Resource Type

Journal Article 10

Year

2024 1

2022 1

2021 2

2020 1

2019 1

2017 1

2016 2

2013 1

open ︾

Keywords

Abnormal state 1

Adversarial attack 1

Adversarial defense 1

Cascading failure analysis 1

Cloud computing 1

Contourlet embedding representation 1

Cyber attacks 1

Cyber-physical systems 1

Deception attacks 1

Deep neural network Adversarial example 1

Defenses 1

Detection and localization 1

Elliptic curve cryptography 1

Industrial cyber-physical system 1

Industrial robots 1

Information leakage 1

Information theory 1

Intrusion detection 1

Learning vector quantization 1

Level-direction decomposition analysis 1

open ︾

Search scope:

排序: Display mode:

CORMAND2: A Deception Attack Against Industrial Robots Article

Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun

Engineering 2024, Volume 32, Issue 1,   Pages 186-202 doi: 10.1016/j.eng.2023.01.013

Abstract:

Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks, particularlyThese vulnerabilities were used to design Covering Robot Manipulation via Data Deception (CORMAND2),) system that the robot is operating normally by modifying the robot’s movement data and data deception

Keywords: Industrial robots     Vulnerability analysis     Deception attacks     Defenses    

Side-channel attacks and learning-vector quantization Article

Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4,   Pages 511-518 doi: 10.1631/FITEE.1500460

Abstract: Side-channel attacks, by taking advantage of physical vulnerabilities of cryptosystems, aim to gain secret

Keywords: Side-channel attacks     Elliptic curve cryptography     Multi-class classification     Learning vector quantization    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent network attacks, more frequent large-scale network attacks, higher concealment of network attacks, stronger confrontationgame of network attacks, and easier exposure to stealing of important data.particularly the construction of a cyberspace security knowledge brain and the detection of network attacksand scalable network security knowledge brain, the promotion of intelligent detection against network attacks

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Summarization of prevention and removing technology against terrorist attacks explosion

Fang Xiang,Gao Zhenru,Zhou Shouqiang,Guo Tao

Strategic Study of CAE 2013, Volume 15, Issue 5,   Pages 80-83

Abstract:

Bomb attack is the cruelest and the most sanguinary terrorist activity, and it is hard to keep away. Prevention and removing technology is the most direct means against terrorist attack explosion. It contains the equipment and means of explosive search, removing and prevention. Nowadays, there has been great progress in prevention and removing technology against terrorist attack explosion. However, there are still several technical problems. This paper analyzes the pattern of terrorist attack activity, the equipment and shielding technology of explosive search and removing. It studies the technical means of explosive detection, prevention and removing, and puts forward research idea directly to the limitation of current existing equipment and technology.

Keywords: terrorist explosion     explosive search     explosive removing     explosive prevention    

Adversarial Attacks and Defenses in Deep Learning Feature Article

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Engineering 2020, Volume 6, Issue 3,   Pages 346-360 doi: 10.1016/j.eng.2019.12.012

Abstract: Successful implementations
of adversarial attacks in real physical-world scenarios further demonstrate

Keywords: Machine learning     Deep neural network Adversarial example     Adversarial attack     Adversarial defense    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: Moreover, new attack scenarios are analyzed, including autonomous and large-scale denial-of-service attacks, intelligent and disguised social engineering attacks, and intelligent and targeted malicious code attacksSubsequently, future AI-enabled attack types such as situation-awareness covert attacks, distributedautonomous-collaboration attacks, and self-evolving attacks are explored.To effectively address the security threats of AI-enabled cyber attacks, we suggest that an intelligent

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration     self-evolution    

Level-direction decomposition analysis with a focus on image watermarking framework Article

M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11,   Pages 1199-1217 doi: 10.1631/FITEE.1500165

Abstract: several indices including the peak signal-to-noise ratio and structural similarity, whereby a set of attacksare carried out using a module of simulated attacks.presented approach is efficient compared with state-of-the-art approaches, under a number of serious attacks

Keywords: analysis     Watermarking framework     Contourlet embedding representation     Scrambling module     Simulated attacks    

Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual Regular Papers

Chao YANG, Yun-fei GUO, Hong-chao HU, Ya-wen WANG, Qing TONG, Ling-shu LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 5,   Pages 731-748 doi: 10.1631/FITEE.1800526

Abstract: Co-residency of different tenants’ virtual machines (VMs) in cloud provides a good chance for side-channel attacks

Keywords: Cloud computing     Side-channel attack     Information leakage     Multi-executor structure     Virtual machine switch     Virtual machine migration    

Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Research Article

Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI,bendawang@gmail.com,csewmf@zju.edu.cn,rongkuan233@gmail.com,zhangzhenyong@zju.edu.cn,funnywei@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 4,   Pages 587-603 doi: 10.1631/FITEE.2000546

Abstract: exposed in the communication and control infrastructure on the cyber side make WTSs prone to cyber attacksIn this paper, we propose an entropy-based (EBID) method to thwart cyber attacks against widely usedWe conducted experiments under two attack scenarios with a total of 36 attacks, showing that the proposed

Keywords: Industrial cyber-physical system     Water treatment system     Intrusion detection     Abnormal state     Detection and localization     Information theory    

Onmodeling of electrical cyber-physical systems considering cyber security Project supported by the National Basic Research Program (863) of China (No. 2015AA05002), the National Natural Science Foundation of China (No. 61471328), and the Science and Technology Project of State Grid, China (No. XXB17201400056)

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 5,   Pages 465-478 doi: 10.1631/FITEE.1500446

Abstract: Based on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service(DoS) attacks, replay attacks, and false data injection attacks.strategies such as load shedding and relay protection are also verified using this model against these attacks

Keywords: Cyber-physical systems     Cyber attacks     Cascading failure analysis     Smart grid    

Title Author Date Type Operation

CORMAND2: A Deception Attack Against Industrial Robots

Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun

Journal Article

Side-channel attacks and learning-vector quantization

Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Summarization of prevention and removing technology against terrorist attacks explosion

Fang Xiang,Gao Zhenru,Zhou Shouqiang,Guo Tao

Journal Article

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

Level-direction decomposition analysis with a focus on image watermarking framework

M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN

Journal Article

Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual

Chao YANG, Yun-fei GUO, Hong-chao HU, Ya-wen WANG, Qing TONG, Ling-shu LI

Journal Article

Detection and localization of cyber attacks on water treatment systems: an entropy-based approach

Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI,bendawang@gmail.com,csewmf@zju.edu.cn,rongkuan233@gmail.com,zhangzhenyong@zju.edu.cn,funnywei@163.com

Journal Article

Onmodeling of electrical cyber-physical systems considering cyber security Project supported by the National Basic Research Program (863) of China (No. 2015AA05002), the National Natural Science Foundation of China (No. 61471328), and the Science and Technology Project of State Grid, China (No. XXB17201400056)

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Journal Article