期刊文献+
共找到10,023篇文章
< 1 2 250 >
每页显示 20 50 100
Differential-Linear Attacks on Ballet Block Cipher
1
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
2
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(FDI) attacks
在线阅读 下载PDF
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function 被引量:2
3
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
An Improved Framework of Massive Superpoly Recovery in Cube Attacks Against NFSR-Based Stream Ciphers
4
作者 LIU Chen TIAN Tian QI Wen-Feng 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1179-1198,共20页
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently... A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers. 展开更多
关键词 NFSR-based stream ciphers cube attacks MILP Trivium
在线阅读 下载PDF
Research on fixed-time time-varying formation of heterogeneous multi-agent systems based on tracking error observer under DoS attacks
5
作者 Jiqing Luo Husheng Fang +2 位作者 Yue Zhong Jing Zhang Shengli Song 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第12期211-225,共15页
In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy... In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy is used to reconstruct the communication channel for the system that suffers from DoS attacks to prevent the discontinuous transmission information of the communication network from affecting MASs formation.Then,considering that the leader state is not available to each follower under DoS attacks,a fixed-time distributed observer without velocity information is constructed to estimate the tracking error between followers and the leader.Finally,adaptive radial basis function neural network(RBFNN) is used to approximate the unknown ensemble disturbances in the system,and the fixed-time time-varying formation scheme is designed with the constructed observer.The effectiveness of the proposed control algorithm is demonstrated by the numerical simulation. 展开更多
关键词 Denial-of-service attacks Dynamic pinning Fixed-time tracking error observer Adaptive RBFNN Fixed-time time-varying formation
在线阅读 下载PDF
Time-efficient cooperative attack strategy considering collision avoidance for missile swarm
6
作者 HU Yixin XU Yun DANG Zhaohui 《Journal of Systems Engineering and Electronics》 2025年第5期1306-1316,共11页
In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack stra... In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack strategy for missile swarm is proposed.Based on the distribution of the attackers and defenders,the collision avoidance against the defenders is considered during the attack process.By analyzing the geometric relationship between the relative velocity vector and relative position vector of the attackers and defenders,the collision avoidance constrains of attacking swarm are redefined.The key point is on adjusting the relative velocity vectors to fall outside the collision cone.This work facilitates high-precision attack toward the target while keeping safe missing distance between other attackers during collision avoidance process.By leveraging an innovative repulsion artificial function,a time-efficient cooperative attack strategy for missile swarm is obtained.Through rigorous simulation,the effectiveness of this cooperative attack strategy is substantiated.Furthermore,by employing Monte Carlo simulation,the success rate of the cooperative attack strategy is assessesed and the optimal configuration for the missile swarm is deduced. 展开更多
关键词 missile swarm cooperative attack strategy collision avoidance constraint artificial potential function
在线阅读 下载PDF
Research on three-dimensional attack area based on improved backtracking and ALPS-GP algorithms of air-to-air missile
7
作者 ZHANG Haodi WANG Yuhui HE Jiale 《Journal of Systems Engineering and Electronics》 2025年第1期292-310,共19页
