Resource Type

Journal Article 26

Year

2024 1

2023 1

2022 5

2021 2

2020 2

2019 5

2018 2

2017 1

2015 2

2013 1

2001 1

open ︾

Keywords

Adversarial attack 2

Polygonum multiflorum 1

Abstract syntax tree 1

Adversarial defense 1

Adversarial samples 1

Artificial intelligence (AI) 1

Attack detection 1

Autonomous vehicle 1

Bad data detection 1

Behavior discovery 1

Bit-wise chosen-plaintext 1

Black-box attack 1

Channel impulse response 1

Chinese herbal medicine 1

Cloud computing 1

Coagulation 1

Cognitive radio network 1

Composite optimization 1

Correlation power attack 1

open ︾

Search scope:

排序: Display mode:

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract: cipher proposed in “Design of Block Cipher substitution network on chaos” can be broken by attackwith known plaintext and attack with ciphertext only, and the key of this cipher can be found by thedivide-and-conquer attack with the encipher transformation.

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only     divide-and-conquer attack    

Correlation power attack on amessage authentication code based on SM3 Research Articles

Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 930-945 doi: 10.1631/FITEE.1800312

Abstract: In this paper, a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed forReal attack experiments on a field programmable gate array (FPGA) board have been performed.

Keywords: HMAC-SM3     Side channel analysis     Correlation power attack     Bit-wise chosen-plaintext    

Being good or being known: International reputation of high-speed railway enterprises

Frontiers of Engineering Management   Pages 455-466 doi: 10.1007/s42524-023-0250-8

Abstract: framework for the international reputation of HSR enterprises from two perspectives: Being good and being known

Keywords: high-speed railway     international reputation     being good     being known     structural equation modeling    

What have we known so far about microplastics in drinking water treatment? A timely review

Frontiers of Environmental Science & Engineering 2022, Volume 16, Issue 5, doi: 10.1007/s11783-021-1492-5

Abstract:

• 23 available research articles on MPs in drinking water treatment are reviewed.

Keywords: Microplastics     Drinking water treatment     Coagulation     Flocculation     Membrane     Filtration    

The problems about the theory of “Known for unknown”

Zhu Xun

Strategic Study of CAE 2015, Volume 17, Issue 2,   Pages 35-39

Abstract:

Known for unknown” is an important guiding ideology and prospecting method in mineralexploration and a work based on the known clues for prospecting.“Known for unknown” discuss relative to the prospecting for new working target,mainly inspace layout and the difference between the point and the surface and the unknown regions and known oredeposits,and put forward prospecting method to analysis of development theory in “Known for unknown

Keywords: Known for unknown; theory; prospecting; method; practice    

What have we known so far for fluorescence staining and quantification of microplastics: A tutorial review

Shengdong Liu, Enxiang Shang , Jingnan Liu , Yining Wang , Nanthi Bolan , M.B. Kirkham , Yang Li

Frontiers of Environmental Science & Engineering 2022, Volume 16, Issue 1,   Pages 8-8 doi: 10.1007/s11783-021-1442-2

Abstract: Understanding the fate and toxicity of microplastics (MPs,<5 mm plastic particles) is limited by quantification methods. This paper summarizes the methods in use and presents new ones. First, sampling and pretreatment processes of MPs, including sample collection, digestion, density separation, and quality control are reviewed. Then the promising and convenient staining procedures and quantification methods for MPs using fluorescence dyes are reviewed. The factors that influence the staining of MPs, including their physicochemical properties, are summarized to provide an optimal operation procedure. In general, the digestion step is crucial to eliminate natural organic matter (NOM) to avoid interference in quantification. Chloroform was reported to be the most appropriate solvent, and 10–20 μg/mL are recommended as optimal dye concentrations. In addition, a heating and cooling procedure is recommended to maintain the fluorescence intensity of MPs for two months. After staining, a fluorescence microscope is usually used to characterize the morphology, mass, or number of MPs, but compositional analysis cannot be determined with it. These fluorescence staining methods have been implemented to study MP abundance, transport, and toxicity and have been combined with other chemical characterization techniques, such as Fourier transform infrared spectroscopy and Raman spectroscopy. More studies are needed to focus on the synthesis of novel dyes to avoid NOM’s interference. They need to be combined with other spectroscopic techniques to characterize plastic composition and to develop image-analysis methods. The stability of stained MPs needs to be improved.

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3,   Pages 316-328 doi: 10.1007/s11709-022-0810-8

Abstract: the damage evolution behavior of polypropylene fiber reinforced concrete (PFRC) subjected to sulfate attackThe effect of sulfate attack relative to time and fiber hybridization were analyzed and the compressionIn the initial stage of sulfate attack, the concrete micropores and microcracks were compacted graduallyWith increasing sulfate attack time, AE activity decreased.After 150 d of sulfate attack, the cumulative AE ringing counts of plain concrete went down by about

Keywords: polypropylene fiber reinforced concrete     sulfate attack     damage evolution behavior     acoustic emission    

Evaluating effect of chloride attack and concrete cover on the probability of corrosion

Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR

Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4,   Pages 379-390 doi: 10.1007/s11709-013-0223-9

Abstract: Corrosion of reinforced concrete (RC) structures is one of the significant causes of deterioration of reinforced concrete (RC) structures. Chlorination is a major process governing the initiation and advancement of the injurious corrosion of steel bars. Now, several researches on the chlorination of concrete structures have been ongoing around the world. Present article reviews several recently performed chlorination studies, and from results of a field survey evaluates the effect of chloride content on the probability of corrosion and the influence of concrete compressive strength on the chloride content and penetration, also evaluates the effect of concrete cover over the chloride content of the RC structures at rebar depth and on the probability of corrosion.

