Resource Type

Journal Article 767

Conference Videos 53

Year

2024 2

2023 88

2022 117

2021 93

2020 61

2019 48

2018 46

2017 63

2016 51

2015 43

2014 28

2013 19

2012 15

2011 14

2010 21

2009 6

2008 18

2007 16

2006 11

2005 8

open ︾

Keywords

food security 39

big data 20

energy security 19

data mining 12

China 11

Machine learning 11

sustainable development 11

industrial 10

Big data 9

industrial software 6

cyberspace security 5

industrial Internet 5

machine learning 5

security 5

Blockchain 4

Deep learning 4

Industry 4.0 4

Physical layer security 4

intelligent manufacturing 4

open ︾

Search scope:

排序: Display mode:

Deep Learning and Industrial Internet Security: Application and Challenges

Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 95-103 doi: 10.15302/J-SSCAE-2021.02.013

Abstract:

Industrial Internet security is crucial for strengthening the manufacturingIn this study, we analyze the development demand for industrial Internet security from the perspectivestatus of deep learning to industrial Internet security in terms of device, control, network, application, and data layers.The security challenges faced by deep learning application to industrial Internet security primarily

Keywords: industrial Internet security     Internet of Things security     deep learning     data security    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract:

Recently developed fault classification methods for industrial processes are mainly data-driven.have significantly improved fault classification accuracy owing to the inclusion of a large number of dataHowever, these data-driven models are vulnerable to adversarial attacks; thus, small perturbations onThis paper proposes a black-box attack method with an extreme constraint for a safe-critical industrialUsing the one-variable attack (OVA) method, we explore the vulnerability of industrial variables and

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Layout of Foreign Industrial Internet Security Industry and Its Enlightenment to China

Li Yangchun, Wang Hailong, Li Yuxiao, Chen Lei, Li Youping

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 112-121 doi: 10.15302/J-SSCAE-2021.02.015

Abstract:

The industrial Internet security industry is crucial for the healthydevelopment of industrial Internet.This study investigates the development demands for the industrial Internet security industry using literatureSubsequently, the current status of industrial Internet security industry layout in the United StatesThe study points out that the optimization of China’s industrial Internet security industry layout

Keywords: industrial Internet security     industrial Internet security industry     industrial layout     balanced development    

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentof the industrial Internet, as it is an important approach for outputting the industrial Internet securityIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedSubsequently,the path for promoting the innovative development of the industrial Internet security is

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

Development of Industrial Internet Security Technology in China

Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 65-73 doi: 10.15302/J-SSCAE-2021.02.009

Abstract: text-align: justify;">As the new-generation information technology, such as cloud computing and big dataMeanwhile, industrial Internet security problems have increased; therefore, improving the technologicalcapabilities forguaranteeing industrial Internet security becomes the prerequisite for the high-qualitysecurity technologiesneed to be customized in accordance with industrial characteristics and scenarios, and closely integrate with new technologies such asbig data and AI, to achieve active defense and create

Keywords: industrial Internet security     security protection technology     security evaluation technology     security    

Industrial eco-efficiency and its spatial-temporal differentiation in China

Wei YANG, Fengjun JIN, Chengjin WANG, Chen LV

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 4,   Pages 559-568 doi: 10.1007/s11783-012-0400-4

Abstract: The aim of this paper is to study the spatial-temporal differentiation of industrial eco-efficiency inUsing methods based on the data envelopment analysis (DEA) model and exploratory spatial data analysis(ESDA) and data from 1985, 1995, 2005, and 2008 of 30 provinces in China, the spatial-temporal patternchanges in industrial eco-efficiency are discussed.The results show that: first, the patterns of industrial eco-efficiency are dominated by clustering of

Keywords: industrial eco-efficiency     data envelopment analysis (DEA) model     exploratory spatial data analysis (ESDA    

Development of Security Protection Technologies for Industrial Control System

Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 126-136 doi: 10.15302/J-SSCAE-2023.06.008

Abstract:

Industrial control system (ICS) is gradually transitioning from beingOnce subjected to cyberattacks, industrial production will be directly affected.and uncontrollable security challenges of ICS.In view of the security challenges, the development ideas are given from the aspects of securitysecurity protection system of ICS based on a self-defense plus guard mode, such that the security

Keywords: industrial control system     security protection     autonomous and controllable     new security-protection    

Security of Manganese Resources and Industrial Chain in China

Ren Hui , Liu Min , Wang Ziguo , Wu Hao , Mao Jingwen

Strategic Study of CAE 2022, Volume 24, Issue 3,   Pages 20-28 doi: 10.15302/J-SSCAE-2022.03.003

Abstract: development, have created significant pressure on domestic manganese ore resources and threatens the securityof the industrial chain.This paper reviews the industrial supply chain of manganese ore resources and materials in China from

Keywords: manganese resources     industrial chain     high-quality development     industrial structure     security    

The Industrial Internet Platform: Trend and Challenges

Wang Chen,Song Liang and Li Shaokun

Strategic Study of CAE 2018, Volume 20, Issue 2,   Pages 15-19 doi: 10.15302/J-SSCAE-2018.02.003

Abstract: manufacturing industry, next-generation Internet, and information technologies is catalyzing the development of industrialelaborated and the challenges in building the client-ecosphere, developer-ecosphere, as well as the data-ecosphereFurthermore, the technical challenges of IIP in modeling and analyzing industry big data system and industrydata are discussed in depth.

