Resource Type

Journal Article 92

Conference Videos 4

Year

2024 1

2023 10

2022 13

2021 8

2020 10

2019 12

2018 7

2017 8

2016 8

2015 2

2014 1

2013 2

2012 1

2009 5

2005 1

2003 1

2002 1

2001 1

2000 1

1999 1

open ︾

Keywords

underwater tunnel 3

Adversarial attack 2

Moving target defense 2

Network security 2

Oil-water separation 2

Software-defined network 2

3D path planning 1

N-isopropylacrylamide 1

Puccinia striiformis f. sp. tritici 1

Trifolium repens 1

Abstract syntax tree 1

Acoustic localization 1

Adaptive control 1

Adversarial defense 1

Adversarial samples 1

Antifouling 1

Aquatic environment 1

Artificial intelligence (AI) 1

Attack detection 1

open ︾

Search scope:

排序: Display mode:

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attackdefense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackdefense confrontation system.attackdefense system and equipment, including improving integrated perception and navigation,

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract: This paper proposes a black-box attack method with an extreme constraint for a safe-critical industrialUsing the one-variable attack (OVA) method, we explore the vulnerability of industrial variables andBased on the attack method, a corresponding adversarial training defense method is also proposed, whichFor industrial fault classification systems, the attack success rate of our method is close to (on TEP) or even higher than (on SP) the current most effective first-order white-box attack method, which requires

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract: We also provide a calculation framework for assessment of the network’s attack-defense confrontation

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Adversarial Attacks and Defenses in Deep Learning Feature Article

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Engineering 2020, Volume 6, Issue 3,   Pages 346-360 doi: 10.1016/j.eng.2019.12.012

Abstract:
Hence, adversarial attack and defense techniques have attracted increasing attention from both,
we first introduce the theoretical foundations, algorithms, and applications of adversarial attack
We then describe a few research efforts on the defense techniques, which cover the broad frontier

Keywords: Machine learning     Deep neural network Adversarial example     Adversarial attack     Adversarial defense    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: national security issues induced by the fusion, involving political, economic, social, and national defenseSubsequently, future AI-enabled attack types such as situation-awareness covert attacks, distributedand defense system should be established and its capabilities upgraded to construct equivalent capabilitiesand defense technologies.Furthermore, the AI-enabled network attack and defense technologies should be evaluated and verified

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration    

Turbidity-adaptive underwater image enhancement method using image fusion

Frontiers of Mechanical Engineering 2022, Volume 17, Issue 3, doi: 10.1007/s11465-021-0669-8

Abstract: Clear, correct imaging is a prerequisite for underwater operations.Most of the existing underwater imaging methods focus on relatively clear underwater environment, itis uncertain that if those methods can work well in turbid and dynamic underwater environments.In this paper, we propose a turbidity-adaptive underwater image enhancement method.The proposed method is verified by an underwater image dataset captured in real underwater environment

Keywords: turbidity     underwater image enhancement     image fusion     underwater robots     visibility    

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3,   Pages 316-328 doi: 10.1007/s11709-022-0810-8

Abstract: the damage evolution behavior of polypropylene fiber reinforced concrete (PFRC) subjected to sulfate attackThe effect of sulfate attack relative to time and fiber hybridization were analyzed and the compressionIn the initial stage of sulfate attack, the concrete micropores and microcracks were compacted graduallyWith increasing sulfate attack time, AE activity decreased.After 150 d of sulfate attack, the cumulative AE ringing counts of plain concrete went down by about

Keywords: polypropylene fiber reinforced concrete     sulfate attack     damage evolution behavior     acoustic emission    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract: cipher proposed in “Design of Block Cipher substitution network on chaos” can be broken by attackwith known plaintext and attack with ciphertext only, and the key of this cipher can be found by thedivide-and-conquer attack with the encipher transformation.

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only     divide-and-conquer attack    

Design and construction technology of underwater tunnel

Wang Mengshu

Strategic Study of CAE 2009, Volume 11, Issue 7,   Pages 4-10

Abstract: text-align: justify;">It is briefly introduced that when passing over or crossing rivers, lakes and seas, underwaterof design and construction, key construction technology and frequently-used construction method of underwater

Keywords: underwater tunnel     design     construction    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: This paper first introduces some classic network defense technology.Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.defense technology.Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Centrifuge experiment and numerical analysis of an air-backed plate subjected to underwater shock loading

Zhijie HUANG, Xiaodan REN, Zuyu CHEN, Daosheng LING

Frontiers of Structural and Civil Engineering 2019, Volume 13, Issue 6,   Pages 1350-1362 doi: 10.1007/s11709-019-0559-x

Abstract: experiments and numerical studies are conducted to investigate the effect of shock loads due to an underwaterNumerical simulations with three different models of pressure time history generated by underwater explosionThe second model to predict the time history of shock wave pressure from an underwater explosion was

Keywords: underwater explosion     centrifuge experiment     shock load     dynamic response     accumulated shock impulse    

Effects of thermocline on performance of underwater glider’s power system propelled by ocean thermal

Hai YANG, Jie MA,

Frontiers in Energy 2009, Volume 3, Issue 4,   Pages 472-479 doi: 10.1007/s11708-009-0052-7

Abstract: Based on the enthalpy method, a mathematical model of the underwater glider’s power system wasthe time efficiency of operation was introduced, so that the effects of different thermoclines on the underwater

Keywords: mathematical     underwater glider     system working     certain     corresponding threshold    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Detecting large-scale underwater cracks based on remote operated vehicle and graph convolutional neural

Wenxuan CAO; Junjie LI

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 11,   Pages 1378-1396 doi: 10.1007/s11709-022-0855-8

Abstract: It is of great significance to quickly detect underwater cracks as they can seriously threaten the safetyof underwater structures.In this paper, a large-scale underwater crack examination method is proposed based on image stitchingIn addition, a purpose of this paper is to design a new convolution method to segment underwater imagesThe result shows that the improved APAP algorithm and GCN can adapt to complex underwater environments

Keywords: underwater cracks     remote operated vehicle     image stitching     image segmentation     graph convolutional    

Title Author Date Type Operation

Underwater AttackDefense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

Turbidity-adaptive underwater image enhancement method using image fusion

Journal Article

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

Design and construction technology of underwater tunnel

Wang Mengshu

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Centrifuge experiment and numerical analysis of an air-backed plate subjected to underwater shock loading

Zhijie HUANG, Xiaodan REN, Zuyu CHEN, Daosheng LING

Journal Article

Effects of thermocline on performance of underwater glider’s power system propelled by ocean thermal

Hai YANG, Jie MA,

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Detecting large-scale underwater cracks based on remote operated vehicle and graph convolutional neural

Wenxuan CAO; Junjie LI

Journal Article