homing trajectory of parafoil system.展开更多
To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations ...To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°.展开更多
This paper investigates the formation control problem for nonlinear multi-agent systems with a virtual leader. A distributed formation control strategy based on linear extended state observer(LESO) is proposed under t...This paper investigates the formation control problem for nonlinear multi-agent systems with a virtual leader. A distributed formation control strategy based on linear extended state observer(LESO) is proposed under the hypothesis that velocity of the agent s neighbors could not be measured. Some sufficient conditions are established to ensure that the nonlinear multi-agent systems form a predefined formation with switching topology when the nonlinear function is known. Moreover, the tracking errors are bounded with external disturbance. Lastly,a numerical example with different scenarios is presented to demonstrate the validity of the obtained results.展开更多
With network developing and virtualization rising,more and more indoor environment(POIs) such as cafe,library,office,even bus and subway can provide plenty of bandwidth and computing resources.Meanwhile many people da...With network developing and virtualization rising,more and more indoor environment(POIs) such as cafe,library,office,even bus and subway can provide plenty of bandwidth and computing resources.Meanwhile many people daily spending much time in them are still suffering from the mobile device with limited resources.This situation implies a novel local cloud computing paradigm in which mobile device can leverage nearby resources to facilitate task execution.In this paper,we implement a mobile local computing system based on indoor virtual cloud.This system mainly contains three key components:1) As to application,we create a parser to generate the "method call and cost tree" and analyze it to identify resourceintensive methods.2) As to mobile device,we design a self-learning execution controller to make offloading decision at runtime.3) As to cloud,we construct a social scheduling based application-isolation virtual cloud model.The evaluation results demonstrate that our system is effective and efficient by evaluating CPUintensive calculation application.Memoryintensive image translation application and 1/O-intensive image downloading application.展开更多
An accurate and effective neurological evaluation is indispensable in the treatment and rehabilitation of traumatic brain injury. However,most of the existing evaluation methods in basic research and clinical practice...An accurate and effective neurological evaluation is indispensable in the treatment and rehabilitation of traumatic brain injury. However,most of the existing evaluation methods in basic research and clinical practice are not objective or intuitive for assessing the neurological function of big animals, and are also difficult to use to qualify the extent of damage and recovery. In the present study, we established a big animal model of traumatic brain injury by impacting the cortical motor region of beagles. At 2 weeks after successful modeling, we detected neurological deficiencies in the animal model using a series of techniques, including three-dimensional motion capture, electromyogram and ground reaction force. These novel technologies may play an increasingly important role in the field of traumatic brain injury diagnosis and rehabilitation in the future. The experimental protocol was approved by the Animal Care and Use Committee of Logistics University of People's Armed Police Force(approval No. 2017-0006.2).展开更多
Realistic animation of various interactions between multiple fluids, possibly undergoing phase change, is a challenging task in computer graphics. The visual scope of multi-phase multi-fluid phenomena covers complex t...Realistic animation of various interactions between multiple fluids, possibly undergoing phase change, is a challenging task in computer graphics. The visual scope of multi-phase multi-fluid phenomena covers complex tangled surface structures and rich color variations, which can greatly enhance visual effect in graphics applications. Describing such phenomena requires more complex models to handle challenges involving the calculation of interactions, dynamics and spatial distribution of multiple phases, which are often involved and hard to obtain real-time performance. Recently, a diverse set of algorithms have been introduced to implement the complex multi-fluid phenomena based on the governing physical laws and novel discretization methods to accelerate the overall computation while ensuring numerical stability. By sorting through the target phenomena of recent research in the broad subject of multiple fluids, this state-of-the-art report summarizes recent advances on multi-fluid simulation in computer graphics.展开更多
A new modeling tool, algebraic state space approach to logical dynamic systems, which is developed recently based on the theory of semi-tensor product of matrices (STP), is applied to the automata field. Using the S...A new modeling tool, algebraic state space approach to logical dynamic systems, which is developed recently based on the theory of semi-tensor product of matrices (STP), is applied to the automata field. Using the STE this paper investigates the modeling and controlling problems of combined automata constructed in the ways of parallel, serial and feedback. By representing the states, input and output symbols in vector forms, the transition and output functions are expressed as algebraic equations of the states and inputs. Based on such algebraic descriptions, the control problems of combined automata, including output control and state control, are considered, and two necessary and sufficient conditions are presented for the controllability, by which two algorithms are established to find out all the control strings that make a combined automaton go to a target state or produce a desired output. The results are quite different from existing methods and provide a new angle and means to understand and analyze the dynamics of combined automata.展开更多
