期刊文献+
共找到6,653篇文章
< 1 2 250 >
每页显示 20 50 100
Anti-Byzantine Attacks Enabled Vehicle Selection for Asynchronous Federated Learning in Vehicular Edge Computing 被引量:1
1
作者 Zhang Cui Xu Xiao +4 位作者 Wu Qiong Fan Pingyi Fan Qiang Zhu Huiling Wang Jiangzhou 《China Communications》 SCIE CSCD 2024年第8期1-17,共17页
In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amount... In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amounts of local data,computing capabilities and locations of the vehicles,renewing the global model with same weight is inappropriate.The above factors will affect the local calculation time and upload time of the local model,and the vehicle may also be affected by Byzantine attacks,leading to the deterioration of the vehicle data.However,based on deep reinforcement learning(DRL),we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL.At the same time,when aggregating AFL,we can focus on those vehicles with better performance to improve the accuracy and safety of the system.In this paper,we proposed a vehicle selection scheme based on DRL in VEC.In this scheme,vehicle’s mobility,channel conditions with temporal variations,computational resources with temporal variations,different data amount,transmission channel status of vehicles as well as Byzantine attacks were taken into account.Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model. 展开更多
关键词 asynchronous federated learning byzantine attacks vehicle selection vehicular edge computing
在线阅读 下载PDF
EBCache:A Novel Cache-Based Mechanism for Mitigating the Spectre Attacks for RISC-V Processor
2
作者 Wu Dehua Xiao Wan’ang Gao Wanlin 《China Communications》 SCIE CSCD 2024年第12期166-185,共20页
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct... The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping function to translate memory address to the cache address,while the updated-based channel is still vulnerable.In addition,some mitigation strategies are also costly as it needs software and hardware modifications.In this paper,our objective is to devise low-cost,comprehensive-protection techniques for mitigating the Spectre attacks.We proposed a novel cache structure,named EBCache,which focuses on the RISC-V processor and applies the address encryption and blacklist to resist the Spectre attacks.The addresses encryption mechanism increases the difficulty of pruning a minimal eviction set.The blacklist mechanism makes the updated cache lines loaded by the malicious updates invisible.Our experiments demonstrated that the EBCache can prevent malicious modifications.The EBCache,however,reduces the processor’s performance by about 23%but involves only a low-cost modification in the hardware. 展开更多
关键词 cache structure out-of-order execution side-channel attacks the Spectre attacks
在线阅读 下载PDF
Novel cyber-physical collaborative detection and localization method against dynamic load altering attacks in smart energy grids
3
作者 Xinyu Wang Xiangjie Wang +2 位作者 Xiaoyuan Luo Xinping Guan Shuzheng Wang 《Global Energy Interconnection》 EI CSCD 2024年第3期362-376,共15页
Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical a... Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs. 展开更多
关键词 Smart energy grids Cyber-physical system Dynamic load altering attacks attack prediction Detection and localization
在线阅读 下载PDF
Discrete multi-step phase hologram for high frequency acoustic modulation
4
作者 周梦晴 李照希 +6 位作者 李怡 王业成 张娟 谌东东 全熠 杨银堂 费春龙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期488-495,共8页
Acoustic holograms can recover wavefront stored acoustic field information and produce high-fidelity complex acoustic fields. Benefiting from the huge spatial information that traditional acoustic elements cannot matc... Acoustic holograms can recover wavefront stored acoustic field information and produce high-fidelity complex acoustic fields. Benefiting from the huge spatial information that traditional acoustic elements cannot match, acoustic holograms pursue the realization of high-resolution complex acoustic fields and gradually tend to high-frequency ultrasound applications. However, conventional continuous phase holograms are limited by three-dimensional(3D) printing size, and the presence of unavoidable small printing errors makes it difficult to achieve acoustic field reconstruction at high frequency accuracy. Here, we present an optimized discrete multi-step phase hologram. It can ensure the reconstruction quality of image with high robustness, and properly lower the requirement for the 3D printing accuracy. Meanwhile, the concept of reconstruction similarity is proposed to refine a measure of acoustic field quality. In addition, the realized complex acoustic field at 20 MHz promotes the application of acoustic holograms at high frequencies and provides a new way to generate high-fidelity acoustic fields. 展开更多
