Resource Type

Journal Article 90

Conference Videos 5

Conference Topics 1

Year

2024 1

2023 8

2022 9

2021 11

2020 15

2019 10

2018 10

2017 10

2016 11

2015 2

2013 1

2005 1

2002 1

2001 1

2000 1

1999 1

open ︾

Keywords

Cyber-physical systems 4

Industry 4.0 4

Cyber-physical system 3

Intelligent manufacturing 3

Internet of Things 3

Smart manufacturing 3

cyber-physical systems 3

Adversarial attack 2

Cloud computing 2

Cyber–physical system 2

Database schemata 2

Industrial Internet of Things 2

Information schema constructs 2

Machine learning 2

Moving target defense 2

Network security 2

New-generation intelligent manufacturing 2

SMF genotypes 2

SMF instances 2

open ︾

Search scope:

排序: Display mode:

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cyberFrom the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofindependence, equality, self-defense, and jurisdiction.The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attackdefense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackdefense confrontation system.–defense system and equipment, including improving integrated perception and navigation, developing

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: national security issues induced by the fusion, involving political, economic, social, and national defenseTo effectively address the security threats of AI-enabled cyber attacks, we suggest that an intelligentnetwork attack and defense system should be established and its capabilities upgraded to construct equivalentand defense technologies.Furthermore, the AI-enabled network attack and defense technologies should be evaluated and verified

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defenseThis study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Cyber security meets artificial intelligence: a survey Review Article

Jian-hua LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1462-1474 doi: 10.1631/FITEE.1800573

Abstract:

There is a wide range of interdisciplinary intersections between cyber security and artificial intelligenceOn one hand, AI technologies, such as deep learning, can be introduced into cyber security to constructThus, AI models need specific cyber security defense and protection technologies to combat adversarialBased on the above two aspects, we review the intersection of AI and cyber security.counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense

Keywords: Cyber security     Artificial intelligence (AI)     Attack detection     Defensive techniques    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract: This paper proposes a black-box attack method with an extreme constraint for a safe-critical industrialUsing the one-variable attack (OVA) method, we explore the vulnerability of industrial variables andBased on the attack method, a corresponding adversarial training defense method is also proposed, whichFor industrial fault classification systems, the attack success rate of our method is close to (on TEP) or even higher than (on SP) the current most effective first-order white-box attack method, which requires

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract: We also provide a calculation framework for assessment of the network’s attack-defense confrontation

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Adversarial Attacks and Defenses in Deep Learning Feature Article

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Engineering 2020, Volume 6, Issue 3,   Pages 346-360 doi: 10.1016/j.eng.2019.12.012

Abstract:
Hence, adversarial attack and defense techniques have attracted increasing attention from both,
we first introduce the theoretical foundations, algorithms, and applications of adversarial attack
We then describe a few research efforts on the defense techniques, which cover the broad frontier

Keywords: Machine learning     Deep neural network Adversarial example     Adversarial attack     Adversarial defense    

Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles

Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1,   Pages 1-140 doi: 10.1631/FITEE.2000201

Abstract: novel distributed event-triggered scheme is proposed to keep the resilience and economy of a class of cyber-powersystems when the communication network is subject to malicious DoS attack.

Keywords: Economic dispatch     Denial of service (DoS) attack     Resilient event-triggered scheme     Distributed optimization    

Theoretical research and application of petrochemical Cyber-physical Systems

Jiming WANG

Frontiers of Engineering Management 2017, Volume 4, Issue 3,   Pages 242-255 doi: 10.15302/J-FEM-2017053

Abstract: A Cyber-physical System (CPS) is the infrastructure of a petrochemical smart factory.

Keywords: Cyber-physical System (CPS)     petrochemical industry     smart factory    

Distribution system state estimation: an overview of recent developments Review Article

Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 1,   Pages 4-17 doi: 10.1631/FITEE.1800590

Abstract: Accounting for cyber attacks, new corruption models are introduced, and robust PSSE approaches are outlined

Keywords: bound     Feasible point pursuit     Semidefinite relaxation     Proximal linear algorithm     Composite optimization     Cyberattack     Bad data detection    

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3,   Pages 316-328 doi: 10.1007/s11709-022-0810-8

Abstract: the damage evolution behavior of polypropylene fiber reinforced concrete (PFRC) subjected to sulfate attackThe effect of sulfate attack relative to time and fiber hybridization were analyzed and the compressionIn the initial stage of sulfate attack, the concrete micropores and microcracks were compacted graduallyWith increasing sulfate attack time, AE activity decreased.After 150 d of sulfate attack, the cumulative AE ringing counts of plain concrete went down by about

Keywords: polypropylene fiber reinforced concrete     sulfate attack     damage evolution behavior     acoustic emission    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract: cipher proposed in “Design of Block Cipher substitution network on chaos” can be broken by attackwith known plaintext and attack with ciphertext only, and the key of this cipher can be found by thedivide-and-conquer attack with the encipher transformation.

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only     divide-and-conquer attack    

Comprehensive review of modeling, structure, and integration techniques of smart buildings in the cyber-physical-social

Frontiers in Energy 2022, Volume 16, Issue 1,   Pages 74-94 doi: 10.1007/s11708-021-0792-6

Abstract: Involving human behaviors and cyber space, a traditional power system evolves into a cyber-physical-social

Keywords: smart buildings     cyber-physical-social-system     optimization     modeling     demand response     virtual power    

Title Author Date Type Operation

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Cyber security meets artificial intelligence: a survey

Jian-hua LI

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Journal Article

Resilient distributed economic dispatch of a cyber-power system under DoS attack

Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn

Journal Article

Theoretical research and application of petrochemical Cyber-physical Systems

Jiming WANG

Journal Article

Distribution system state estimation: an overview of recent developments

Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN

Journal Article

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

Comprehensive review of modeling, structure, and integration techniques of smart buildings in the cyber-physical-social

Journal Article