Search scope:
排序: Display mode:
Adversarial Attacks and Defenses in Deep Learning Feature Article
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Engineering 2020, Volume 6, Issue 3, Pages 346-360 doi: 10.1016/j.eng.2019.12.012
Keywords: Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Xiangkun He,Wenhui Huang,Chen Lv,
Engineering doi: 10.1016/j.eng.2023.10.005
Keywords: Autonomous vehicle Decision-making Reinforcement learning Adversarial attack Safety guarantee
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Generative adversarial network based novelty detection usingminimized reconstruction error Article
Huan-gang WANG, Xin LI, Tao ZHANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 1, Pages 116-125 doi: 10.1631/FITEE.1700786
Keywords: Generative adversarial network (GAN) Novelty detection Tennessee Eastman (TE) process
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
Cantonese porcelain classification and image synthesis by ensemble learning and generative adversarial Special Feature on Intelligent Design
Steven Szu-Chi CHEN, Hui CUI, Ming-han DU, Tie-ming FU, Xiao-hong SUN, Yi JI, Henry DUH
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1632-1643 doi: 10.1631/FITEE.1900399
Keywords: Cantonese porcelain Classification Generative adversarial network Creative arts
A time−space porosity computational model for concrete under sulfate attack
Frontiers of Structural and Civil Engineering doi: 10.1007/s11709-023-0985-7
Keywords: expansion deformation porosity internal expansion stress external sulfate attack mechanical–chemical
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
Correlation power attack on amessage authentication code based on SM3 Research Articles
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 930-945 doi: 10.1631/FITEE.1800312
Keywords: HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
Frontiers in Energy 2023, Volume 17, Issue 2, Pages 211-227 doi: 10.1007/s11708-022-0847-3
Keywords: end-to-end learning microgrids voltage profile improvement generative adversarial network
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Title Author Date Type Operation
Adversarial Attacks and Defenses in Deep Learning
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
Toward Trustworthy Decision-Making for Autonomous Vehicles: A Robust Reinforcement Learning Approach with Safety Guarantees
Xiangkun He,Wenhui Huang,Chen Lv,
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Journal Article
Generative adversarial network based novelty detection usingminimized reconstruction error
Huan-gang WANG, Xin LI, Tao ZHANG
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
On detecting primary user emulation attack using channel impulse response in the cognitive radio network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Journal Article
Cantonese porcelain classification and image synthesis by ensemble learning and generative adversarial
Steven Szu-Chi CHEN, Hui CUI, Ming-han DU, Tie-ming FU, Xiao-hong SUN, Yi JI, Henry DUH
Journal Article
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article
Correlation power attack on amessage authentication code based on SM3
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Journal Article
Topology-independent end-to-end learning model for improving the voltage profile in microgrids-integrated power distribution networks
Journal Article