The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS. Using the semi-tensor product (STP) ...The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS. Using the semi-tensor product (STP) of matrices, the dynamics of BPNSs, which can be viewed as a combination of several small bounded subnets via synchronizing transitions, are described by an algebraic equation. When the algebraic form for its dynamics is established, we can present a necessary and sufficient condition for the reachability between any marking (or state) and initial marking. Also, we give a corresponding algorithm to calculate all of the transition paths between initial marking and any target marking. Finally, an example is shown to illustrate proposed results. The key advantage of our approach, in which the set of reachable markings of BPNSs can be expressed by the set of reachable markings of subnets such that the big reachability set of BPNSs do not need generate, is partly avoid the state explosion problem of Petri nets (PNs).展开更多
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution...Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies.展开更多
The problem of solving type-2 fuzzy relation equations is investigated. In order to apply semi-tensor product of matrices, a new matrix analysis method and tool, to solve type-2 fuzzy relation equations, a type-2 fuzz...The problem of solving type-2 fuzzy relation equations is investigated. In order to apply semi-tensor product of matrices, a new matrix analysis method and tool, to solve type-2 fuzzy relation equations, a type-2 fuzzy relation is decomposed into two parts as principal sub-matrices and secondary sub-matrices; an r-ary symmetrical-valued type-2 fuzzy relation model and its corresponding symmetrical-valued type-2 fuzzy relation equation model are established. Then, two algorithms are developed for solving type-2 fuzzy relation equations, one of which gives a theoretical description for general type-2 fuzzy relation equations; the other one can find all the solutions to the symmetrical-valued ones. The results can improve designing type-2 fuzzy controllers, because it provides knowledge to search the optimal solutions or to find the reason if there is no solution. Finally some numerical examples verify the correctness of the results/algorithms.展开更多
This paper investigates the transition function and the reachability conditions of finite automata by using a semitensor product of matrices, which is a new powerful matrix analysis tool. The states and input symbols ...This paper investigates the transition function and the reachability conditions of finite automata by using a semitensor product of matrices, which is a new powerful matrix analysis tool. The states and input symbols are first expressed in vector forms, then the transition function is described in an algebraic form. Using this algebraic representation, a sufficient and necessary condition of the reachability of any two states is proposed, based on which an algorithm is developed for discovering all the paths from one state to another. Furthermore, a mechanism is established to recognize the language acceptable by a finite automaton. Finally, illustrative examples show that the results/algorithms presented in this paper are suitable for both deterministic finite automata (DFA) and nondeterministic finite automata (NFA).展开更多
The semi-tensor product (STP) of matrices was used in the article, as a new matrix analysis tool, to investigate the problem of verification of self-verifying automata (SVA). SVA is a special variant of finite aut...The semi-tensor product (STP) of matrices was used in the article, as a new matrix analysis tool, to investigate the problem of verification of self-verifying automata (SVA). SVA is a special variant of finite automata which is essential to nondeterministic communication with a limited number of advice bits. The status, input and output symbols are expressed in vector forms, the dynamic behaviour of SVA is modelled as matrix product is STP. By such algebraic formulation, three an algebraic equation of the states and inputs, in which the necessary and sufficient conditions are presented for the verification problem, by which three algorithms are established to find out all the strings which are accepted, rejected, or unrecognized by a SVA. Testing examples show the correctness of the results.展开更多
The compatible-invariant subset of deterministic finite automata( DFA) is investigated to solve the problem of subset stabilization under the frameworks of semi-tensor product( STP) of matrices. The concepts of co...The compatible-invariant subset of deterministic finite automata( DFA) is investigated to solve the problem of subset stabilization under the frameworks of semi-tensor product( STP) of matrices. The concepts of compatibleinvariant subset and largest compatible-invariant subset are introduced inductively for Moore-type DFA,and a necessary condition for the existence of largest compatible-invariant subset is given. Meanwhile,by using the STP of matrices,a compatible feasible event matrix is defined with respect to the largest compatible-invariant subset.Based on the concept of compatible feasible event matrix,an algorithm to calculate the largest compatible-invariant subset contained in a given subset is proposed. Finally,an illustrative example is given to validate the results.展开更多
Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query ...Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness.展开更多
基金Project(61273138)supported by the National Natural Science Foundation of ChinaProject(14JCZDJC39300)supported by the Key Fund of Tianjin,China
文摘One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish autonomous tasks. The characteristic model(CM) based all-coefficient adaptive control(ACAC) designed for PPF systems in horizontal and vertical trajectory control is proposed. The method is easy to use and convenient to adjust and test. Just a few parameters are adapted during the control process. In application, vertical and horizontal CMs are designed and ACAC controllers are constructed to control vertical altitude and horizontal trajectory of PPF based on the proposed CMs, respectively. Result analysis of different simulations shows that the applied ACAC control method is effective for trajectory tracking of the PPF systems and the approach guarantees the transient performance of the PPF systems with better disturbance rejection ability.
