Search scope:
排序: Display mode:
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002
As cyberspace carries more and more national, public, and private interests, the issue of a cyberFrom the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofindependence, equality, self-defense, and jurisdiction.The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse
Keywords: cyber sovereignty cyber right of independence cyber right of equality cyber right of self-defense cyber right of jurisdiction cyber border defense
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attack–defense confrontation system.–defense system and equipment, including improving integrated perception and navigation, developing
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002
Keywords: artificial intelligence (AI) cyber attack and defense national security autonomous collaboration
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003
Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense
Cyber security meets artificial intelligence: a survey Review Article
Jian-hua LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1462-1474 doi: 10.1631/FITEE.1800573
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligenceOn one hand, AI technologies, such as deep learning, can be introduced into cyber security to constructThus, AI models need specific cyber security defense and protection technologies to combat adversarialBased on the above two aspects, we review the intersection of AI and cyber security.counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense
Keywords: Cyber security Artificial intelligence (AI) Attack detection Defensive techniques
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Adversarial Attacks and Defenses in Deep Learning Feature Article
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Engineering 2020, Volume 6, Issue 3, Pages 346-360 doi: 10.1016/j.eng.2019.12.012
Keywords: Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
Theoretical research and application of petrochemical Cyber-physical Systems
Jiming WANG
Frontiers of Engineering Management 2017, Volume 4, Issue 3, Pages 242-255 doi: 10.15302/J-FEM-2017053
Keywords: Cyber-physical System (CPS) petrochemical industry smart factory
Distribution system state estimation: an overview of recent developments Review Article
Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 1, Pages 4-17 doi: 10.1631/FITEE.1800590
Keywords: bound Feasible point pursuit Semidefinite relaxation Proximal linear algorithm Composite optimization Cyberattack Bad data detection
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014
Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research
Keywords: mimic defense active defense technology cybersecurity rebalance
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
Frontiers in Energy 2022, Volume 16, Issue 1, Pages 74-94 doi: 10.1007/s11708-021-0792-6
Keywords: smart buildings cyber-physical-social-system optimization modeling demand response virtual power
Title Author Date Type Operation
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Journal Article
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
Calculation of the Behavior Utility of a Network System: Conception and Principle
Changzhen Hu
Journal Article
Adversarial Attacks and Defenses in Deep Learning
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Journal Article
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article
Theoretical research and application of petrochemical Cyber-physical Systems
Jiming WANG
Journal Article
Distribution system state estimation: an overview of recent developments
Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article