Injecting CO_(2)when the gas reservoir of tight sandstone is depleted can achieve the dual purposes of greenhouse gas storage and enhanced gas recovery(CS-EGR).To evaluate the feasibility of CO_(2)injection to enhance...Injecting CO_(2)when the gas reservoir of tight sandstone is depleted can achieve the dual purposes of greenhouse gas storage and enhanced gas recovery(CS-EGR).To evaluate the feasibility of CO_(2)injection to enhance gas recovery and understand the production mechanism,a numerical simulation model of CS-EGR in multi-stage fracturing horizontal wells is established.The behavior of gas production and CO_(2)sequestration is then analyzed through numerical simulation,and the impact of fracture parameters on production performance is examined.Simulation results show that the production rate increases significantly and a large amount of CO_(2)is stored in the reservoir,proving the technical potential.However,hydraulic fractures accelerate CO_(2)breakthrough,resulting in lower gas recovery and lower CO_(2)storage than in gas reservoirs without fracturing.Increasing the length of hydraulic fractures can significantly increase CH4production,but CO_(2)breakthrough will advance.Staggered and spaced perforation of hydraulic fractures in injection wells and production wells changes the fluid flow path,which can delay CO_(2)breakthrough and benefit production efficiency.The fracture network of massive hydraulic fracturing has a positive effect on the CS-EGR.As a result,CH4production,gas recovery,and CO_(2)storage increase with the increase in stimulated reservoir volume.展开更多
UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising te...UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising technology.However,the coexistence of UAV and D2D aggravates the conflict of spectrum resources.In addition,when the UAV performs the communication service,it will inevitably cause the location change,which will make the original channel allocation no longer applicable.Inspired by the influence of frequent channel switching on channel allocation,we define the communication utility as a tradeoff between the throughput and channel switching cost.In the considered model,we investigate the multi-stage hierarchical spectrum access problem with maximizing aggregate communication utilities in UAV-assisted D2D networks.In particular,due to the hierarchical feature of the considered network,we adopt Stackelberg game to formulate this spectrum access problem where both the throughput and channel switching cost are considered.We prove that the proposed game has a stable Stackelberg equilibrium(SE),and the heterogeneous network based channel allocation(HN-CA)algorithm is proposed to achieve the desired solution.Simulation results verify the validity of the proposed game and show the effectiveness of the HN-CA algorithm.展开更多
A 22-stage 4 MV laser-triggered multistage multi-channel switch (LTS) was designed according to the hypothesis that the well-proportioned electrical field distribution is helpful in reducing the jitter of delay. Fie...A 22-stage 4 MV laser-triggered multistage multi-channel switch (LTS) was designed according to the hypothesis that the well-proportioned electrical field distribution is helpful in reducing the jitter of delay. Field distribution in the switch section is regulated by a metal field regulation ring and several gradient rings. In order to reduce the jitter further, a SFB/N2 mixture is chosen as the switching medium. The generalized standard deviation of the self-breakdown voltage and the deviation of the average value from the prediction is less than 4.4% and 13% respectively. Linearity of the self-breakdown voltage is better than 0.95. Triggered by a laser pulse of 35 mJ/3 ns, the delay is about 26 ns at a working voltage of 85±3% USB (Self-breakdown Voltage). Maximum deviation of delay is less than =t=2.5 ns. Jitter is less than 1.5 ns. The delay and jitter decrease with the increase in the working ratio (the ratio of working voltage to USB), pressure or voltage.展开更多
Nowadays, security defence of network uses the game theory, which mostly applies complete information game model or even the static game model. To get closer to the actual network and defend actively, we propose a net...Nowadays, security defence of network uses the game theory, which mostly applies complete information game model or even the static game model. To get closer to the actual network and defend actively, we propose a network attack-defence game model by using signalling game, which is modelled in the way of dynamic and incomplete information. We improve the traditional attack-defence strategies quantization method to meet the needs of the network signalling game model. Moreover, we give the calculation of the game equilibrium and analyse the optimal defence scheme. Finally, we analyse and verify effectiveness of the model and method through a simulation experiment.展开更多
To resolve the issue of design for multi-stage and multi-cluster fracturing in multi-zone reservoirs, a new efficient algorithm for the planar 3 D multi-fracture propagation model was proposed. The model considers flu...To resolve the issue of design for multi-stage and multi-cluster fracturing in multi-zone reservoirs, a new efficient algorithm for the planar 3 D multi-fracture propagation model was proposed. The model considers fluid flow in the wellbore-perforation-fracture system and fluid leak-off into the rock matrix, and uses a 3 D boundary integral equation to describe the solid deformation. The solid-fluid coupling equation is solved by an explicit integration algorithm, and the fracture front is determined by the uniform tip asymptotic solutions and shortest path algorithm. The accuracy of the algorithm is verified by the analytical solution of radial fracture, results of the implicit level set