基金Project(61273138) supported by the National Natural Science Foundation of ChinaProjects(KJ2016A169,KJ2015A242) supported by the University Natural Science Research Key Project of Anhui Province,ChinaProject(ZRC2014444) supported by the Talents Program of Anhui Science and Technology University,China
文摘In order to realize safe and accurate homing of parafoil system,a multiphase homing trajectory planning scheme is proposed according to the maneuverability and basic flight characteristics of the vehicle.In this scenario,on the basis of geometric relationship of each phase trajectory,the problem of trajectory planning is transformed to parameter optimizing,and then auxiliary population-based quantum differential evolution algorithm(AP-QDEA)is applied as a tool to optimize the objective function,and the design parameters of the whole homing trajectory are obtained.The proposed AP-QDEA combines the strengths of differential evolution algorithm(DEA)and quantum evolution algorithm(QEA),and the notion of auxiliary population is introduced into the proposed algorithm to improve the searching precision and speed.The simulation results show that the proposed AP-QDEA is proven its superior in both effectiveness and efficiency by solving a set of benchmark problems,and the multiphase homing scheme can fulfill the requirement of fixed-points and upwind landing in the process of homing which is simple in control and facile in practice as well.
文摘As the form of cyber threats becomes more complex,which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence.Basing on the content analysis method,introduces the precision,recall rate and timely rate on the basis of the change of time dimension,and analyzes the threat intelligence provider from three aspects.The validity of this method is verified by the test of massive source of threat data,which improves the efficiency of CIF analysis and makes it easy to analyze and extract the threat intelligence information quickly.
基金Project(61273138)supported by the National Natural Science Foundation of ChinaProject(14JCZDJC39300)supported by the Key Fund of Tianjin,China
文摘Homing trajectory planning is a core task of autonomous homing of parafoil system.This work analyzes and establishes a simplified kinematic mathematical model,and regards the homing trajectory planning problem as a kind of multi-objective optimization problem.Being different from traditional ways of transforming the multi-objective optimization into a single objective optimization by weighting factors,this work applies an improved non-dominated sorting genetic algorithm Ⅱ(NSGA Ⅱ) to solve it directly by means of optimizing multi-objective functions simultaneously.In the improved NSGA Ⅱ,the chaos initialization and a crowding distance based population trimming method were introduced to overcome the prematurity of population,the penalty function was used in handling constraints,and the optimal solution was selected according to the method of fuzzy set theory.Simulation results of three different schemes designed according to various practical engineering requirements show that the improved NSGA Ⅱ can effectively obtain the Pareto optimal solution set under different weighting with outstanding convergence and stability,and provide a new train of thoughts to design homing trajectory of parafoil system.
基金supported by the International S&T Cooperation Program of China (No. 2014DFA70710) the National Natural Science Foundation of China (No. 51475323)
文摘To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°.
文摘This paper investigates the formation control problem for nonlinear multi-agent systems with a virtual leader. A distributed formation control strategy based on linear extended state observer(LESO) is proposed under the hypothesis that velocity of the agent s neighbors could not be measured. Some sufficient conditions are established to ensure that the nonlinear multi-agent systems form a predefined formation with switching topology when the nonlinear function is known. Moreover, the tracking errors are bounded with external disturbance. Lastly,a numerical example with different scenarios is presented to demonstrate the validity of the obtained results.
基金ACKNOWLEDGEMENTS This work was supported by the Research Fund for the Doctoral Program of Higher Education of China (No.20110031110026 and No.20120031110035), the National Natural Science Foundation of China (No. 61103214), and the Key Project in Tianjin Science & Technology Pillar Program (No. 13ZCZDGX01098).