Keywords: concrete     chloride     reinforcement     corrosion     deterioration     cover    

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attackconfrontation system, and proposes corresponding suggestions for the development of the underwater attack

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract: This paper proposes a black-box attack method with an extreme constraint for a safe-critical industrialUsing the one-variable attack (OVA) method, we explore the vulnerability of industrial variables andBased on the attack method, a corresponding adversarial training defense method is also proposed, whichFor industrial fault classification systems, the attack success rate of our method is close to (on TEP) or even higher than (on SP) the current most effective first-order white-box attack method, which requires

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Evidence chain-based causality identification in herb-induced liver injury: exemplification of a well-known

Jiabo Wang,Zhijie Ma,Ming Niu,Yun Zhu,Qingsheng Liang,Yanling Zhao,Jingyuan Song,Zhaofang Bai,Yaming Zhang,Ping Zhang,Na Li,Yakun Meng,Qi Li,Lushan Qin,Guangju Teng,Junling Cao,Baosen Li,Shilin Chen,Yonggang Li,Zhengsheng Zou,Honghao Zhou,Xiaohe Xiao

Frontiers of Medicine 2015, Volume 9, Issue 4,   Pages 457-467 doi: 10.1007/s11684-015-0417-8

Abstract:

Herbal medicines have recently been recognized as the second most common cause of drug-induced liver injury (DILI) in the United States. However, reliable methods to identify the DILI causality of some herbs, such as Heshouwu (dried root of Polygonum multiflorum), remain lacking. In this study, a total of 12 307 inpatients with liver dysfunction and 147 literature-reported cases of Heshouwu DILI were screened. A general algorithm indicated that only 22.5% (9/40) and 30.6% (45/147) of all hospitalization and literature case reports, respectively, demonstrate the high probability of DILI causality of Heshouwu. By contrast, 95% (19/20) of all cases prospectively investigated by pharmacognosy, phytochemistry, and metabolomic tests exhibited highly probable causality, including a patient who was previously incorrectly attributed and a case that was excluded from Heshouwu causality by pharmacognostic evidence. Toxin (heavy metals, pesticides, and mycotoxins) contamination was also excluded from Heshouwu DILI causality. The objectivity of these screening methods for Heshouwu DILI diagnosis addresses safety concerns regarding stilbene-containing herbal medicines and dietary supplements.

Keywords: drug-induced liver injury     pharmacognosy     metabolomics     stilbene     Polygonum multiflorum     Chinese herbal medicine    

On detecting primary user emulation attack using channel impulse response in the cognitive radio network Article

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1665-1676 doi: 10.1631/FITEE.1700203

Abstract: However, a serious denial-of-service (DoS) attack, named the ‘primary user emulation attack (PUEA)’,

Keywords: Cognitive radio network     Primary user emulation attack     Subspace-based blind channel estimation     Channel    

A time−space porosity computational model for concrete under sulfate attack

Frontiers of Structural and Civil Engineering doi: 10.1007/s11709-023-0985-7

Abstract: The deterioration of the microscopic pore structure of concrete under external sulfate attack (ESA) is

Keywords: expansion deformation     porosity     internal expansion stress     external sulfate attack     mechanical–chemical    

Resilient distributed economic dispatch of a cyber-power system under DoS attack Research Articles

Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1,   Pages 1-140 doi: 10.1631/FITEE.2000201

Abstract: economy of a class of cyber-power systems when the communication network is subject to malicious DoS attack

Keywords: Economic dispatch     Denial of service (DoS) attack     Resilient event-triggered scheme     Distributed optimization    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract: We also provide a calculation framework for assessment of the network’s attack-defense confrontation

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Title Author Date Type Operation

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

Correlation power attack on amessage authentication code based on SM3

Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG

Journal Article

Being good or being known: International reputation of high-speed railway enterprises

Journal Article

What have we known so far about microplastics in drinking water treatment? A timely review

Journal Article

The problems about the theory of “Known for unknown”

Zhu Xun

Journal Article

What have we known so far for fluorescence staining and quantification of microplastics: A tutorial review

Shengdong Liu, Enxiang Shang , Jingnan Liu , Yining Wang , Nanthi Bolan , M.B. Kirkham , Yang Li

Journal Article

The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack

Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU

Journal Article

Evaluating effect of chloride attack and concrete cover on the probability of corrosion

Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR

Journal Article

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Evidence chain-based causality identification in herb-induced liver injury: exemplification of a well-known

Jiabo Wang,Zhijie Ma,Ming Niu,Yun Zhu,Qingsheng Liang,Yanling Zhao,Jingyuan Song,Zhaofang Bai,Yaming Zhang,Ping Zhang,Na Li,Yakun Meng,Qi Li,Lushan Qin,Guangju Teng,Junling Cao,Baosen Li,Shilin Chen,Yonggang Li,Zhengsheng Zou,Honghao Zhou,Xiaohe Xiao

Journal Article

On detecting primary user emulation attack using channel impulse response in the cognitive radio network

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Journal Article

A time−space porosity computational model for concrete under sulfate attack

Journal Article

Resilient distributed economic dispatch of a cyber-power system under DoS attack

Feisheng Yang, Xuhui Liang, Xiaohong Guan,yangfeisheng@nwpu.edu.cn,liangxuhui@mail.nwpu.edu.cn,xhguan@sei.xjtu.edu.cn

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article