algorithm, and results of organic glass fracturing experiment. Compared with the implicit level set algorithm(ILSA), the new algorithm is much higher in computation speed. The numerical case study is conducted based on a horizontal well in shale gas formation of Zhejiang oilfield. The impact of stress heterogeneity among multiple clusters and perforation number distribution on multi-fracture growth and fluid distribution among multiple fractures are analyzed by numerical simulation. The results show that reducing perforation number in each cluster can counteract the effect of stress contrast among perforation clusters. Adjusting perforation number in each cluster can promote uniform flux among clusters, and the perforation number difference should better be 1-2 among clusters. Increasing perforation number in the cluster with high in situ stress is conducive to uniform fluid partitioning. However, uniform fluid partitioning is not equivalent to uniform fracture geometry. The fracture geometry is controlled by the stress interference and horizontal principal stress profile jointly.展开更多
To reduce the carbon footprint in the transportation sector and improve overall vehicle efficiency,a large number of electric vehicles are being manufactured.This is due to the fact that environmental concerns and the...To reduce the carbon footprint in the transportation sector and improve overall vehicle efficiency,a large number of electric vehicles are being manufactured.This is due to the fact that environmental concerns and the depletion of fossil fuels have become significant global problems.Lithium-ion batteries(LIBs)have been distinguished themselves from alternative energy storage technologies for electric vehicles(EVs) due to superior qualities like high energy and power density,extended cycle life,and low maintenance cost to a competitive price.However,there are still certain challenges to be solved,like EV fast charging,longer lifetime,and reduced weight.For fast charging,the multi-stage constant current(MSCC) charging technique is an emerging solution to improve charging efficiency,reduce temperature rise during charging,increase charging/discharging capacities,shorten charging time,and extend the cycle life.However,there are large variations in the implementation of the number of stages,stage transition criterion,and C-rate selection for each stage.This paper provides a review of these problems by compiling information from the literature.An overview of the impact of different design parameters(number of stages,stage transition,and C-rate) that the MSCC charging techniques have had on the LIB performance and cycle life is described in detail and analyzed.The impact of design parameters on lifetime,charging efficiency,charging and discharging capacity,charging speed,and rising temperature during charging is presented,and this review provides guidelines for designing advanced fast charging strategies and determining future research gaps.展开更多
A novel laboratory simulation method for modeling multi-staged fracturing in a horizontal well was established based on a true tri-axial hydraulic fracturing simulation system. Using this method, the influences of net...A novel laboratory simulation method for modeling multi-staged fracturing in a horizontal well was established based on a true tri-axial hydraulic fracturing simulation system. Using this method, the influences of net pressure in hydraulic fracture, stage spacing, perforation parameter, horizontal stress bias and well cementation quality on the propagation geometry of multiple fractures in a tight sandstone formation were studied in detail. The specimen splitting and analogy analysis of fracturing curve patterns reveals: Multiple fractures tend to merge under the condition of high horizontal stress bias and short stage spacing with pre-existing hydraulic fractures under critical closure situation, and the propagation of subsequent fractures is possibly suppressed because of high net pressure in pre-created fractures and asymmetric distribution of fracture width. And the subsequently created fractures are situated in the induced stress decreasing zone due to long stage spacing, leading to weak stress interference, and perforation with intense density and deep penetration facilitates the decrease of initiation fracture pressure. The deflection angle of subsequent fracture and horizontal stress variation tend to be amplified under low horizontal bias with constant net pressure in fractures. The longitudinal fracture is likely to be initiated at the interface of wellbore and concrete sample with poor cementation quality. The initiation fracture pressure of the different stages increases in turn, with the largest increase of 30%. Pressure quickly declines after initiation with low propagation pressure when the transverse hydraulic fracture is formed. The pressure reduces with fluctuation after the initiation of fracture when the fracture deflects, the extension pressure is high, and the fracture formed is tortuous and narrow. There is a violently fluctuant rise of pressure with multiple peak values when longitudinal fracture created, and it is hard to distinguish the features between the initiation stage and propagation stage.展开更多
In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforc...In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforcement thresholds are considered. An information outbreak condition is derived, according to which the outbreak scale and individual density of each state under specific propagation parameters can be deduced. Monte Carlo experiments are conducted in Facebook networks to demonstrate the outbreak condition, and we find that social reinforcement effects generally inhibit the propagation of information though it contributes to the emergence of certain hot spots simultaneously. Additionally, by applying Pontryagin's Maximum Principle, we derive the optimal control strategy in the case of limited control resources to maximize the information propagation. Then the forward–backward sweep method is utilized to verify its performance with numerical simulation.展开更多