关键词 discrete multi-step phase hologram econstruction quality 3D printing accuracy high-fidelity
在线阅读 下载PDF
Mitigating while Accessing:A Lightweight Defense Framework Against Link Flooding Attacks in SDN
5
作者 Sun Hancun Chen Xu +1 位作者 Luo Yantian Ge Ning 《China Communications》 SCIE CSCD 2024年第11期15-27,共13页
Link flooding attack(LFA)is a type of covert distributed denial of service(DDoS)attack.The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet.Recently,t... Link flooding attack(LFA)is a type of covert distributed denial of service(DDoS)attack.The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet.Recently,the proliferation of Internet of Things(IoT)has increased the quantity of vulnerable devices connected to the network and has intensified the threat of LFAs.In LFAs,attackers typically utilize low-speed flows that do not reach the victims,making the attack difficult to detect.Traditional LFA defense methods mainly reroute the attack traffic around the congested link,which encounters high complexity and high computational overhead due to the aggregation of massive attack traffic.To address these challenges,we present an LFA defense framework which can mitigate the attack flows at the border switches when they are small in scale.This framework is lightweight and can be deployed at border switches of the network in a distributed manner,which ensures the scalability of our defense system.The performance of our framework is assessed in an experimental environment.The simulation results indicate that our method is effective in detecting and mitigating LFAs with low time complexity. 展开更多
关键词 attack mitigation distributed denial of service(DDoS) link flooding attack(LFA) software defined networking(SDN)
在线阅读 下载PDF
General multi-attack detection for continuous-variable quantum key distribution with local local oscillator
6
作者 康茁 刘维琪 +1 位作者 齐锦 贺晨 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期255-262,共8页
Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main ... Continuous-variable quantum key distribution with a local local oscillator(LLO CVQKD)has been extensively researched due to its simplicity and security.For practical security of an LLO CVQKD system,there are two main attack modes referred to as reference pulse attack and polarization attack presently.However,there is currently no general defense strategy against such attacks,and the security of the system needs further investigation.Here,we employ a deep learning framework called generative adversarial networks(GANs)to detect both attacks.We first analyze the data in different cases,derive a feature vector as input to a GAN model,and then show the training and testing process of the GAN model for attack classification.The proposed model has two parts,a discriminator and a generator,both of which employ a convolutional neural network(CNN)to improve accuracy.Simulation results show that the proposed scheme can detect and classify attacks without reducing the secret key rate and the maximum transmission distance.It only establishes a detection model by monitoring features of the pulse without adding additional devices. 展开更多
关键词 CVQKD generative adversarial network attack classification
在线阅读 下载PDF
An Improved Framework of Massive Superpoly Recovery in Cube Attacks Against NFSR-Based Stream Ciphers
7
作者 LIU Chen TIAN Tian QI Wen-Feng 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1179-1198,共20页
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently... A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers. 展开更多
关键词 NFSR-based stream ciphers cube attacks MILP Trivium
在线阅读 下载PDF
Simulation of crowd evacuation under attack considering emotion spreading
8
作者 Yang Wang Ning Ding +1 位作者 Dapeng Dong Yu Zhu 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期514-525,共12页