In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of t... In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of the three-dimensional attack area model,restrict their practical applications.To address these issues,an improved backtracking algorithm is proposed to improve calculation efficiency.A significant reduction in solution time and maintenance of accuracy in the three-dimensional attack area are achieved by using the proposed algorithm.Furthermore,the age-layered population structure genetic programming(ALPS-GP)algorithm is introduced to determine an analytical polynomial model of the three-dimensional attack area,considering real-time requirements.The accuracy of the polynomial model is enhanced through the coefficient correction using an improved gradient descent algorithm.The study reveals a remarkable combination of high accuracy and efficient real-time computation,with a mean error of 91.89 m using the analytical polynomial model of the three-dimensional attack area solved in just 10^(-4)s,thus meeting the requirements of real-time combat scenarios. 展开更多
关键词 air combat three-dimensional attack area improved backtracking algorithm age-layered population structure genetic programming(ALPS-GP) gradient descent algorithm
在线阅读 下载PDF
基于Multi-Stage DEA模型的中国细羊毛生产技术效率实证分析 被引量:4
8
作者 孙致陆 肖海峰 《农业经济与管理》 2013年第4期27-35,共9页
以内蒙古等4省区为例,采用基于规模报酬可变假设的产出主导型Muhi-StageDEA模型,对2001~2010年中国细羊毛生产技术效率进行了测算和分析。研究结果表明,中国细羊毛生产技术效率不高,存在显著的技术效率损失;细羊毛生产在总体上出... 以内蒙古等4省区为例,采用基于规模报酬可变假设的产出主导型Muhi-StageDEA模型,对2001~2010年中国细羊毛生产技术效率进行了测算和分析。研究结果表明,中国细羊毛生产技术效率不高,存在显著的技术效率损失;细羊毛生产在总体上出现了纯技术效率下降和规模效率提高并存的现象,2008年以来纯技术效率提高对细羊毛生产技术效率改善的促进作用逐渐增强,而细羊毛生产规模效率则呈现出了一定的下降趋势;各省区细羊毛生产技术效率存在较大差异,细羊毛生产的规模效率均要高于纯技术效率,规模效率仍是影响各省区细羊毛生产技术效率改善和提高的主要因素。最后提出改善和提高中国细羊毛生产技术效率的政策建议。 展开更多
关键词 multi-stage DEA模型 细羊毛生产 技术效率 规模效率
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
9
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
Springback analysis and strategy for multi-stage thin-walled parts with complex geometries 被引量:4
10
作者 WANG Yao LANG Li-hui KAN Peng 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第7期1582-1593,共12页
Springback of a SUS321 complex geometry part formed by the multi-stage rigid-flexible compound process was studied through numerical simulations and laboratory experiments in this work.The sensitivity analysis was pro... Springback of a SUS321 complex geometry part formed by the multi-stage rigid-flexible compound process was studied through numerical simulations and laboratory experiments in this work.The sensitivity analysis was provided to have an insight in the effect of the evaluated process parameters.Furthermore,in order to minimize the springback problem,an accurate springback simulation model of the part was established and validated.The effects of the element size and timesteps on springback model were further investigated.Results indicate that the custom mesh size is beneficial for the springback simulation,and the four timesteps are found suited for the springback analysis for the complex geometry part.Finally,a strategy for reducing the springback by changing the geometry of the blank is proposed.The optimal blank geometry is obtained and used for manufacturing the part. 展开更多
关键词 SPRINGBACK model complex GEOMETRY multi-stage rigid-flexible COMPOUND process
在线阅读 下载PDF
Sequential maneuvering decisions based on multi-stage influence diagram in air combat 被引量:9
11
作者 Zhong Lin Tong Ming'an +1 位作者 Zhong Wei Zhang Shengyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期551-555,共5页
A multi-stage influence diagram is used to model the pilot's sequential decision making in one on one air combat. The model based on the multi-stage influence diagram graphically describes the elements of decision pr... A multi-stage influence diagram is used to model the pilot's sequential decision making in one on one air combat. The model based on the multi-stage influence diagram graphically describes the elements of decision process, and contains a point-mass model for the dynamics of an aircraft and takes into account the decision maker's preferences under uncertain conditions. Considering an active opponent, the opponent's maneuvers can be modeled stochastically. The solution of multistage influence diagram can be obtained by converting the multistage influence diagram into a two-level optimization problem. The simulation results show the model is effective. 展开更多
关键词 multi-stage influence diagram air combat maneuvering decision hierarchical optimization.