文摘With network developing and virtualization rising,more and more indoor environment(POIs) such as cafe,library,office,even bus and subway can provide plenty of bandwidth and computing resources.Meanwhile many people daily spending much time in them are still suffering from the mobile device with limited resources.This situation implies a novel local cloud computing paradigm in which mobile device can leverage nearby resources to facilitate task execution.In this paper,we implement a mobile local computing system based on indoor virtual cloud.This system mainly contains three key components:1) As to application,we create a parser to generate the "method call and cost tree" and analyze it to identify resourceintensive methods.2) As to mobile device,we design a self-learning execution controller to make offloading decision at runtime.3) As to cloud,we construct a social scheduling based application-isolation virtual cloud model.The evaluation results demonstrate that our system is effective and efficient by evaluating CPUintensive calculation application.Memoryintensive image translation application and 1/O-intensive image downloading application.
基金supported by the National Natural Science Foundation of China,No.11672332,11102235 and 31200809(all to XYC)the National Key Research and Development Plan of China,No.2016YFC1101500(to SZ)the Science and Technology Program of Tianjin,China,No.17YFZCSY00620 and 16ZXHLSY00120(both to XYC)
文摘An accurate and effective neurological evaluation is indispensable in the treatment and rehabilitation of traumatic brain injury. However,most of the existing evaluation methods in basic research and clinical practice are not objective or intuitive for assessing the neurological function of big animals, and are also difficult to use to qualify the extent of damage and recovery. In the present study, we established a big animal model of traumatic brain injury by impacting the cortical motor region of beagles. At 2 weeks after successful modeling, we detected neurological deficiencies in the animal model using a series of techniques, including three-dimensional motion capture, electromyogram and ground reaction force. These novel technologies may play an increasingly important role in the field of traumatic brain injury diagnosis and rehabilitation in the future. The experimental protocol was approved by the Animal Care and Use Committee of Logistics University of People's Armed Police Force(approval No. 2017-0006.2).
基金This work is supported by the National Key Research and Development Program of China under Grant No. 2017YFB1002701, the National Natural Science Foundation of China under Grant No. 61602265. The authors would also like to thank the support from the Engineering Research Network Wales and the Royal Academy of Engineering, UK.
文摘Realistic animation of various interactions between multiple fluids, possibly undergoing phase change, is a challenging task in computer graphics. The visual scope of multi-phase multi-fluid phenomena covers complex tangled surface structures and rich color variations, which can greatly enhance visual effect in graphics applications. Describing such phenomena requires more complex models to handle challenges involving the calculation of interactions, dynamics and spatial distribution of multiple phases, which are often involved and hard to obtain real-time performance. Recently, a diverse set of algorithms have been introduced to implement the complex multi-fluid phenomena based on the governing physical laws and novel discretization methods to accelerate the overall computation while ensuring numerical stability. By sorting through the target phenomena of recent research in the broad subject of multiple fluids, this state-of-the-art report summarizes recent advances on multi-fluid simulation in computer graphics.
基金Acknowledgements This work was supported by Key Scientific Research Program of the Higher Education Institutions of Henan Educational Committee (15A416005), the 2015 Science Foundation of Henan University of Science and Technology for Youths (2015QN016), and the National Natural Science Foundation of China (Grant Nos. 61573199, 61473115, and U1404610). The authors would like to express their thanks to Prof. Y G Hong for his helpful suggestions.
文摘A new modeling tool, algebraic state space approach to logical dynamic systems, which is developed recently based on the theory of semi-tensor product of matrices (STP), is applied to the automata field. Using the STE this paper investigates the modeling and controlling problems of combined automata constructed in the ways of parallel, serial and feedback. By representing the states, input and output symbols in vector forms, the transition and output functions are expressed as algebraic equations of the states and inputs. Based on such algebraic descriptions, the control problems of combined automata, including output control and state control, are considered, and two necessary and sufficient conditions are presented for the controllability, by which two algorithms are established to find out all the control strings that make a combined automaton go to a target state or produce a desired output. The results are quite different from existing methods and provide a new angle and means to understand and analyze the dynamics of combined automata.
基金supported by the National Natural Science Foundation of China(61573199,61573200)the Tianjin Natural Science Foundation(14JCYBJC18700)
文摘The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS. Using the semi-tensor product (STP) of matrices, the dynamics of BPNSs, which can be viewed as a combination of several small bounded subnets via synchronizing transitions, are described by an algebraic equation. When the algebraic form for its dynamics is established, we can present a necessary and sufficient condition for the reachability between any marking (or state) and initial marking. Also, we give a corresponding algorithm to calculate all of the transition paths between initial marking and any target marking. Finally, an example is shown to illustrate proposed results. The key advantage of our approach, in which the set of reachable markings of BPNSs can be expressed by the set of reachable markings of subnets such that the big reachability set of BPNSs do not need generate, is partly avoid the state explosion problem of Petri nets (PNs).