In recent years,attacks against crowded places such as campuses and theaters have had a frequent and negative impact on the security and stability of society.In such an event,the crowd will be subjected to high psycho... In recent years,attacks against crowded places such as campuses and theaters have had a frequent and negative impact on the security and stability of society.In such an event,the crowd will be subjected to high psychological stress and their emotions will rapidly spread to others.This paper establishes the attack-escape evacuation simulation model(AEES-SFM),based on the social force model,to consider emotion spreading under attack.In this model,(1)the attack-escape driving force is considered for the interaction between an attacker and evacuees and(2)emotion spreading among the evacuees is considered to modify the value of the psychological force.To validate the simulation,several experiments were carried out at a university in China.Comparing the simulation and experimental results,it is found that the simulation results are similar to the experimental results when considering emotion spreading.Therefore,the AEES-SFM is proved to be effective.By comparing the results of the evacuation simulation without emotion spreading,the emotion spreading model reduces the evacuation time and the number of casualties by about 30%,which is closer to the real experimental results.The results are still applicable in the case of a 40-person evacuation.This paper provides theoretical support and practical guidance for campus response to violent attacks. 展开更多
关键词 violent attacks crowd evacuation social force model emotion spreading
在线阅读 下载PDF
ATSSC:An Attack Tolerant System in Serverless Computing
9
作者 Zhang Shuai Guo Yunfei +2 位作者 Hu Hongchao Liu Wenyan Wang Yawen 《China Communications》 SCIE CSCD 2024年第6期192-205,共14页
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ... Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs. 展开更多
关键词 active defense attack tolerant cloud computing SECURITY serverless computing
在线阅读 下载PDF
K-core attack, equilibrium K-core,and kinetically constrained spin system
10
作者 周海军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期14-26,共13页
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi... Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions. 展开更多
关键词 Fredrickson–Andersen model K-core attack spin glass jamming
在线阅读 下载PDF
Effect of attack angle on the electromagnetic wave transmission characteristics in the hypersonic plasma sheath of a re-entry vehicle
11
作者 Xin AI Qiuyue NIE +4 位作者 Zhonglin ZHANG Peiqi CHEN Shulei ZHENG Changshi YAN Guoqiang WEI 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第12期49-62,共14页
The attack angle may greatly affect the hypersonic plasma sheaths around the re-entry vehicle,thereby affecting the transmission characteristics of electromagnetic(EM)waves in the sheaths.In this paper,we propose an i... The attack angle may greatly affect the hypersonic plasma sheaths around the re-entry vehicle,thereby affecting the transmission characteristics of electromagnetic(EM)waves in the sheaths.In this paper,we propose an integrated three-dimensional(3D)model with various attack angles and realistic flying conditions of radio attenuation measurement C-II(RAM C-II)re-entry tasks for analyzing the effect of the attack angle on the transmission characteristics of EM waves in the sheaths.It is shown that the electron density and collision frequency of the sheath on the windward side can be increased by an order of magnitude with the increase of the attack angle.Meanwhile,the thickness of the sheath on the leeward side is increased where the electron density and collision frequency are reduced.The EM waves are mainly reflected on the windward plasma sheath due to the cutoff effect,and the radio-frequency(RF)blackout is mitigated if the antenna is positioned on the leeward side.Thus,by planning the trajectory properly and installing the antenna accordingly during the re-entry,it is possible to provide an approach for mitigation of the RF blackout problem to an extent. 展开更多
关键词 attack angle hypersonic plasma sheath re-entry vehicle transmission characteristics
在线阅读 下载PDF
MaliFuzz:Adversarial Malware Detection Model for Defending Against Fuzzing Attack
12
作者 Xianwei Gao Chun Shan Changzhen Hu 《Journal of Beijing Institute of Technology》 EI CAS 2024年第5期436-449,共14页
