Resource Type

Journal Article 520

Conference Videos 15

Year

2024 2

2023 60

2022 58

2021 58

2020 52

2019 34

2018 31

2017 33

2016 23

2015 22

2014 12

2013 14

2012 12

2011 5

2010 4

2009 7

2008 13

2007 14

2006 9

2005 15

open ︾

Keywords

neural network 32

artificial neural network 21

Neural network 11

network 10

optimization 9

Artificial intelligence 7

convolutional neural network 7

genetic algorithm 7

artificial neural network (ANN) 6

Deep learning 5

BP neural network 4

6G 3

ANN 3

Artificial neural network 3

Bayesian belief network 3

Network security 3

finite element method 3

ANOVA 2

Adversarial attack 2

open ︾

Search scope:

排序: Display mode:

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract:

The service and application of a network is a behavioral process that is oriented toward its operationsThis paper describes scenes of network behavior as differential manifolds.behavior and propose a mathematical description of the network behavior path and behavior utility.Based on the principle of differential geometry, this paper puts forward the function of network behaviorWe also provide a calculation framework for assessment of the network’s attack-defense confrontation

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attackdefense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackdefense confrontation system.and proposes corresponding suggestions for the development of the underwater attackdefense system

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

Adversarial Attacks and Defenses in Deep Learning Feature Article

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Engineering 2020, Volume 6, Issue 3,   Pages 346-360 doi: 10.1016/j.eng.2019.12.012

Abstract:
Hence, adversarial attack and defense techniques have attracted increasing attention from both,
we first introduce the theoretical foundations, algorithms, and applications of adversarial attack
We then describe a few research efforts on the defense techniques, which cover the broad frontier

Keywords: Machine learning     Deep neural network Adversarial example     Adversarial attack     Adversarial defense    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract: This paper proposes a black-box attack method with an extreme constraint for a safe-critical industrialUsing the one-variable attack (OVA) method, we explore the vulnerability of industrial variables andBased on the attack method, a corresponding adversarial training defense method is also proposed, whichFor industrial fault classification systems, the attack success rate of our method is close to (on TEP) or even higher than (on SP) the current most effective first-order white-box attack method, which requires

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties None

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 238-252 doi: 10.1631/FITEE.1800516

Abstract: In response to this attack method, we propose a novel approach, i.e., an “isolating and dynamic” cyberdefense, which cuts these potential chains to reduce the cumulative availability of the gathered informationFirst, we build a zero-trust network environment through network isolation, and then multiple networkSecond, we propose a software-defined proactive cyber defense solution (SPD) for enterprise networkspath, while limiting the performance impact on the benign network user.

Keywords: Intranet defense     Software-defined network     Multi-dimensional maneuvering    

Gametheoretic analysis for themechanism of moving target defense Article

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 2017-2034 doi: 10.1631/FITEE.1601797

Abstract: Moving target defense (MTD) is a novel way to alter the asymmetric situation of attacks and defenses,However, relevant analysis for the defense mechanism of the MTD technology is still absent.In this paper, we analyze the defense mechanism of MTD technology in two dimensions.First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technologyThis work gives theoretical support for understanding the defense process and defense mechanism of MTD

Keywords: Network security     Moving target defense (MTD)     Defense mechanism     Defense model     Game theory    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: effectively address the security threats of AI-enabled cyber attacks, we suggest that an intelligent networkattack and defense system should be established and its capabilities upgraded to construct equivalentSharing of AI security data assets should be encouraged to develop a data-centered path for AI-enabled networkattack and defense technologies.Furthermore, the AI-enabled network attack and defense technologies should be evaluated and verified

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration    

On detecting primary user emulation attack using channel impulse response in the cognitive radio network Article

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1665-1676 doi: 10.1631/FITEE.1700203

Abstract: However, a serious denial-of-service (DoS) attack, named the ‘primary user emulation attack (PUEA)’,exists in the network to deteriorate the system performance.detection method that exploits the radio channel information to detect the PUEA in the cognitive radio network

Keywords: Cognitive radio network     Primary user emulation attack     Subspace-based blind channel estimation     Channel    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought aboutthreats and data attack threats, and concludes that internal and external risk factors become the doublethreats to the industry’s dedicated network and the traditional network architecture restrictsnetwork security and reliability in the rail transit industry.for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3,   Pages 316-328 doi: 10.1007/s11709-022-0810-8

Abstract: the damage evolution behavior of polypropylene fiber reinforced concrete (PFRC) subjected to sulfate attackThe effect of sulfate attack relative to time and fiber hybridization were analyzed and the compressionIn the initial stage of sulfate attack, the concrete micropores and microcracks were compacted graduallyWith increasing sulfate attack time, AE activity decreased.After 150 d of sulfate attack, the cumulative AE ringing counts of plain concrete went down by about

Keywords: polypropylene fiber reinforced concrete     sulfate attack     damage evolution behavior     acoustic emission    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract: paper, it is pointed out that the block cipher proposed in “Design of Block Cipher substitution networkon chaos” can be broken by attack with known plaintext and attack with ciphertext only, and thekey of this cipher can be found by the divide-and-conquer attack with the encipher transformation.

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only     divide-and-conquer attack    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: This paper first introduces some classic network defense technology.Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.The effectiveness of a mimic defense system is also analyzed in comparison with a traditional networkdefense technology.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Evaluating effect of chloride attack and concrete cover on the probability of corrosion

Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR

Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4,   Pages 379-390 doi: 10.1007/s11709-013-0223-9

Abstract: Corrosion of reinforced concrete (RC) structures is one of the significant causes of deterioration of reinforced concrete (RC) structures. Chlorination is a major process governing the initiation and advancement of the injurious corrosion of steel bars. Now, several researches on the chlorination of concrete structures have been ongoing around the world. Present article reviews several recently performed chlorination studies, and from results of a field survey evaluates the effect of chloride content on the probability of corrosion and the influence of concrete compressive strength on the chloride content and penetration, also evaluates the effect of concrete cover over the chloride content of the RC structures at rebar depth and on the probability of corrosion.

Keywords: concrete     chloride     reinforcement     corrosion     deterioration     cover    

Title Author Date Type Operation

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Journal Article

Gametheoretic analysis for themechanism of moving target defense

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

On detecting primary user emulation attack using channel impulse response in the cognitive radio network

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Evaluating effect of chloride attack and concrete cover on the probability of corrosion

Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR

Journal Article