在线阅读 下载PDF
Spatial acoustic emission evolution of red sandstone during multi-stage triaxial deformation 被引量:5
12
作者 杨圣奇 倪红梅 温森 《Journal of Central South University》 SCIE EI CAS 2014年第8期3316-3326,共11页
Multi-stage triaxial compression tests for cylindrical red sandstone specimens(diameter of 50 mm,height of 100 mm) were carried out with a rock mechanics testing system and spatial acoustic emission(AE) locations were... Multi-stage triaxial compression tests for cylindrical red sandstone specimens(diameter of 50 mm,height of 100 mm) were carried out with a rock mechanics testing system and spatial acoustic emission(AE) locations were obtained by adopting an AE monitoring system.Based on spatial AE distribution evolution of red sandstone during multi-stage triaxial deformation,the relation between spatial AE events and triaxial deformation of red sandstone was analyzed.The results show that before peak strength,the spatial AE events are not active and distribute stochastically in the specimen,while after peak strength,the spatial AE events are very active and focus on a local region beyond final microscopic failure plane.During multi-stage triaxial deformation with five different confining pressures,the spatial AE distribution evolution in the red sandstone was obtained.The obtained spatial AE locations of red sandstone at the final confining pressure agree very well with the ultimate failure experimental mode.Finally,the influence of confining pressure on the spatial AE evolution characteristics of red sandstone during triaxial deformation was discussed.The AE behavior of red sandstone during multi-stage triaxial deformation is interpreted in the light of the Kaiser effect,which has a significant meaning for predicting the unstable failure of engineering rock mass. 展开更多
关键词 rock mechanics red sandstone triaxial deformation spatial AE evolution multi-stage deformation
在线阅读 下载PDF
Performance analysis of mobile ad hoc networks under flooding attacks 被引量:1
13
作者 Ping Yi Futai Zou +1 位作者 Yan Zou Zhiyang Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期334-339,共6页
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects o... Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 展开更多
关键词 mobile ad hoc network SECURITY flooding attack.
在线阅读 下载PDF
Multi-stage Virtual Over-sample Digital Hystersis Control 被引量:1
14
作者 HU Yihua DENG Yan +1 位作者 LIU Quanwei TAO Yong 《中国电机工程学报》 EI CSCD 北大核心 2012年第36期I0001-I0022,21,共22页
Grid-connected current control is one.of the important control schemes in distributed generation systems.A lot of control methods have been developed,such as hysteresis control,dead-beat control,one-cycle control,etc.... Grid-connected current control is one.of the important control schemes in distributed generation systems.A lot of control methods have been developed,such as hysteresis control,dead-beat control,one-cycle control,etc.Hysteresis current control has the advantages of simplicity,robustness and good large-signal response.Unfortunately,the switching frequency of the converter using hysteresis current control varies according to the parameters of the bus voltage,the filter inductor and the bandwidth.Increasing the hysteresis bandwidth and the filter inductance can reduce the switching frequency. 展开更多
关键词 GRID-CONNECTED MULTI-LEVEL multi-stage virtual over:sample hysteresis
在线阅读 下载PDF
A deep reinforcement learning method for multi-stage equipment development planning in uncertain environments 被引量:1
15
作者 LIU Peng XIA Boyuan +2 位作者 YANG Zhiwei LI Jichao TAN Yuejin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第6期1159-1175,共17页
