期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
空间电波的可察性分析 被引量:2
1
作者 韩军 《无线电通信技术》 2003年第4期17-19,45,共4页
随着无线电的产生,空间电波的存在与可察本来是无线通信的固有特性,然而对于现代军事电子系统,要求无线电波不仅要有信息传输特性,而且要有信息安全特性。所谓信息安全,就是信息的参数不被敌方侦收,信息的内容不被敌方破译,信息的接收... 随着无线电的产生,空间电波的存在与可察本来是无线通信的固有特性,然而对于现代军事电子系统,要求无线电波不仅要有信息传输特性,而且要有信息安全特性。所谓信息安全,就是信息的参数不被敌方侦收,信息的内容不被敌方破译,信息的接收不被敌方干扰,为此必须研究空间电波的可察性。通过对几种微波通信方式的研究,定量分析了电波传播过程中在空间的功率谱密度,提出了采取空域滤波、时域滤波、波束滤波、功率降低等措施,大大降低空间电波的可察性,确保信息安全。 展开更多
关键词 空间电波 可察性 信息安全 功率谱密度 空域滤波 时域滤波 波束滤波 功率降低 电磁隐蔽
在线阅读 下载PDF
Black⁃box adversarial attacks with imperceptible fake user profiles for recommender systems
2
作者 Qian Fulan Liu Jinggang +3 位作者 Chen Hai Chen Wenbin Zhao Shu Zhang Yanping 《南京大学学报(自然科学版)》 CSCD 北大核心 2024年第6期881-899,共19页
Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation system.It is difficult for attacke... Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation system.It is difficult for attackers to obtain detailed knowledge of the target model in actual scenarios,so using gradient optimization to generate adversarial samples in the local surrogate model has become an effective black‐box attack strategy.However,these methods suffer from gradients falling into local minima,limiting the transferability of the adversarial samples.This reduces the attack's effectiveness and often ignores the imperceptibility of the generated adversarial samples.To address these challenges,we propose a novel attack algorithm called PGMRS‐KL that combines pre‐gradient‐guided momentum gradient optimization strategy and fake user generation constrained by Kullback‐Leibler divergence.Specifically,the algorithm combines the accumulated gradient direction with the previous step's gradient direction to iteratively update the adversarial samples.It uses KL loss to minimize the distribution distance between fake and real user data,achieving high transferability and imperceptibility of the adversarial samples.Experimental results demonstrate the superiority of our approach over state‐of‐the‐art gradient‐based attack algorithms in terms of attack transferability and the generation of imperceptible fake user data. 展开更多
关键词 recommendation systems adversarial examples transferability imperceptible
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部