基金the National Key Basic Research Program of China (Grant: 2013CB834204)the National Natural Science Foundation of China (Grant: 61300242, 61772291)+1 种基金the Tianjin Research Program of Application Foundation and Advanced Technology (Grant: 15JCQNJC41500, 17JCZDJC30500)the Open Project Foundation of Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China (Grant: CAAC-ISECCA- 201701, CAAC-ISECCA-201702)
文摘Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies.
基金This work was partially supported by the Natural Science Foundation of China (No. 611 74094) the Tianjin Natural Science Foundation of China (No. 13JCYBJC1 7400) the Program for New Century Excellent Talents in University of China (No. NCET-10-0506).
文摘The problem of solving type-2 fuzzy relation equations is investigated. In order to apply semi-tensor product of matrices, a new matrix analysis method and tool, to solve type-2 fuzzy relation equations, a type-2 fuzzy relation is decomposed into two parts as principal sub-matrices and secondary sub-matrices; an r-ary symmetrical-valued type-2 fuzzy relation model and its corresponding symmetrical-valued type-2 fuzzy relation equation model are established. Then, two algorithms are developed for solving type-2 fuzzy relation equations, one of which gives a theoretical description for general type-2 fuzzy relation equations; the other one can find all the solutions to the symmetrical-valued ones. The results can improve designing type-2 fuzzy controllers, because it provides knowledge to search the optimal solutions or to find the reason if there is no solution. Finally some numerical examples verify the correctness of the results/algorithms.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China (Grant No. 61174094), and the Tianjin Natural Science Foundation of China under (14JCYBJC18700 and 13JCY- BJC17400).
文摘This paper investigates the transition function and the reachability conditions of finite automata by using a semitensor product of matrices, which is a new powerful matrix analysis tool. The states and input symbols are first expressed in vector forms, then the transition function is described in an algebraic form. Using this algebraic representation, a sufficient and necessary condition of the reachability of any two states is proposed, based on which an algorithm is developed for discovering all the paths from one state to another. Furthermore, a mechanism is established to recognize the language acceptable by a finite automaton. Finally, illustrative examples show that the results/algorithms presented in this paper are suitable for both deterministic finite automata (DFA) and nondeterministic finite automata (NFA).
基金supported by the National Natural Science Foundation of China (61174094)the Tianjin Natural Science Foundation of China (14JCYBJC18700, 13JCYBJC17400)
文摘The semi-tensor product (STP) of matrices was used in the article, as a new matrix analysis tool, to investigate the problem of verification of self-verifying automata (SVA). SVA is a special variant of finite automata which is essential to nondeterministic communication with a limited number of advice bits. The status, input and output symbols are expressed in vector forms, the dynamic behaviour of SVA is modelled as matrix product is STP. By such algebraic formulation, three an algebraic equation of the states and inputs, in which the necessary and sufficient conditions are presented for the verification problem, by which three algorithms are established to find out all the strings which are accepted, rejected, or unrecognized by a SVA. Testing examples show the correctness of the results.
基金supported by the National Natural Science Foundation of China(61573199,61573200)
文摘The compatible-invariant subset of deterministic finite automata( DFA) is investigated to solve the problem of subset stabilization under the frameworks of semi-tensor product( STP) of matrices. The concepts of compatibleinvariant subset and largest compatible-invariant subset are introduced inductively for Moore-type DFA,and a necessary condition for the existence of largest compatible-invariant subset is given. Meanwhile,by using the STP of matrices,a compatible feasible event matrix is defined with respect to the largest compatible-invariant subset.Based on the concept of compatible feasible event matrix,an algorithm to calculate the largest compatible-invariant subset contained in a given subset is proposed. Finally,an illustrative example is given to validate the results.
基金supported by China Scholarship Council,Tianjin Science and Technology Committee(No.12JCZDJC20800)Science and Technology Planning Project of Tianjin(No.13ZCZDGX01098)+2 种基金NSF TRUST(The Team for Research in Ubiquitous Secure Technology)Science and Technology Center(No.CCF-0424422)National High Technology Research and Development Program of Chia(863Program)(No.2013BAH01B05)National Natural Science Foundation of China(No.61402264)
文摘Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness.