Search scope:
排序: Display mode:
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
YANG Li, HAN Lizhong, SUN Jingyong, NI Yuxing, YU Yunsong
Frontiers of Medicine 2007, Volume 1, Issue 4, Pages 423-428 doi: 10.1007/s11684-007-0083-6
Keywords: identical different teaching hospital genotype colistin-only-sensitive
Control measuring technique of long distance only head driving in shield tunnel
Xu Weiqing,Han Fuzhong
Strategic Study of CAE 2010, Volume 12, Issue 12, Pages 56-58
The only head driving distance of the engineering of Beijing undergroundBased on the analysis of the measuring accuracy, only through the wire line can not satisfy the design
Keywords: shield long distance only head driving control measuring
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Liang-Jiu JIA, Tsuyoshi KOYAMA, Hitoshi KUWAMURA
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 466-476 doi: 10.1007/s11709-013-0219-5
Keywords: cyclic plasticity prestrain Chaboche model mild steel
Frontiers of Medicine 2023, Volume 17, Issue 1, Pages 75-84 doi: 10.1007/s11684-022-0950-1
Keywords: drug-coated balloon left main high bleeding risk predilatation calcifield lesion percutaneous coronary intervention
Identification of system mode parameters using response measurement only
Huo Bingyong and Yi Weijian
Strategic Study of CAE 2015, Volume 17, Issue 1, Pages 151-160
With the broadest application and development of modal analysis method, the demands such as less restrictive conditions and to increase the reliability of an analysis have been increased for more convenience in engineering applications. This paper presents a new modal analysis method without input data and any analytical models. Harmonic parameters of a point response can be extracted by spectrum analysis using the measurements obtained from structural testing. Preliminary results calculated by discrete deconvolution techniques are further modified by the frequency domain space curve fitting method. Modal parameters of system just come from a combination of these corrected results. The performed analysis and validation of real data indicate that the approach is feasible for engineering. Therefore, this paper provides the effective estimation scheme of modal parameters for experiment research on the system dynamic performance.
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
A time−space porosity computational model for concrete under sulfate attack
Frontiers of Structural and Civil Engineering doi: 10.1007/s11709-023-0985-7
Keywords: expansion deformation porosity internal expansion stress external sulfate attack mechanical–chemical
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
Correlation power attack on amessage authentication code based on SM3 Research Articles
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 930-945 doi: 10.1631/FITEE.1800312
Keywords: HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Title Author Date Type Operation
The molecular epidemiological study of colistin-only-sensitive strains in multi-drug resistant Acinetobacter
YANG Li, HAN Lizhong, SUN Jingyong, NI Yuxing, YU Yunsong
Journal Article
Control measuring technique of long distance only head driving in shield tunnel
Xu Weiqing,Han Fuzhong
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
Prediction of cyclic large plasticity for prestrained structural steel using only tensile coupon tests
Liang-Jiu JIA, Tsuyoshi KOYAMA, Hitoshi KUWAMURA
Journal Article
Drug-coated balloon-only strategy for percutaneous coronary intervention of left main coronary artery
Journal Article
Identification of system mode parameters using response measurement only
Huo Bingyong and Yi Weijian
Journal Article
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
On detecting primary user emulation attack using channel impulse response in the cognitive radio network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Journal Article
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article
Correlation power attack on amessage authentication code based on SM3
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Journal Article