Keywords: industry Internet platform     industrial big data     data analytics    

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 56-64 doi: 10.15302/J-SSCAE-2021.02.008

Abstract:

 Industrial Internet security is crucial for strengthening the manufacturingIn this study, we analyze the development demand for industrial Internet security from the perspectivestatus of deep learning to industrial Internet security in terms of device, control, network, application, and data layers.The security challenges faced by deep learning application to industrial Internet primarily lie in model

Keywords: industrial Internet,supply chain,network security,development path    

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011

Abstract: The industrial Internet promotes the ubiquitous and deep interconnection and comprehensive perceptionaspects of security control and security certification.Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzedthe industrial internet equipment in China are discussed.Specifically, the network security access mechanism of the industrial Internet equipment should be improved

Keywords: industrial Internet equipment     network security     management     protection     certification    

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 46-55 doi: 10.15302/J-SSCAE-2021.02.007

Abstract:

Industrial Internet security is a prerequisite and guarantee for theThis study aims at the future development of the industrial Internet security industry in China., industrial structure, and industrial scale.Internet security industry in China.To explore a sustainable development path suitable for China’s industrial Internet security industry

Keywords: industrial Internet security     industry ecosystem     classified protection of cybersecurity     independent    

Fog-IBDIS: Industrial Big Data Integration and Sharing with Fog Computing for Manufacturing Systems Article

Junliang Wang, Peng Zheng, Youlong Lv, Jingsong Bao, Jie Zhang

Engineering 2019, Volume 5, Issue 4,   Pages 662-670 doi: 10.1016/j.eng.2018.12.013

Abstract:

Industrial big data integration and sharing (IBDIS) is of great significance in managing and providingdata for big data analysis in manufacturing systems.novel fog-computing-based IBDIS approach called Fog-IBDIS is proposed in order to integrate and share industrialbig data with high raw data security and low network traffic loads by moving the integration task fromsecurity by deploying the analysis tasks executed by the data generators, and eases the network traffic

Keywords: Fog computing     Industrial big data     Integration     Manufacturing system    

Risk Identification and Control Strategies for Food Security Based on the Perspective of Whole Industrial

Mei Xurong , Zhang Lin , Yuan Longjiang , Hu Xiangdong , Xie Linghong ,Wu Kongming , Wang Guogang , Wang Xiaojun

Strategic Study of CAE 2023, Volume 25, Issue 4,   Pages 39-49 doi: 10.15302/J-SSCAE-2023.04.008

Abstract:

Accurate identification and effective control of food security risksare crucial for national security.This study constructs a food security risk system that comprises nine major types of risk sources fromthe perspective of the entire industrial chain.that combines early identification, normal monitoring, and emergency warning and is capable of entire industrial

Keywords: food security risks     control strategy     risk control system     whole industrial chain    

On the role of optimization algorithms in ownership-preserving data mining None

Muhammad KAMRAN, Ehsan Ullah MUNIR

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 151-164 doi: 10.1631/FITEE.1601479

Abstract: Knowledge extraction from sensitive data often needs collaborative work.Statistical databases are generated from such data and shared among various stakeholders.In this context, the ownership protection of shared data becomes important.Watermarking of such datasets may bring distortions in the data.Large bandwidth ensures robustness; however, it may degrade the quality of the data.

Keywords: Information security     Optimization     Digital rights     Watermarking    

Title Author Date Type Operation

Deep Learning and Industrial Internet Security: Application and Challenges

Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Layout of Foreign Industrial Internet Security Industry and Its Enlightenment to China

Li Yangchun, Wang Hailong, Li Yuxiao, Chen Lei, Li Youping

Journal Article

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

Development of Industrial Internet Security Technology in China

Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu

Journal Article

Industrial eco-efficiency and its spatial-temporal differentiation in China

Wei YANG, Fengjun JIN, Chengjin WANG, Chen LV

Journal Article

Development of Security Protection Technologies for Industrial Control System

Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing

Journal Article

Security of Manganese Resources and Industrial Chain in China

Ren Hui , Liu Min , Wang Ziguo , Wu Hao , Mao Jingwen

Journal Article

The Industrial Internet Platform: Trend and Challenges

Wang Chen,Song Liang and Li Shaokun

Journal Article

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Journal Article

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Journal Article

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Journal Article

Fog-IBDIS: Industrial Big Data Integration and Sharing with Fog Computing for Manufacturing Systems

Junliang Wang, Peng Zheng, Youlong Lv, Jingsong Bao, Jie Zhang

Journal Article

Risk Identification and Control Strategies for Food Security Based on the Perspective of Whole Industrial

Mei Xurong , Zhang Lin , Yuan Longjiang , Hu Xiangdong , Xie Linghong ,Wu Kongming , Wang Guogang , Wang Xiaojun

Journal Article

On the role of optimization algorithms in ownership-preserving data mining

Muhammad KAMRAN, Ehsan Ullah MUNIR

Journal Article