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers c... With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers can adopt fuzzing attack to manipulate the features of the malware closer to benign programs on the premise of retaining their functions.In this paper,attack and defense methods on malware detection models based on machine learning algorithms were studied.Firstly,we designed a fuzzing attack method by randomly modifying features to evade detection.The fuzzing attack can effectively descend the accuracy of machine learning model with single feature.Then an adversarial malware detection model MaliFuzz is proposed to defend fuzzing attack.Different from the ordinary single feature detection model,the combined features by static and dynamic analysis to improve the defense ability are used.The experiment results show that the adversarial malware detection model with combined features can deal with the attack.The methods designed in this paper have great significance in improving the security of malware detection models and have good application prospects. 展开更多
关键词 adversarial machine learning fuzzing attack malware detection
在线阅读 下载PDF
Research on fixed-time time-varying formation of heterogeneous multi-agent systems based on tracking error observer under DoS attacks
13
作者 Jiqing Luo Husheng Fang +2 位作者 Yue Zhong Jing Zhang Shengli Song 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第12期211-225,共15页
In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy... In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy is used to reconstruct the communication channel for the system that suffers from DoS attacks to prevent the discontinuous transmission information of the communication network from affecting MASs formation.Then,considering that the leader state is not available to each follower under DoS attacks,a fixed-time distributed observer without velocity information is constructed to estimate the tracking error between followers and the leader.Finally,adaptive radial basis function neural network(RBFNN) is used to approximate the unknown ensemble disturbances in the system,and the fixed-time time-varying formation scheme is designed with the constructed observer.The effectiveness of the proposed control algorithm is demonstrated by the numerical simulation. 展开更多
关键词 Denial-of-service attacks Dynamic pinning Fixed-time tracking error observer Adaptive RBFNN Fixed-time time-varying formation
在线阅读 下载PDF
Molecule aging induced by electron attacking
14
作者 Ping Song Yining Dong +5 位作者 Xue Gong Mingbo Ruan Baoxin Ni Xuanhao Mei Kun Jiang Weilin Xu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第6期519-525,I0013,共8页
Here we propose a new concept of"molecule aging":with some special treatment,a molecule could be"aged"by losing some unknown tiny particles or pieces from atoms in the molecule,Such"aging"... Here we propose a new concept of"molecule aging":with some special treatment,a molecule could be"aged"by losing some unknown tiny particles or pieces from atoms in the molecule,Such"aging"or loss of unknown tiny particles does not change apparently its molecular structure or chemical composition,but some physicochemical properties could be changed irreversibly.We further confirm such"molecule aging"via a long-term electron attacking to age water(H_(2)O)molecules.The IR spectra show no structural difference between the fresh water and the aged one,while the NMR spectra show that the electron attacking can decrease the size of water clusters.Such facts indicate that the electron attacking indeed can"affect"the structure of water molecule slightly but without damaging to its basic molecule frame.Further exploration reveals that the hydrogen evolution reaction(HER)activity of the aged water molecule is lower than the fresh water on the same Pt/C electrocatalyst.The density functional theory calculations indicate that the shortened O-H bond in H_(2)O indeed can present lower HER activity,so the observed size decrease of water clusters from NMR probably could be attributed to the shortening of O-H bond in water molecules.Such results indicate significantly that the molecule aging can produce materials with new functions for new possible applications. 展开更多
关键词 Aging of molecules Electron attacking Full width at half maxima Hydrogen evolution reaction
在线阅读 下载PDF
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function
15