Equipment development planning(EDP)is usually a long-term process often performed in an environment with high uncertainty.The traditional multi-stage dynamic programming cannot cope with this kind of uncertainty with ... Equipment development planning(EDP)is usually a long-term process often performed in an environment with high uncertainty.The traditional multi-stage dynamic programming cannot cope with this kind of uncertainty with unpredictable situations.To deal with this problem,a multi-stage EDP model based on a deep reinforcement learning(DRL)algorithm is proposed to respond quickly to any environmental changes within a reasonable range.Firstly,the basic problem of multi-stage EDP is described,and a mathematical planning model is constructed.Then,for two kinds of uncertainties(future capabi lity requirements and the amount of investment in each stage),a corresponding DRL framework is designed to define the environment,state,action,and reward function for multi-stage EDP.After that,the dueling deep Q-network(Dueling DQN)algorithm is used to solve the multi-stage EDP to generate an approximately optimal multi-stage equipment development scheme.Finally,a case of ten kinds of equipment in 100 possible environments,which are randomly generated,is used to test the feasibility and effectiveness of the proposed models.The results show that the algorithm can respond instantaneously in any state of the multistage EDP environment and unlike traditional algorithms,the algorithm does not need to re-optimize the problem for any change in the environment.In addition,the algorithm can flexibly adjust at subsequent planning stages in the event of a change to the equipment capability requirements to adapt to the new requirements. 展开更多
关键词 equipment development planning(EDP) multi-stage reinforcement learning uncertainty dueling deep Q-network(Dueling DQN)
在线阅读 下载PDF
Thickness distribution of multi-stage incremental forming with different forming stages and angle intervals 被引量:1
16
作者 李军超 杨芬芬 周志强 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第3期842-848,共7页
Although multi-stage incremental sheet forming has always been adopted instead of single-stage forming to form parts with a steep wall angle or to achieve a high forming performance, it is largely dependent on empiric... Although multi-stage incremental sheet forming has always been adopted instead of single-stage forming to form parts with a steep wall angle or to achieve a high forming performance, it is largely dependent on empirical designs. In order to research multi-stage forming further, the effect of forming stages(n) and angle interval between the two adjacent stages(Δα) on thickness distribution was investigated. Firstly, a finite element method(FEM) model of multi-stage incremental forming was established and experimentally verified. Then, based on the proposed simulation model, different strategies were adopted to form a frustum of cone with wall angle of 30° to research the thickness distribution of multi-pass forming. It is proved that the minimum thickness increases largely and the variance of sheet thickness decreases significantly as the value of n grows. Further, with the increase of Δα, the minimum thickness increases initially and then decreases, and the optimal thickness distribution is achieved with Δα of 10°.Additionally, a formula is deduced to estimate the sheet thickness after multi-stage forming and proved to be effective. And the simulation results fit well with the experimental results. 展开更多