In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amount...In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amounts of local data,computing capabilities and locations of the vehicles,renewing the global model with same weight is inappropriate.The above factors will affect the local calculation time and upload time of the local model,and the vehicle may also be affected by Byzantine attacks,leading to the deterioration of the vehicle data.However,based on deep reinforcement learning(DRL),we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL.At the same time,when aggregating AFL,we can focus on those vehicles with better performance to improve the accuracy and safety of the system.In this paper,we proposed a vehicle selection scheme based on DRL in VEC.In this scheme,vehicle’s mobility,channel conditions with temporal variations,computational resources with temporal variations,different data amount,transmission channel status of vehicles as well as Byzantine attacks were taken into account.Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model.展开更多
Conventional multi-stage constant current charging strategies often use higher multiples of current to charge the battery in pursuit of shorter charging times.However,this leads to an increase in battery temperature,w...Conventional multi-stage constant current charging strategies often use higher multiples of current to charge the battery in pursuit of shorter charging times.However,this leads to an increase in battery temperature,while shortening the charging time.This in turn affects the safety of the charging process.Furthermore,the higher charging currents are not ideal for shortening the charging time in the later stages of charging.To solve the aforementioned problems,in this study,a multi-stage constant current charging strategy is presented.This strategy can shorten the battery charging time by using the increase in battery temperature during the charging process as a constraint,using a genetic algorithm to calculate the charging current value,and investigating the phased approach to charging.Finally,the charging strategy is experimentally validated at different ambient temperatures and different initial SOCs.The experimental results show that the charging strategy proposed in this paper not only reduces the amount of calculations,but also reduces the temperature rise by up to 46.4%and charging time by up to 4.2%under different operating conditions.展开更多
A lumped-equivalent circuit model of a novel magnetoelectric tunable bandpass filter, which is realized in the form of multi-stage cascading between a plurality of magnetoelectric laminates, is established in this pap...A lumped-equivalent circuit model of a novel magnetoelectric tunable bandpass filter, which is realized in the form of multi-stage cascading between a plurality of magnetoelectric laminates, is established in this paper for convenient analysis.The multi-stage cascaded filter is degraded to the coupling microstrip filter with only one magnetoelectric laminate and then compared with the existing experiment results. The comparison reveals that the insertion loss curves predicted by the degraded circuit model are in good agreement with the experiment results and the predicted results of the electromagnetic field simulation, thus the validity of the model is verified. The model is then degraded to the two-stage cascaded magnetoelectric filter with two magnetoelectric laminates. It is revealed that if the applied external bias magnetic or electric fields on the two magnetoelectric laminates are identical, then the passband of the filter will drift under the changed external field; that is to say, the filter has the characteristics of external magnetic field tunability and electric field tunability. If the applied external bias magnetic or electric fields on two magnetoelectric laminates are different, then the passband will disappear so that the switching characteristic is achieved. When the same magnetic fields are applied to the laminates, the passband bandwidth of the two-stage cascaded magnetoelectric filter with two magnetoelectric laminates becomes nearly doubled in comparison with the passband filter which contains only one magnetoelectric laminate. The bandpass effect is also improved obviously. This research will provide a theoretical basis for the design, preparation, and application of a new high performance magnetoelectric tunable microwave device.展开更多
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct...The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping function to translate memory address to the cache address,while the updated-based channel is still vulnerable.In addition,some mitigation strategies are also costly as it needs software and hardware modifications.In this paper,our objective is to devise low-cost,comprehensive-protection techniques for mitigating the Spectre attacks.We proposed a novel cache structure,named EBCache,which focuses on the RISC-V processor and applies the address encryption and blacklist to resist the Spectre attacks.The addresses encryption mechanism increases the difficulty of pruning a minimal eviction set.The blacklist mechanism makes the updated cache lines loaded by the malicious updates invisible.Our experiments demonstrated that the EBCache can prevent malicious modifications.The EBCache,however,reduces the processor’s performance by about 23%but involves only a low-cost modification in the hardware.展开更多
Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical a...Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs.展开更多
