Search scope:
排序: Display mode:
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
A super-element approach for structural identification in time domain
LI Jie, ZHAO Xin
Frontiers of Mechanical Engineering 2006, Volume 1, Issue 2, Pages 215-221 doi: 10.1007/s11465-006-0004-4
Keywords: numerical effective decomposing parameterization procedure divide-and-conquer ability time-domain identification
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
A time−space porosity computational model for concrete under sulfate attack
Frontiers of Structural and Civil Engineering doi: 10.1007/s11709-023-0985-7
Keywords: expansion deformation porosity internal expansion stress external sulfate attack mechanical–chemical
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
Correlation power attack on amessage authentication code based on SM3 Research Articles
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 930-945 doi: 10.1631/FITEE.1800312
Keywords: HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
The East–West Divide in Response to COVID-19 Article
Dean T Jamison, Kin Bing Wu
Engineering 2021, Volume 7, Issue 7, Pages 936-947 doi: 10.1016/j.eng.2021.05.008
Keywords: Coronavirus disease 2019 Isolation Non-pharmaceutical interventions Pandemic Vaccination
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Cyber security meets artificial intelligence: a survey Review Article
Jian-hua LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1462-1474 doi: 10.1631/FITEE.1800573
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system.
Keywords: Cyber security Artificial intelligence (AI) Attack detection Defensive techniques
Xiangkun He,Wenhui Huang,Chen Lv,
Engineering doi: 10.1016/j.eng.2023.10.005
Keywords: Autonomous vehicle Decision-making Reinforcement learning Adversarial attack Safety guarantee
CORMAND2: A Deception Attack Against Industrial Robots Article
Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun
Engineering 2024, Volume 32, Issue 1, Pages 186-202 doi: 10.1016/j.eng.2023.01.013
Keywords: Industrial robots Vulnerability analysis Deception attacks Defenses
Title Author Date Type Operation
A super-element approach for structural identification in time domain
LI Jie, ZHAO Xin
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
On detecting primary user emulation attack using channel impulse response in the cognitive radio network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Journal Article
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article
Correlation power attack on amessage authentication code based on SM3
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Journal Article
Calculation of the Behavior Utility of a Network System: Conception and Principle
Changzhen Hu
Journal Article
Toward Trustworthy Decision-Making for Autonomous Vehicles: A Robust Reinforcement Learning Approach with Safety Guarantees
Xiangkun He,Wenhui Huang,Chen Lv,
Journal Article