期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Catalytic activity of Pd_(6)nanoclusters for 4-nitrophenol reduction:strong effect of protecting ligand content
1
作者 Qian Guo Wan-Fu Zhang +8 位作者 Shui-Feng Zhang Zi-Yun Su Xiao-Yun Gao Bei-Rong Yu Di Wang You-Jun Fan S.Jafar Hoseini Fu-Qin Zheng Wei Chen 《Rare Metals》 2025年第6期4294-4301,共8页
Metal nanoclusters(MNCs)possess distinct chemical properties due to their diverse electronic structures.As a class of promising model catalysts,it is of importance to explore the relationship between their structures ... Metal nanoclusters(MNCs)possess distinct chemical properties due to their diverse electronic structures.As a class of promising model catalysts,it is of importance to explore the relationship between their structures and properties.However,it is still challenging to get highly active and stable MNCs as surface ligands can hinder their activities,while a complete lack of surface ligand protection can lead to instability.To address this concern,here a series of Pd_(6)nanoclusters(NCs)with varying ligand amounts were synthesized by using Pd_(6)(SC_(6)(C_(2))H_(17))_(12)as precursor and single-walled carbon nanotube(s-CNT)as carrier through treating the composite at different temperatures and times. 展开更多
关键词 protecting ligand content catalytic activity pd nanoclusters metal nanoclusters explore relationship metal nanoclusters mncs possess electronic structuresas model catalystsit
原文传递
Investigation of the effect of argon protection behavior in the ingot casting process 被引量:2
2
作者 ZHOU Tongjun 《Baosteel Technical Research》 CAS 2015年第4期20-25,共6页
With the continuous improvement of product quality and function,the quality control of mold steel is becoming increasingly stricter. Argon protection is essential for ensuring casting quality during ingot casting. The... With the continuous improvement of product quality and function,the quality control of mold steel is becoming increasingly stricter. Argon protection is essential for ensuring casting quality during ingot casting. The development of argon protection in ingot casting and the production process of enclosed argon protection in 40 t line is discussed,w ith particular focus given the factors affecting the flow of oxygen in the argon protection cover are discussed. The influence of some related factors on the oxygen content is analyzed. On the basis of the online measurements of the oxygen content,the optimized operational approaches for improving the effect of argon protection are developed. This can decrease the liquid steel via secondary oxidation,and improve the quality of the ingots. 展开更多
关键词 argon protection ingot casting oxygen content quality
在线阅读 下载PDF
GWO-LightGBM:A Hybrid Grey Wolf Optimized Light Gradient Boosting Model for Cyber-Physical System Security
3
作者 Adeel Munawar Muhammad Nadeem Ali +1 位作者 Awais Qasim Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第10期1189-1211,共23页
Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,t... Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment. 展开更多
关键词 Cyber-physical systems intrusion detection system machine learning digital contents copyright protection grey wolf optimization gradient boosting network security content protection LightGBM
在线阅读 下载PDF
Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme
4
作者 Yung-Yao Chen Yu-Chen Hu +1 位作者 Ting-Kai Yang You-An Wang 《Computers, Materials & Continua》 SCIE EI 2022年第6期5167-5182,共16页
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication an... Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods. 展开更多
关键词 content protection technology security for image data absolute moment block truncation coding(AMBTC) direct binary search(DBS)
在线阅读 下载PDF
PathMarker:protecting web contents against inside crawlers
5
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 CSCD 2019年第1期100-116,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism Stealthy distributed inside crawler Confidential Website content protection
原文传递
PathMarker:protecting web contents against inside crawlers
6
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 2018年第1期375-391,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism Stealthy distributed inside crawler Confidential Website content protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部