Link flooding attack(LFA)is a type of covert distributed denial of service(DDoS)attack.The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet.Recently,t...Link flooding attack(LFA)is a type of covert distributed denial of service(DDoS)attack.The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet.Recently,the proliferation of Internet of Things(IoT)has increased the quantity of vulnerable devices connected to the network and has intensified the threat of LFAs.In LFAs,attackers typically utilize low-speed flows that do not reach the victims,making the attack difficult to detect.Traditional LFA defense methods mainly reroute the attack traffic around the congested link,which encounters high complexity and high computational overhead due to the aggregation of massive attack traffic.To address these challenges,we present an LFA defense framework which can mitigate the attack flows at the border switches when they are small in scale.This framework is lightweight and can be deployed at border switches of the network in a distributed manner,which ensures the scalability of our defense system.The performance of our framework is assessed in an experimental environment.The simulation results indicate that our method is effective in detecting and mitigating LFAs with low time complexity.展开更多
Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main ...Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main attack modes referred to as reference pulse attack and polarization attack presently.However,there is currently no general defense strategy against such attacks,and the security of the system needs further investigation.Here,we employ a deep learning framework called generative adversarial networks(GANs)to detect both attacks.We first analyze the data in different cases,derive a feature vector as input to a GAN model,and then show the training and testing process of the GAN model for attack classification.The proposed model has two parts,a discriminator and a generator,both of which employ a convolutional neural network(CNN)to improve accuracy.Simulation results show that the proposed scheme can detect and classify attacks without reducing the secret key rate and the maximum transmission distance.It only establishes a detection model by monitoring features of the pulse without adding additional devices.展开更多
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently...A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.展开更多
In recent years,attacks against crowded places such as campuses and theaters have had a frequent and negative impact on the security and stability of society.In such an event,the crowd will be subjected to high psycho...In recent years,attacks against crowded places such as campuses and theaters have had a frequent and negative impact on the security and stability of society.In such an event,the crowd will be subjected to high psychological stress and their emotions will rapidly spread to others.This paper establishes the attack-escape evacuation simulation model(AEES-SFM),based on the social force model,to consider emotion spreading under attack.In this model,(1)the attack-escape driving force is considered for the interaction between an attacker and evacuees and(2)emotion spreading among the evacuees is considered to modify the value of the psychological force.To validate the simulation,several experiments were carried out at a university in China.Comparing the simulation and experimental results,it is found that the simulation results are similar to the experimental results when considering emotion spreading.Therefore,the AEES-SFM is proved to be effective.By comparing the results of the evacuation simulation without emotion spreading,the emotion spreading model reduces the evacuation time and the number of casualties by about 30%,which is closer to the real experimental results.The results are still applicable in the case of a 40-person evacuation.This paper provides theoretical support and practical guidance for campus response to violent attacks.展开更多
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ...Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.展开更多
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi...Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions.展开更多
基金the financial support of the National Natural Science Foundation of China(Grant No.52304018)China Postdoctoral Science Foundation(Grant No.2023TQ0014,Grant No.2023M730088)。
文摘Injecting CO_(2)when the gas reservoir of tight sandstone is depleted can achieve the dual purposes of greenhouse gas storage and enhanced gas recovery(CS-EGR).To evaluate the feasibility of CO_(2)injection to enhance gas recovery and understand the production mechanism,a numerical simulation model of CS-EGR in multi-stage fracturing horizontal wells is established.The behavior of gas production and CO_(2)sequestration is then analyzed through numerical simulation,and the impact of fracture parameters on production performance is examined.Simulation results show that the production rate increases significantly and a large amount of CO_(2)is stored in the reservoir,proving the technical potential.However,hydraulic fractures accelerate CO_(2)breakthrough,resulting in lower gas recovery and lower CO_(2)storage than in gas reservoirs without fracturing.Increasing the length of hydraulic fractures can significantly increase CH4production,but CO_(2)breakthrough will advance.Staggered and spaced perforation of hydraulic fractures in injection wells and production wells changes the fluid flow path,which can delay CO_(2)breakthrough and benefit production efficiency.The fracture network of massive hydraulic fracturing has a positive effect on the CS-EGR.As a result,CH4production,gas recovery,and CO_(2)storage increase with the increase in stimulated reservoir volume.
