Search scope:
排序: Display mode:
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
Correlation power attack on amessage authentication code based on SM3 Research Articles
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 930-945 doi: 10.1631/FITEE.1800312
Keywords: HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
Being good or being known: International reputation of high-speed railway enterprises
Frontiers of Engineering Management Pages 455-466 doi: 10.1007/s42524-023-0250-8
Keywords: high-speed railway international reputation being good being known structural equation modeling
What have we known so far about microplastics in drinking water treatment? A timely review
Frontiers of Environmental Science & Engineering 2022, Volume 16, Issue 5, doi: 10.1007/s11783-021-1492-5
• 23 available research articles on MPs in drinking water treatment are reviewed.
Keywords: Microplastics Drinking water treatment Coagulation Flocculation Membrane Filtration
The problems about the theory of “Known for unknown”
Zhu Xun
Strategic Study of CAE 2015, Volume 17, Issue 2, Pages 35-39
“Known for unknown” is an important guiding ideology and prospecting method in mineralexploration and a work based on the known clues for prospecting.“Known for unknown” discuss relative to the prospecting for new working target,mainly inspace layout and the difference between the point and the surface and the unknown regions and known oredeposits,and put forward prospecting method to analysis of development theory in “Known for unknown
Keywords: Known for unknown; theory; prospecting; method; practice
Shengdong Liu, Enxiang Shang , Jingnan Liu , Yining Wang , Nanthi Bolan , M.B. Kirkham , Yang Li
Frontiers of Environmental Science & Engineering 2022, Volume 16, Issue 1, Pages 8-8 doi: 10.1007/s11783-021-1442-2
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Jiabo Wang,Zhijie Ma,Ming Niu,Yun Zhu,Qingsheng Liang,Yanling Zhao,Jingyuan Song,Zhaofang Bai,Yaming Zhang,Ping Zhang,Na Li,Yakun Meng,Qi Li,Lushan Qin,Guangju Teng,Junling Cao,Baosen Li,Shilin Chen,Yonggang Li,Zhengsheng Zou,Honghao Zhou,Xiaohe Xiao
Frontiers of Medicine 2015, Volume 9, Issue 4, Pages 457-467 doi: 10.1007/s11684-015-0417-8
Herbal medicines have recently been recognized as the second most common cause of drug-induced liver injury (DILI) in the United States. However, reliable methods to identify the DILI causality of some herbs, such as Heshouwu (dried root of Polygonum multiflorum), remain lacking. In this study, a total of 12 307 inpatients with liver dysfunction and 147 literature-reported cases of Heshouwu DILI were screened. A general algorithm indicated that only 22.5% (9/40) and 30.6% (45/147) of all hospitalization and literature case reports, respectively, demonstrate the high probability of DILI causality of Heshouwu. By contrast, 95% (19/20) of all cases prospectively investigated by pharmacognosy, phytochemistry, and metabolomic tests exhibited highly probable causality, including a patient who was previously incorrectly attributed and a case that was excluded from Heshouwu causality by pharmacognostic evidence. Toxin (heavy metals, pesticides, and mycotoxins) contamination was also excluded from Heshouwu DILI causality. The objectivity of these screening methods for Heshouwu DILI diagnosis addresses safety concerns regarding stilbene-containing herbal medicines and dietary supplements.
Keywords: drug-induced liver injury pharmacognosy metabolomics stilbene Polygonum multiflorum Chinese herbal medicine
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
A time−space porosity computational model for concrete under sulfate attack
Frontiers of Structural and Civil Engineering doi: 10.1007/s11709-023-0985-7
Keywords: expansion deformation porosity internal expansion stress external sulfate attack mechanical–chemical
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Title Author Date Type Operation
Correlation power attack on amessage authentication code based on SM3
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Journal Article
Being good or being known: International reputation of high-speed railway enterprises
Journal Article
What have we known so far about microplastics in drinking water treatment? A timely review
Journal Article
What have we known so far for fluorescence staining and quantification of microplastics: A tutorial review
Shengdong Liu, Enxiang Shang , Jingnan Liu , Yining Wang , Nanthi Bolan , M.B. Kirkham , Yang Li
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
Evidence chain-based causality identification in herb-induced liver injury: exemplification of a well-known
Jiabo Wang,Zhijie Ma,Ming Niu,Yun Zhu,Qingsheng Liang,Yanling Zhao,Jingyuan Song,Zhaofang Bai,Yaming Zhang,Ping Zhang,Na Li,Yakun Meng,Qi Li,Lushan Qin,Guangju Teng,Junling Cao,Baosen Li,Shilin Chen,Yonggang Li,Zhengsheng Zou,Honghao Zhou,Xiaohe Xiao
Journal Article
On detecting primary user emulation attack using channel impulse response in the cognitive radio network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Journal Article
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article