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
Gated Neural Network-Based Unsteady Aerodynamic Modeling for Large Angles of Attack
16
作者 DENG Yongtao CHENG Shixin MI Baigang 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2024年第4期432-443,共12页
Modeling of unsteady aerodynamic loads at high angles of attack using a small amount of experimental or simulation data to construct predictive models for unknown states can greatly improve the efficiency of aircraft ... Modeling of unsteady aerodynamic loads at high angles of attack using a small amount of experimental or simulation data to construct predictive models for unknown states can greatly improve the efficiency of aircraft unsteady aerodynamic design and flight dynamics analysis.In this paper,aiming at the problems of poor generalization of traditional aerodynamic models and intelligent models,an intelligent aerodynamic modeling method based on gated neural units is proposed.The time memory characteristics of the gated neural unit is fully utilized,thus the nonlinear flow field characterization ability of the learning and training process is enhanced,and the generalization ability of the whole prediction model is improved.The prediction and verification of the model are carried out under the maneuvering flight condition of NACA0015 airfoil.The results show that the model has good adaptability.In the interpolation prediction,the maximum prediction error of the lift and drag coefficients and the moment coefficient does not exceed 10%,which can basically represent the variation characteristics of the entire flow field.In the construction of extrapolation models,the training model based on the strong nonlinear data has good accuracy for weak nonlinear prediction.Furthermore,the error is larger,even exceeding 20%,which indicates that the extrapolation and generalization capabilities need to be further optimized by integrating physical models.Compared with the conventional state space equation model,the proposed method can improve the extrapolation accuracy and efficiency by 78%and 60%,respectively,which demonstrates the applied potential of this method in aerodynamic modeling. 展开更多
关键词 large angle of attack unsteady aerodynamic modeling gated neural networks generalization ability
在线阅读 下载PDF
高级持续性威胁检测与分析方法研究进展
17
作者 季一木 张嘉铭 +4 位作者 杨倩 杜宏煜 邵思思 张俊杰 刘尚东 《南京邮电大学学报(自然科学版)》 北大核心 2025年第1期1-11,共11页
高级持续性威胁(Advanced Persistent Threat,APT)检测分析是网络安全领域的一个研究热点。APT检测与分析仍然面临着许多挑战,对当前研究进行归纳梳理,总结了APT检测与分析方法研究进展。首先,分析APT攻击威胁建模方法。其次,梳理代表性... 高级持续性威胁(Advanced Persistent Threat,APT)检测分析是网络安全领域的一个研究热点。APT检测与分析仍然面临着许多挑战,对当前研究进行归纳梳理,总结了APT检测与分析方法研究进展。首先,分析APT攻击威胁建模方法。其次,梳理代表性的APT攻击检测方法,包括基于主机和基于网络的相关研究。然后,总结APT攻击分析方法,介绍了攻击溯源与攻击行为推理相关研究。最后,展望未来APT攻击检测与分析的研究方向,以便研究人员了解当前研究现状和拓展研究思路。 展开更多
关键词 高级持续威胁 攻击发现 攻击溯源 攻击推理
在线阅读 下载PDF
山地条件下诱偏源工作效能仿真分析方法
18
作者 邹雄 耿方志 +4 位作者 董文锋 冷毅 罗威 黎静 钱欢 《现代雷达》 北大核心 2025年第2期72-77,共6页
为解决山地条件下的地面诱偏源部署问题,利用诱偏源和反辐射武器工作原理建立诱偏源工作效能仿真模型。根据反辐射武器与诱偏源的位置关系,比较信号俯仰角与该方向上山体坡度大小,进而判断反辐射武器和诱偏源是否满足通视条件;同时,考... 为解决山地条件下的地面诱偏源部署问题,利用诱偏源和反辐射武器工作原理建立诱偏源工作效能仿真模型。根据反辐射武器与诱偏源的位置关系,比较信号俯仰角与该方向上山体坡度大小,进而判断反辐射武器和诱偏源是否满足通视条件;同时,考虑强信号暴露和诱偏源时序变化等仿真条件,实现了对山地条件下反辐射攻击的模拟,并利用主源和诱偏源的毁伤概率,以及反辐射武器落点分布图评价诱偏源的诱偏效能。以山体坡度45°为例,仿真分析了反辐射武器从不同方向进攻时,各辐射源的毁伤概率,结果表明:当山体坡度较大时,诱偏源需前置部署。该仿真分析方法能较好地评价诱偏源的布阵方式、布阵距离以及山体坡度对其工作效能的影响,对于诱偏源在不同应用场景下进行合理部署具有重要指导意义。 展开更多
关键词 诱偏源 山地条件 反辐射攻击 工作效能 仿真分析
在线阅读 下载PDF
基于拖曳声纳的线导鱼雷攻击问题研究
19
作者 王顺杰 野学范 苗齐 《兵器装备工程学报》 北大核心 2025年第1期104-108,共5页
被动拖曳线列阵声纳探测距离远,使用被动拖曳线列阵声纳探测信息可先敌攻击。针对基于拖曳线列阵声纳探测信息的线导加尾流自导鱼雷攻击时尾流进入点问题,建立了基于艇艏声纳探测和基于拖曳声纳探测的线导加尾流自导鱼雷导引模型,采用... 被动拖曳线列阵声纳探测距离远,使用被动拖曳线列阵声纳探测信息可先敌攻击。针对基于拖曳线列阵声纳探测信息的线导加尾流自导鱼雷攻击时尾流进入点问题,建立了基于艇艏声纳探测和基于拖曳声纳探测的线导加尾流自导鱼雷导引模型,采用不同声纳探测时的线导加尾流自导鱼雷攻击弹道进行了仿真,结果发现基于拖曳声纳探测时尾流进入点偏离设定进入点。研究分析表明,采用拖曳声纳探测方位进行导引时不同态势下存在不同的系统导引误差,导致鱼雷进入尾流距离偏大或偏小。 展开更多
关键词 拖曳声纳 线导 尾流 鱼雷攻击
在线阅读 下载PDF
基于代理生成对抗网络的服务质量感知云API推荐系统投毒攻击
20
作者 陈真 刘伟 +3 位作者 吕瑞民 马佳洁 冯佳音 尤殿龙 《通信学报》 北大核心 2025年第3期174-186,共13页
针对现有投毒攻击方法生成的虚假用户攻击数据存在攻击效果差且易被检测的不足,提出一种基于代理生成对抗网络的投毒攻击方法。首先,在生成对抗网络中采用K-means算法将数据分类,并引入自注意力机制学习每个类中的全局特征,解决生成对... 针对现有投毒攻击方法生成的虚假用户攻击数据存在攻击效果差且易被检测的不足,提出一种基于代理生成对抗网络的投毒攻击方法。首先,在生成对抗网络中采用K-means算法将数据分类,并引入自注意力机制学习每个类中的全局特征,解决生成对抗网络在数据稀疏时难以有效捕捉真实用户复杂行为模式这一问题,提升虚假用户的隐蔽性。其次,引入代理模型评估生成对抗网络生成的虚假用户的攻击效果,将评估结果作为代理损失优化生成对抗网络,进而实现在兼顾虚假用户隐蔽性的同时增强攻击效果。云API服务质量数据集上的实验表明,所提方法在兼顾攻击的有效性和隐蔽性方面均优于现有方法。 展开更多
关键词 推荐系统 云API 投毒攻击 生成对抗网络 代理模型
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部