基金This work is supported by the Jiangsu Provincial Natural Science Fund for Outstanding Young Scholars(No.BK20180028)the Natural Science Foundations of China(No.61671474)+1 种基金the Jiangsu Provincial Natural Science Fund for Excellent Young Scholars(No.BK20170089)and in part by Postgraduate Research and Practice Innovation Program of Jiangsu Province under No.KYCX190188.
文摘UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising technology.However,the coexistence of UAV and D2D aggravates the conflict of spectrum resources.In addition,when the UAV performs the communication service,it will inevitably cause the location change,which will make the original channel allocation no longer applicable.Inspired by the influence of frequent channel switching on channel allocation,we define the communication utility as a tradeoff between the throughput and channel switching cost.In the considered model,we investigate the multi-stage hierarchical spectrum access problem with maximizing aggregate communication utilities in UAV-assisted D2D networks.In particular,due to the hierarchical feature of the considered network,we adopt Stackelberg game to formulate this spectrum access problem where both the throughput and channel switching cost are considered.We prove that the proposed game has a stable Stackelberg equilibrium(SE),and the heterogeneous network based channel allocation(HN-CA)algorithm is proposed to achieve the desired solution.Simulation results verify the validity of the proposed game and show the effectiveness of the HN-CA algorithm.
文摘A 22-stage 4 MV laser-triggered multistage multi-channel switch (LTS) was designed according to the hypothesis that the well-proportioned electrical field distribution is helpful in reducing the jitter of delay. Field distribution in the switch section is regulated by a metal field regulation ring and several gradient rings. In order to reduce the jitter further, a SFB/N2 mixture is chosen as the switching medium. The generalized standard deviation of the self-breakdown voltage and the deviation of the average value from the prediction is less than 4.4% and 13% respectively. Linearity of the self-breakdown voltage is better than 0.95. Triggered by a laser pulse of 35 mJ/3 ns, the delay is about 26 ns at a working voltage of 85±3% USB (Self-breakdown Voltage). Maximum deviation of delay is less than =t=2.5 ns. Jitter is less than 1.5 ns. The delay and jitter decrease with the increase in the working ratio (the ratio of working voltage to USB), pressure or voltage.
基金supported by the National Natural Science Foundation of China under Grant No. 61303074 and No. 61309013the Henan Province Science and Technology Project Funds under Grant No. 12210231002
文摘Nowadays, security defence of network uses the game theory, which mostly applies complete information game model or even the static game model. To get closer to the actual network and defend actively, we propose a network attack-defence game model by using signalling game, which is modelled in the way of dynamic and incomplete information. We improve the traditional attack-defence strategies quantization method to meet the needs of the network signalling game model. Moreover, we give the calculation of the game equilibrium and analyse the optimal defence scheme. Finally, we analyse and verify effectiveness of the model and method through a simulation experiment.
基金China National Science and Technology Major Project(2016ZX05023).
