Resource Type

Journal Article 38

Conference Videos 1

Year

2023 5

2022 3

2021 3

2020 2

2019 6

2018 4

2017 3

2016 7

2015 1

2005 1

2002 1

2000 1

1999 1

open ︾

Keywords

active defense 3

mimic defense 3

Adversarial attack 2

Deep learning 2

Generative adversarial network 2

Moving target defense 2

Network security 2

active immunity 2

Puccinia striiformis f. sp. tritici 1

Trifolium repens 1

Adversarial 1

Adversarial defense 1

Adversarial samples 1

Artificial intelligence 1

Autonomous vehicle 1

Black-box attack 1

Cancer 1

Cantonese porcelain 1

Characteristics 1

open ︾

Search scope:

排序: Display mode:

Adversarial Attacks and Defenses in Deep Learning Feature Article

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Engineering 2020, Volume 6, Issue 3,   Pages 346-360 doi: 10.1016/j.eng.2019.12.012

Abstract: Recently, the security vulnerability of
DL algorithms to adversarial samples has been widely recognizedSuccessful implementations
of adversarial attacks in real physical-world scenarios further demonstrate
Hence, adversarial attack and defense techniques have attracted increasing attention from bothIn this paper,
we first introduce the theoretical foundations, algorithms, and applications of adversarial
We then describe a few research efforts on the defense techniques, which cover the broad frontier

Keywords: Machine learning     Deep neural network Adversarial example     Adversarial attack     Adversarial defense    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract: However, these data-driven models are vulnerable to adversarial attacks; thus, small perturbations onrecent studies have demonstrated the vulnerability of machine learning methods and the existence of adversarialMoreover, to hide the adversarial samples in the visualization space, a Jacobian matrix is used to guidethe perturbed variable selection, making the adversarial samples in the dimensional reduction spaceBased on the attack method, a corresponding adversarial training defense method is also proposed, which

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract: Active defense technology is a new direction in cybersecurity research that has attracted more and moreThis paper summarizes the development of active defense via the introduction of intrusion tolerance technologyand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: This paper first introduces some classic network defense technology.Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.defense technology.Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Gametheoretic analysis for themechanism of moving target defense Article

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 2017-2034 doi: 10.1631/FITEE.1601797

Abstract: Moving target defense (MTD) is a novel way to alter the asymmetric situation of attacks and defenses,However, relevant analysis for the defense mechanism of the MTD technology is still absent.In this paper, we analyze the defense mechanism of MTD technology in two dimensions.First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technologyThis work gives theoretical support for understanding the defense process and defense mechanism of MTD

Keywords: Network security     Moving target defense (MTD)     Defense mechanism     Defense model     Game theory    

Generative adversarial network based novelty detection usingminimized reconstruction error Article

Huan-gang WANG, Xin LI, Tao ZHANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 1,   Pages 116-125 doi: 10.1631/FITEE.1700786

Abstract: Generative adversarial network (GAN) is the most exciting machine learning breakthrough in recent yearsGAN is composed of a generator and a discriminator, both trained with the adversarial learning mechanism

Keywords: Generative adversarial network (GAN)     Novelty detection     Tennessee Eastman (TE) process    

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationsanalyzes the functional composition and typical combat styles of the future underwater attack–defenseconfrontation system, and proposes corresponding suggestions for the development of the underwater attack–defense

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

Moving target defense: state of the art and characteristics Review

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11,   Pages 1122-1153 doi: 10.1631/FITEE.1601321

Abstract: Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situationFirst, a new security model is introduced to describe the changes in the traditional defense paradigm

Keywords: Moving target defense     Security model     Function-and-movement model     Characteristics    

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015

Abstract: This paper proposes a scheme of combining software diversity with mimic defense in the software security

Keywords: software diversity     mimic defense     software security product    

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional None

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 238-252 doi: 10.1631/FITEE.1800516

Abstract: ., an “isolating and dynamic” cyber defense, which cuts these potential chains to reduce the cumulativeSecond, we propose a software-defined proactive cyber defense solution (SPD) for enterprise networks

Keywords: Intranet defense     Software-defined network     Multi-dimensional maneuvering    

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Strategic Study of CAE 2000, Volume 2, Issue 11,   Pages 25-28

Abstract: In this paper, the status of CB weapons, CB disarmament and trends in CB defense technology are introduced, and discussions on the key concerns of CB defense and medical protection in the future are presented

Keywords: chemical and biological weapon     chemical and biological defense     medical protection     chemical and biological    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defenseThis study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Impact of Recent Regional Wars on Requirements of Ground based Air Defense Radars

Peng Jiating

Strategic Study of CAE 1999, Volume 1, Issue 2,   Pages 19-23

Abstract:

In light of tasks creating before ground based air defense radar in recent regional conflicts, thisradars, and analyzes briefly the position and function of ground based mid and low altitude defensesystems in modem air defense.The author believes that these air defense systems can play an important role in modem air defense andThe article concludes the new requirement of ground based mid and low altitude defense radars, mainly

Keywords: low altitude     air defense radar     anti-stealth     anti-cruise missile     anti-antiradiation missile    

DART Mission Shows Potential for Planetary Defense by Smashing Asteroid into New Orbit

Chris Palmer

Engineering 2023, Volume 24, Issue 5,   Pages 7-9 doi: 10.1016/j.eng.2023.03.002

Title Author Date Type Operation

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Gametheoretic analysis for themechanism of moving target defense

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Journal Article

Generative adversarial network based novelty detection usingminimized reconstruction error

Huan-gang WANG, Xin LI, Tao ZHANG

Journal Article

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

Moving target defense: state of the art and characteristics

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Journal Article

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Journal Article

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Journal Article

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Impact of Recent Regional Wars on Requirements of Ground based Air Defense Radars

Peng Jiating

Journal Article

DART Mission Shows Potential for Planetary Defense by Smashing Asteroid into New Orbit

Chris Palmer

Journal Article