Search scope:
排序: Display mode:
CORMAND2: A Deception Attack Against Industrial Robots Article
Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun
Engineering 2024, Volume 32, Issue 1, Pages 186-202 doi: 10.1016/j.eng.2023.01.013
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks, particularlyThese vulnerabilities were used to design Covering Robot Manipulation via Data Deception (CORMAND2),) system that the robot is operating normally by modifying the robot’s movement data and data deception
Keywords: Industrial robots Vulnerability analysis Deception attacks Defenses
Side-channel attacks and learning-vector quantization Article
Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4, Pages 511-518 doi: 10.1631/FITEE.1500460
Keywords: Side-channel attacks Elliptic curve cryptography Multi-class classification Learning vector quantization
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003
Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense
Summarization of prevention and removing technology against terrorist attacks explosion
Fang Xiang,Gao Zhenru,Zhou Shouqiang,Guo Tao
Strategic Study of CAE 2013, Volume 15, Issue 5, Pages 80-83
Bomb attack is the cruelest and the most sanguinary terrorist activity, and it is hard to keep away. Prevention and removing technology is the most direct means against terrorist attack explosion. It contains the equipment and means of explosive search, removing and prevention. Nowadays, there has been great progress in prevention and removing technology against terrorist attack explosion. However, there are still several technical problems. This paper analyzes the pattern of terrorist attack activity, the equipment and shielding technology of explosive search and removing. It studies the technical means of explosive detection, prevention and removing, and puts forward research idea directly to the limitation of current existing equipment and technology.
Keywords: terrorist explosion explosive search explosive removing explosive prevention
Adversarial Attacks and Defenses in Deep Learning Feature Article
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Engineering 2020, Volume 6, Issue 3, Pages 346-360 doi: 10.1016/j.eng.2019.12.012
Keywords: Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002
Keywords: artificial intelligence (AI) cyber attack and defense national security autonomous collaboration self-evolution
Level-direction decomposition analysis with a focus on image watermarking framework Article
M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11, Pages 1199-1217 doi: 10.1631/FITEE.1500165
Keywords: analysis Watermarking framework Contourlet embedding representation Scrambling module Simulated attacks
Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual Regular Papers
Chao YANG, Yun-fei GUO, Hong-chao HU, Ya-wen WANG, Qing TONG, Ling-shu LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 5, Pages 731-748 doi: 10.1631/FITEE.1800526
Keywords: Cloud computing Side-channel attack Information leakage Multi-executor structure Virtual machine switch Virtual machine migration
Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Research Article
Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI,bendawang@gmail.com,csewmf@zju.edu.cn,rongkuan233@gmail.com,zhangzhenyong@zju.edu.cn,funnywei@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 4, Pages 587-603 doi: 10.1631/FITEE.2000546
Keywords: Industrial cyber-physical system Water treatment system Intrusion detection Abnormal state Detection and localization Information theory
Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 5, Pages 465-478 doi: 10.1631/FITEE.1500446
Keywords: Cyber-physical systems Cyber attacks Cascading failure analysis Smart grid
Title Author Date Type Operation
CORMAND2: A Deception Attack Against Industrial Robots
Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun
Journal Article
Side-channel attacks and learning-vector quantization
Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN
Journal Article
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Journal Article
Summarization of prevention and removing technology against terrorist attacks explosion
Fang Xiang,Gao Zhenru,Zhou Shouqiang,Guo Tao
Journal Article
Adversarial Attacks and Defenses in Deep Learning
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Journal Article
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Journal Article
Level-direction decomposition analysis with a focus on image watermarking framework
M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN
Journal Article
Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual
Chao YANG, Yun-fei GUO, Hong-chao HU, Ya-wen WANG, Qing TONG, Ling-shu LI
Journal Article
Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI,bendawang@gmail.com,csewmf@zju.edu.cn,rongkuan233@gmail.com,zhangzhenyong@zju.edu.cn,funnywei@163.com
Journal Article
Onmodeling of electrical cyber-physical systems considering cyber security
Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN
Journal Article