文摘To resolve the issue of design for multi-stage and multi-cluster fracturing in multi-zone reservoirs, a new efficient algorithm for the planar 3 D multi-fracture propagation model was proposed. The model considers fluid flow in the wellbore-perforation-fracture system and fluid leak-off into the rock matrix, and uses a 3 D boundary integral equation to describe the solid deformation. The solid-fluid coupling equation is solved by an explicit integration algorithm, and the fracture front is determined by the uniform tip asymptotic solutions and shortest path algorithm. The accuracy of the algorithm is verified by the analytical solution of radial fracture, results of the implicit level set algorithm, and results of organic glass fracturing experiment. Compared with the implicit level set algorithm(ILSA), the new algorithm is much higher in computation speed. The numerical case study is conducted based on a horizontal well in shale gas formation of Zhejiang oilfield. The impact of stress heterogeneity among multiple clusters and perforation number distribution on multi-fracture growth and fluid distribution among multiple fractures are analyzed by numerical simulation. The results show that reducing perforation number in each cluster can counteract the effect of stress contrast among perforation clusters. Adjusting perforation number in each cluster can promote uniform flux among clusters, and the perforation number difference should better be 1-2 among clusters. Increasing perforation number in the cluster with high in situ stress is conducive to uniform fluid partitioning. However, uniform fluid partitioning is not equivalent to uniform fracture geometry. The fracture geometry is controlled by the stress interference and horizontal principal stress profile jointly.
文摘To reduce the carbon footprint in the transportation sector and improve overall vehicle efficiency,a large number of electric vehicles are being manufactured.This is due to the fact that environmental concerns and the depletion of fossil fuels have become significant global problems.Lithium-ion batteries(LIBs)have been distinguished themselves from alternative energy storage technologies for electric vehicles(EVs) due to superior qualities like high energy and power density,extended cycle life,and low maintenance cost to a competitive price.However,there are still certain challenges to be solved,like EV fast charging,longer lifetime,and reduced weight.For fast charging,the multi-stage constant current(MSCC) charging technique is an emerging solution to improve charging efficiency,reduce temperature rise during charging,increase charging/discharging capacities,shorten charging time,and extend the cycle life.However,there are large variations in the implementation of the number of stages,stage transition criterion,and C-rate selection for each stage.This paper provides a review of these problems by compiling information from the literature.An overview of the impact of different design parameters(number of stages,stage transition,and C-rate) that the MSCC charging techniques have had on the LIB performance and cycle life is described in detail and analyzed.The impact of design parameters on lifetime,charging efficiency,charging and discharging capacity,charging speed,and rising temperature during charging is presented,and this review provides guidelines for designing advanced fast charging strategies and determining future research gaps.
文摘A novel laboratory simulation method for modeling multi-staged fracturing in a horizontal well was established based on a true tri-axial hydraulic fracturing simulation system. Using this method, the influences of net pressure in hydraulic fracture, stage spacing, perforation parameter, horizontal stress bias and well cementation quality on the propagation geometry of multiple fractures in a tight sandstone formation were studied in detail. The specimen splitting and analogy analysis of fracturing curve patterns reveals: Multiple fractures tend to merge under the condition of high horizontal stress bias and short stage spacing with pre-existing hydraulic fractures under critical closure situation, and the propagation of subsequent fractures is possibly suppressed because of high net pressure in pre-created fractures and asymmetric distribution of fracture width. And the subsequently created fractures are situated in the induced stress decreasing zone due to long stage spacing, leading to weak stress interference, and perforation with intense density and deep penetration facilitates the decrease of initiation fracture pressure. The deflection angle of subsequent fracture and horizontal stress variation tend to be amplified under low horizontal bias with constant net pressure in fractures. The longitudinal fracture is likely to be initiated at the interface of wellbore and concrete sample with poor cementation quality. The initiation fracture pressure of the different stages increases in turn, with the largest increase of 30%. Pressure quickly declines after initiation with low propagation pressure when the transverse hydraulic fracture is formed. The pressure reduces with fluctuation after the initiation of fracture when the fracture deflects, the extension pressure is high, and the fracture formed is tortuous and narrow. There is a violently fluctuant rise of pressure with multiple peak values when longitudinal fracture created, and it is hard to distinguish the features between the initiation stage and propagation stage.