关键词 incremental forming multi-stage forming angle interval thickness distribution
在线阅读 下载PDF
Mineral Chemistry of Scheelite as An Indicator of Multi-stage Fluid Evolution Associated with the Riviera W-REE-Mo Deposit South Africa
17
作者 Abraham Rozendaal Rene Heyn 《矿物学报》 CAS CSCD 北大核心 2013年第S1期3-3,共1页
The Neoproterozoic Riviera W-REE-Mo deposit is one of the largest unmined tungsten resources in the world and is associated with pervasively altered A-type granites of the Neoproterozoic Cape Granite Suite Western Cap... The Neoproterozoic Riviera W-REE-Mo deposit is one of the largest unmined tungsten resources in the world and is associated with pervasively altered A-type granites of the Neoproterozoic Cape Granite Suite Western Cape, South Africa. The present study investigated the mineral chemistry of scheelite, the principal ore mineral with the aim to record the variation of solid solution molybdenum for geometallurgical purposes and also as an indicator of changing redox conditions of the mineralizing hydrothermal fluids. Methodology included UV-fluorescence studies and micro-analyses by LA-ICP-MS. Results have shown that at least four phases of scheelite are hosted by the endoskarn zone, potassic alteration zone and various quartz-carbonate veins. This reflects hydrothermal fluid evolution from early stage reduced to late stage, vein associated and more oxidized. The molybdenum content of the dominant early phase scheelite is low and renders the deposit amenable to low penalty mineral recovery. 展开更多
关键词 mineral chemistry multi-stage fluid evolution SCHEELITE the Riviera W-REE-Mo DEPOSIT
在线阅读 下载PDF
高级持续性威胁检测与分析方法研究进展 被引量:3
18
作者 季一木 张嘉铭 +4 位作者 杨倩 杜宏煜 邵思思 张俊杰 刘尚东 《南京邮电大学学报(自然科学版)》 北大核心 2025年第1期1-11,共11页
高级持续性威胁(Advanced Persistent Threat,APT)检测分析是网络安全领域的一个研究热点。APT检测与分析仍然面临着许多挑战,对当前研究进行归纳梳理,总结了APT检测与分析方法研究进展。首先,分析APT攻击威胁建模方法。其次,梳理代表性... 高级持续性威胁(Advanced Persistent Threat,APT)检测分析是网络安全领域的一个研究热点。APT检测与分析仍然面临着许多挑战,对当前研究进行归纳梳理,总结了APT检测与分析方法研究进展。首先,分析APT攻击威胁建模方法。其次,梳理代表性的APT攻击检测方法,包括基于主机和基于网络的相关研究。然后,总结APT攻击分析方法,介绍了攻击溯源与攻击行为推理相关研究。最后,展望未来APT攻击检测与分析的研究方向,以便研究人员了解当前研究现状和拓展研究思路。 展开更多
关键词 高级持续威胁 攻击发现 攻击溯源 攻击推理
在线阅读 下载PDF
面向模型量化的安全性研究综述 被引量:1
19
作者 陈晋音 曹志骐 +1 位作者 郑海斌 郑雅羽 《小型微型计算机系统》 北大核心 2025年第6期1473-1490,共18页
随着边缘智能设备的飞速发展,为了在资源受限的边缘端设备上部署参数和存储需求巨大的深度模型,模型压缩技术显得至关重要.现有的模型压缩主要包含剪枝、量化、知识蒸馏和低秩分解4类,量化凭借推理快、功耗低、存储少的优势,使它成为了... 随着边缘智能设备的飞速发展,为了在资源受限的边缘端设备上部署参数和存储需求巨大的深度模型,模型压缩技术显得至关重要.现有的模型压缩主要包含剪枝、量化、知识蒸馏和低秩分解4类,量化凭借推理快、功耗低、存储少的优势,使它成为了边缘端部署的常用技术.然而,已有的量化方法主要关注的是模型量化后的模型精度损失和内存占用情况,而忽略模型量化可能面临的安全性威胁.因此,针对模型量化的安全性研究显得尤为重要.本文首次针对模型量化的安全性问题展开分析,首先定义了模型量化的攻防理论,其次按照模型量化前和模型量化过程中两个阶段对量化攻击方法和量化防御方法进行分析归纳,整理了针对不同攻击任务进行的通用基准数据集与主要评价指标,最后探讨了模型量化的安全性研究及其应用,以及未来潜在研究方向,进一步推动模型量化的安全性研究发展和应用. 展开更多
关键词 模型量化 模型安全 对抗攻击 后门攻击 隐私窃取 公平性 模型防御
在线阅读 下载PDF
面向深度模型的对抗攻击与对抗防御技术综述 被引量:6
20
作者 王文萱 汪成磊 +2 位作者 齐慧慧 叶梦昊 张艳宁 《信号处理》 北大核心 2025年第2期198-223,共26页
深度学习技术已广泛应用于图像分类和目标检测等计算机视觉核心任务,并取得了瞩目的进展。然而,深度学习模型因其高度的复杂性与内在的不确定性,极易成为对抗样本攻击的靶标。攻击者巧妙地利用数据中细微的、精心设计的扰动,诱导模型以... 深度学习技术已广泛应用于图像分类和目标检测等计算机视觉核心任务,并取得了瞩目的进展。然而,深度学习模型因其高度的复杂性与内在的不确定性,极易成为对抗样本攻击的靶标。攻击者巧妙地利用数据中细微的、精心设计的扰动,诱导模型以极高的置信度输出错误结果,此类对抗样本对实际应用场景中模型的可靠性及安全性构成了严峻的挑战与潜在威胁。例如,攻击者可利用对抗眼镜误导人脸识别系统,导致身份误判,进而实施非法入侵、身份冒用等威胁公共安全和个人隐私的行为;也可对自动驾驶系统的监控数据添加对抗噪声,虽不破坏交通工具本身特征,却可能导致漏检重要交通工具,引发交通混乱甚至事故,造成严重后果。本文旨在梳理当前对抗攻击与对抗防御技术的研究现状。具体而言,内容涵盖以下三个方面:1)在概述对抗样本基本概念和分类的基础上,剖析了多种对抗攻击的形式和策略,并举例介绍了具有代表性的经典对抗样本生成方法;2)阐述对抗样本的防御方法,从模型优化、数据优化和附加网络三个方向系统梳理了当前提高模型对抗鲁棒性的各类算法,分析了各类防御方法的创新性和有效性;3)介绍对抗攻击和对抗防御的应用实例,阐述了大模型时代对抗攻击和防御的发展现状,分析了在实际应用中遇到的挑战及解决方案。最后本文对当前对抗攻击与防御方法进行了总结分析,并展望了该领域内未来的研究方向。 展开更多
关键词 对抗攻击 对抗防御 深度学习 计算机视觉 可信人工智能
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部