Search scope:
排序: Display mode:
Cyber security meets artificial intelligence: a survey Review Article
Jian-hua LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1462-1474 doi: 10.1631/FITEE.1800573
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligenceOn one hand, AI technologies, such as deep learning, can be introduced into cyber security to constructOn the other hand, AI models will face various cyber threats, which will disturb their sample, learningThus, AI models need specific cyber security defense and protection technologies to combat adversarialBased on the above two aspects, we review the intersection of AI and cyber security.
Keywords: Cyber security Artificial intelligence (AI) Attack detection Defensive techniques
Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000201
Keywords: Economic dispatch Denial of service (DoS) attack Resilient event-triggered scheme Distributed optimization
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002
Keywords: artificial intelligence (AI) cyber attack and defense national security autonomous collaboration
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002
As cyberspace carries more and more national, public, and private interests, the issue of a cyberFrom the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofThe purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse
Keywords: cyber sovereignty cyber right of independence cyber right of equality cyber right of self-defense cyber right of jurisdiction cyber border defense
Theoretical research and application of petrochemical Cyber-physical Systems
Jiming WANG
Frontiers of Engineering Management 2017, Volume 4, Issue 3, Pages 242-255 doi: 10.15302/J-FEM-2017053
Keywords: Cyber-physical System (CPS) petrochemical industry smart factory
Distribution system state estimation: an overview of recent developments Review Article
Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 1, Pages 4-17 doi: 10.1631/FITEE.1800590
Keywords: bound Feasible point pursuit Semidefinite relaxation Proximal linear algorithm Composite optimization Cyberattack Bad data detection
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
Frontiers in Energy 2022, Volume 16, Issue 1, Pages 74-94 doi: 10.1007/s11708-021-0792-6
Keywords: smart buildings cyber-physical-social-system optimization modeling demand response virtual power
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
Onmodeling of electrical cyber-physical systems considering cyber security
Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 5, Pages 465-478 doi: 10.1631/FITEE.1500446
Keywords: Cyber-physical systems Cyber attacks Cascading failure analysis Smart grid
Frontiers of Engineering Management 2021, Volume 8, Issue 4, Pages 503-518 doi: 10.1007/s42524-021-0163-3
Keywords: Cyber–Physical Power System resilience assessment resilience optimization cascading failure modeling
Qingmeng TAN, Yifei TONG, Shaofeng WU, Dongbo LI
Frontiers of Mechanical Engineering 2020, Volume 15, Issue 1, Pages 1-11 doi: 10.1007/s11465-019-0563-9
Keywords: cyber physical system robot assembly multiagent system architecture
Cyber–physical systems development for construction applications
Chinemelu J. ANUMBA, Abiola AKANMU, Xiao YUAN, Congwen KAN
Frontiers of Engineering Management 2021, Volume 8, Issue 1, Pages 72-87 doi: 10.1007/s42524-020-0130-4
Keywords: cyber–physical systems components temporary structures cranes sensors
Title Author Date Type Operation
Resilient distributed economic dispatch of a cyber-power system under DoS attack
Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn
Journal Article
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Journal Article
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Journal Article
Theoretical research and application of petrochemical Cyber-physical Systems
Jiming WANG
Journal Article
Distribution system state estimation: an overview of recent developments
Gang WANG, Georgios B. GIANNAKIS, Jie CHEN, Jian SUN
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
Comprehensive review of modeling, structure, and integration techniques of smart buildings in the cyber-physical-social
Journal Article
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
Onmodeling of electrical cyber-physical systems considering cyber security
Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN
Journal Article
Cyber–Physical Power System (CPPS): A review on measures and optimization methods of system resilience
Journal Article
industrial robots: A CPS-based hybrid architecture for smart assembly shop floors with closed-loop dynamic cyber
Qingmeng TAN, Yifei TONG, Shaofeng WU, Dongbo LI
Journal Article