基金Project supported by the National Natural Science Foundation of China(Grant No.61873194)
文摘In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforcement thresholds are considered. An information outbreak condition is derived, according to which the outbreak scale and individual density of each state under specific propagation parameters can be deduced. Monte Carlo experiments are conducted in Facebook networks to demonstrate the outbreak condition, and we find that social reinforcement effects generally inhibit the propagation of information though it contributes to the emergence of certain hot spots simultaneously. Additionally, by applying Pontryagin's Maximum Principle, we derive the optimal control strategy in the case of limited control resources to maximize the information propagation. Then the forward–backward sweep method is utilized to verify its performance with numerical simulation.
基金supported in part by the National Natural Science Foundation of China(No.61701197)in part by the National Key Research and Development Program of China(No.2021YFA1000500(4))in part by the 111 Project(No.B23008).
文摘In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amounts of local data,computing capabilities and locations of the vehicles,renewing the global model with same weight is inappropriate.The above factors will affect the local calculation time and upload time of the local model,and the vehicle may also be affected by Byzantine attacks,leading to the deterioration of the vehicle data.However,based on deep reinforcement learning(DRL),we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL.At the same time,when aggregating AFL,we can focus on those vehicles with better performance to improve the accuracy and safety of the system.In this paper,we proposed a vehicle selection scheme based on DRL in VEC.In this scheme,vehicle’s mobility,channel conditions with temporal variations,computational resources with temporal variations,different data amount,transmission channel status of vehicles as well as Byzantine attacks were taken into account.Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model.
基金supported by National Natural Science Foundation of China (Grant No. 51677058)
文摘Conventional multi-stage constant current charging strategies often use higher multiples of current to charge the battery in pursuit of shorter charging times.However,this leads to an increase in battery temperature,while shortening the charging time.This in turn affects the safety of the charging process.Furthermore,the higher charging currents are not ideal for shortening the charging time in the later stages of charging.To solve the aforementioned problems,in this study,a multi-stage constant current charging strategy is presented.This strategy can shorten the battery charging time by using the increase in battery temperature during the charging process as a constraint,using a genetic algorithm to calculate the charging current value,and investigating the phased approach to charging.Finally,the charging strategy is experimentally validated at different ambient temperatures and different initial SOCs.The experimental results show that the charging strategy proposed in this paper not only reduces the amount of calculations,but also reduces the temperature rise by up to 46.4%and charging time by up to 4.2%under different operating conditions.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11172285 and 11472259)the Natural Science Foundation of Zhejiang Province,China(Grant No.LR13A020002)
文摘A lumped-equivalent circuit model of a novel magnetoelectric tunable bandpass filter, which is realized in the form of multi-stage cascading between a plurality of magnetoelectric laminates, is established in this paper for convenient analysis.The multi-stage cascaded filter is degraded to the coupling microstrip filter with only one magnetoelectric laminate and then compared with the existing experiment results. The comparison reveals that the insertion loss curves predicted by the degraded circuit model are in good agreement with the experiment results and the predicted results of the electromagnetic field simulation, thus the validity of the model is verified. The model is then degraded to the two-stage cascaded magnetoelectric filter with two magnetoelectric laminates. It is revealed that if the applied external bias magnetic or electric fields on the two magnetoelectric laminates are identical, then the passband of the filter will drift under the changed external field; that is to say, the filter has the characteristics of external magnetic field tunability and electric field tunability. If the applied external bias magnetic or electric fields on two magnetoelectric laminates are different, then the passband will disappear so that the switching characteristic is achieved. When the same magnetic fields are applied to the laminates, the passband bandwidth of the two-stage cascaded magnetoelectric filter with two magnetoelectric laminates becomes nearly doubled in comparison with the passband filter which contains only one magnetoelectric laminate. The bandpass effect is also improved obviously. This research will provide a theoretical basis for the design, preparation, and application of a new high performance magnetoelectric tunable microwave device.
基金This work was supported in part by the China Ministry of Science and Technology under Grant 2015GA600002。
文摘The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping function to translate memory address to the cache address,while the updated-based channel is still vulnerable.In addition,some mitigation strategies are also costly as it needs software and hardware modifications.In this paper,our objective is to devise low-cost,comprehensive-protection techniques for mitigating the Spectre attacks.We proposed a novel cache structure,named EBCache,which focuses on the RISC-V processor and applies the address encryption and blacklist to resist the Spectre attacks.The addresses encryption mechanism increases the difficulty of pruning a minimal eviction set.The blacklist mechanism makes the updated cache lines loaded by the malicious updates invisible.Our experiments demonstrated that the EBCache can prevent malicious modifications.The EBCache,however,reduces the processor’s performance by about 23%but involves only a low-cost modification in the hardware.
基金supported by the National Nature Science Foundation of China under 62203376the Science and Technology Plan of Hebei Education Department under QN2021139+1 种基金the Nature Science Foundation of Hebei Province under F2021203043the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network,Nanjing Institute of Technology under No.XTCX202203.
文摘Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs.
基金supported in part by the National Key R&D Program of China under Grant 2018YFA0701601in part by the National Natural Science Foundation of China(Grant No.62201605,62341110,U22A2002)in part by Tsinghua University-China Mobile Communications Group Co.,Ltd.Joint Institute。
文摘Link flooding attack(LFA)is a type of covert distributed denial of service(DDoS)attack.The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet.Recently,the proliferation of Internet of Things(IoT)has increased the quantity of vulnerable devices connected to the network and has intensified the threat of LFAs.In LFAs,attackers typically utilize low-speed flows that do not reach the victims,making the attack difficult to detect.Traditional LFA defense methods mainly reroute the attack traffic around the congested link,which encounters high complexity and high computational overhead due to the aggregation of massive attack traffic.To address these challenges,we present an LFA defense framework which can mitigate the attack flows at the border switches when they are small in scale.This framework is lightweight and can be deployed at border switches of the network in a distributed manner,which ensures the scalability of our defense system.The performance of our framework is assessed in an experimental environment.The simulation results indicate that our method is effective in detecting and mitigating LFAs with low time complexity.
基金Project supported by the National Natural Science Foundation of China(Grant No.62001383)。
文摘Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main attack modes referred to as reference pulse attack and polarization attack presently.However,there is currently no general defense strategy against such attacks,and the security of the system needs further investigation.Here,we employ a deep learning framework called generative adversarial networks(GANs)to detect both attacks.We first analyze the data in different cases,derive a feature vector as input to a GAN model,and then show the training and testing process of the GAN model for attack classification.The proposed model has two parts,a discriminator and a generator,both of which employ a convolutional neural network(CNN)to improve accuracy.Simulation results show that the proposed scheme can detect and classify attacks without reducing the secret key rate and the maximum transmission distance.It only establishes a detection model by monitoring features of the pulse without adding additional devices.
基金National Natural Science Foundation of China(62372464)。
文摘A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.
基金Project supported by the National Natural Science Foundation of China(Grant No.72274208)。
文摘In recent years,attacks against crowded places such as campuses and theaters have had a frequent and negative impact on the security and stability of society.In such an event,the crowd will be subjected to high psychological stress and their emotions will rapidly spread to others.This paper establishes the attack-escape evacuation simulation model(AEES-SFM),based on the social force model,to consider emotion spreading under attack.In this model,(1)the attack-escape driving force is considered for the interaction between an attacker and evacuees and(2)emotion spreading among the evacuees is considered to modify the value of the psychological force.To validate the simulation,several experiments were carried out at a university in China.Comparing the simulation and experimental results,it is found that the simulation results are similar to the experimental results when considering emotion spreading.Therefore,the AEES-SFM is proved to be effective.By comparing the results of the evacuation simulation without emotion spreading,the emotion spreading model reduces the evacuation time and the number of casualties by about 30%,which is closer to the real experimental results.The results are still applicable in the case of a 40-person evacuation.This paper provides theoretical support and practical guidance for campus response to violent attacks.
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China under Grant No.61521003the National Natural Science Foundation of China under Grant No.62072467 and 62002383.
文摘Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 12247104 and 12047503)。
文摘Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions.