期刊文献+
共找到115,093篇文章
< 1 2 250 >
每页显示 20 50 100
PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs
1
作者 Abeer Alhuzali Qamar Al-Qahtani +2 位作者 Asmaa Niyazi Lama Alshehri Fatemah Alharbi 《Computers, Materials & Continua》 2026年第1期2194-2212,共19页
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra... The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies. 展开更多
关键词 Smishing attack detection phishing attacks ensemble learning CYBERSECURITY deep learning transformer-based models large language models
在线阅读 下载PDF
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
2
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
A Novel Unsupervised Structural Attack and Defense for Graph Classification
3
作者 Yadong Wang Zhiwei Zhang +2 位作者 Pengpeng Qiao Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第1期1761-1782,共22页
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev... Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations. 展开更多
关键词 Graph classification graph neural networks adversarial attack
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
4
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
5
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
6
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
贵州省荔波县微小扇头蜱携带Wuhan tick virus 2的基因特征分析
7
作者 唐继霞 陈秋 +8 位作者 孟娇 陈醒醒 代义松 余福勋 江佳富 孙毅 曹务春 吴家红 詹琳 《中国热带医学》 北大核心 2025年第4期461-466,共6页
目的了解贵州省荔波县微小扇头蜱携带的基因长度为11523 bp的Wuhan tick virus 2的基因特点,为该地区应对蜱传病的预防和控制方面提供数据支持。方法在贵州省荔波县采集牛体表寄生蜱,依据蜱的形态学特征和16S rDNA基因鉴定蜱种,用qEx-DN... 目的了解贵州省荔波县微小扇头蜱携带的基因长度为11523 bp的Wuhan tick virus 2的基因特点,为该地区应对蜱传病的预防和控制方面提供数据支持。方法在贵州省荔波县采集牛体表寄生蜱,依据蜱的形态学特征和16S rDNA基因鉴定蜱种,用qEx-DNA/RNA核酸提取试剂盒提取其DNA。病毒宏基因组测序由Illumina平台完成,参考美国国立生物技术信息中心注册的病毒序列对获得的Wuhan tick virus 2病毒序列进行基因注释,并通过Mega7软件构建系统发育树了解其遗传进化特征。结果本研究获得的Wuhan tick virus 2(楚病毒科芈病毒属)的核苷酸长度为11523 bp,GC含量为47.11%。通过BLASTn比对发现本研究获得的Wuhan tick virus 2的基因组平均核苷酸一致性与Wuhan tick virus 2(OP628559)最为接近,并以其作为参考序列对获得的Wuhan tick virus 2进行基因注释,发现该病毒序列有完整蛋白编码区,可编码4种蛋白,分别为依赖RNA的RNA聚合酶(RNA-dependent RNApolymerase,RdRP)、糖蛋白(glycoprotein,G)、核蛋白(nucleoprotein,N)、假设蛋白(hypothetical protein,ORF2);RdRp负责RNA复制转录,G介导病毒与宿主细胞结合,N守护并调控基因组,ORF2在病毒与宿主相互作用中起作用,符合L-G-N病毒序列的顺序,但其对人类和动物的致病性目前仍不清楚。遗传进化分析提示本次在贵州省荔波县微小扇头蜱中发现的Wuhan tick virus 2与分离自我国的Wuhan tick virus 2(PP444834,MZ965027)属于同一分支,亲缘关系最近;与分离自我国Hebei tick virus 1(MN217667)和Xinjiang mivirus 1(MZ244269)等序列处于不同遗传进化分支。结论Wuhan tick virus 2病毒的发现进一步完善了我国南方地区Wuhan tick virus 2的基因组数据,有助于揭示该病毒的生物特性和进化规律。 展开更多
关键词 病毒宏基因组学 基因特征 Wuhan tick virus 贵州 荔波
原文传递
Sustained maternal human immunodeficiency virus viral load suppression and cascade of human immunodeficiency virus testing among exposed infants in Rwanda 被引量:1
8
作者 Hafidha Mhando Bakari Jackson Sebeza +6 位作者 Haji Mbwana Ally Hassan Fredrick Fussi Habib Omari Ramadhani Peter Memiah Djemima Umutesi Basile Ikuzo Gallican Rwibasira 《World Journal of Virology》 2025年第2期67-78,共12页
BACKGROUND To prevent mother to child transmission(MTCT)of human immunodeficiency virus(HIV),sustained maternal viral load suppression(VLS)and early HIV testing among HIV exposed infants(HEI)is critical.AIM To investi... BACKGROUND To prevent mother to child transmission(MTCT)of human immunodeficiency virus(HIV),sustained maternal viral load suppression(VLS)and early HIV testing among HIV exposed infants(HEI)is critical.AIM To investigate maternal viral load results and infant HIV testing uptake at 6-weeks,and 9-months and 18-months in Rwanda.METHODS Between 2015 and 2022,VLS(<200 copies/mL)was measured among pregnant women living with HIV(WLHIV)from 38-healthcare facilities.Viral loads(VL)were measured at 6-months,12-months and 24-months,respectively.For maternal VL,the unit of analysis was visit-pair,and the pairs were created to define those with VL<200 copies/mL at two consecutive visits as having sustained VLS,persistent viremia(VL≥200 copies/mL at two consecutive visits),viral rebound(VL<200 copies/mL at prior visit only)and newly suppressed(VL<200 copies/mL at subsequent visit only).HEI were considered to have persistent HIV testing if they had all three HIV tests.Poisson regression models with generalized estimating equations were used to estimate the adjusted incidence rate ratio(aIRR)and 95%CI for factors associated with sustained VLS and persistent HIV testing.RESULTS A total of 1145 mother-infant pairs were analyzed.Infant HIV testing uptake at 6-weeks,9-months and 18-months was 1145(100.0%),1089(95.1%),1006(87.9%)respectively.Nine hundred ninety-nine HEI(87.3%)tested for HIV persistently.At 18-months,the incidence of HIV among HEI was 8(0.7%).Of 1145 mothers,1076(94.0%)had≥2 VL results making a total of 2010 visit-pairs(142-single;934-double visit-pairs).The incidence rate of sustained VLS,persistent viremia,viral rebound and new suppression were 91.0%,1.3%,3.6%and 4.0%respectively.Maternal disclosure of HIV status(aIRR=1.08,95%CI:1.02-1.14)was associated with increased likelihood of sustained VLS.Having peer support(aIRR=1.0595%CI:1.01-1.10)was associated with persistent HIV testing among HEI.CONCLUSION Sustained VLS is high among pregnant WLHIV in Rwanda.The low incidence of HIV among HEI may be attributed to high VLS levels.Targeted interventions,including enhanced HIV disclosure and peer support,are crucial for improving sustained VLS and increasing infant HIV testing uptake to reduce MTCT. 展开更多
关键词 Sustained viral load suppression Mother to child human immunodeficiency virus transmission Women living with human immunodeficiency virus Human immunodeficiency virus exposed infants Human immunodeficiency virus testing Rwanda
暂未订购
Influence of phytoplankton,bacteria and viruses on nutrient supply in tropical waters 被引量:1
9
作者 Zhi Yang Sim Kwan Chien Goh +3 位作者 Nur Hanisah binte Sukarji Feijian Mao Yiliang He Karina Yew-Hoong Gin 《Journal of Environmental Sciences》 2025年第5期174-186,共13页
Diel investigations of water environments are one means to holistically understand the dynamics and functional roles of phytoplankton,bacteria and viruses in these ecosystems.They have the potential to substantially i... Diel investigations of water environments are one means to holistically understand the dynamics and functional roles of phytoplankton,bacteria and viruses in these ecosystems.They have the potential to substantially impact carbon(C),nitrogen(N)and phosphorus(P)biogeochemistry through their respective roles.This study characterizes the phytoplankton,bacteria and virus communities and the elemental composition of various C,N and P nutrients flow over three diel cycles in tropical urban lake.Our results show that ratios of C:N:P fluctuated strongly from the lack of dissolved organic phosphorus(DOP)and PO_(4).Specifically,green algae peaked during day time and exudate dissolved organic matter(DOM)that strongly modulate dissolved organic carbon(DOC):DOP ratio to diel DOP limitation.Multiple linear regression and Stella modelling emphasize the roles of viruses together with Synechococcus as important nutrient recyclers of NH_(4)and PO_(4)in nutrients-limited waters.Respective normalised surface PO_(4)and combined surface and bottom NH_(4)concentration selected both viruses and Synechococcus as important drivers.Process model of N and P biogeochemical cycles can achieve 69%and 57%similar to observed concentration of NH_(4)and PO_(4),respectively.A short latent period of 9 hr was calculated,in addition to the calibrated high infectivity of viruses to Synechococcus.Taken together,the rapid turn-over between Synechococcus and viruses has biogeochemical significance,where the rapid recycling of essential nutrients allows for shortcuts in the N and P cycle,supporting a wide range of microbes. 展开更多
关键词 DIEL PHYTOPLANKTON BACTERIA virus NUTRIENTS Element ratios
原文传递
Data-Driven Prediction in Complex Systems of Virus Evolution and Global Warming 被引量:1
10
作者 LUO Liaofu LÜJun 《内蒙古大学学报(自然科学版)》 2025年第1期1-7,共7页
A complex system is inherently high-dimensional.Recent studies indicate that,even without complete knowledge of its evolutionary dynamics,the future behavior of such a system can be predicted using time-series data(da... A complex system is inherently high-dimensional.Recent studies indicate that,even without complete knowledge of its evolutionary dynamics,the future behavior of such a system can be predicted using time-series data(data-driven prediction).This suggests that the essential dynamics of a complex system can be captured through a low-dimensional representation.Virus evolution and climate change are two examples of complex,time-varying systems.In this article,we show that mutations in the spike protein provide valuable data for predicting SARS-CoV-2 variants,forecasting the possible emergence of the new macro-lineage Q in the near future.Our analysis also demonstrates that carbon dioxide concentration is a reliable indicator for predicting the evolution of the climate system,extending global surface air temperature(GSAT)forecasts through 2500. 展开更多
关键词 data-drivenprediction complex system virus evolution global warming
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
11
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
12
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack
13
作者 Jing Guo Ziying Wang +1 位作者 Yajuan Guo Haitao Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期427-442,共16页
The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charg... The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure. 展开更多
关键词 Anomaly detection electric vehicle aggregation attack deep cross-network
在线阅读 下载PDF
Expansion mechanism of sulfate attack on cement-treated aggregates under freeze-thaw cycles 被引量:1
14
作者 Qi WANG Jiankun LIU +3 位作者 Xu LI Pengcheng WANG Jingyu LIU Mingzhi SUN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 2025年第1期36-49,共14页
Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.According... Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.Accordingly,we investigated the influence of material proportions,the number of freeze-thaw(FT)cycles,and temperature gradients on the expansion mechanism of sulfate attack on cement-treated aggregates subjected to FT cycles.The conditions,laws,and dominant factors causing the expansion of aggregates were analyzed through swelling tests.The results indicate that under FT cycles,3%content cement-treated graded macadam only experiences slight deformation.The maximum strain of graded macadam attacked by 1%sodium sulfate content in each FT cycle is significantly larger than that of 3%content cement-treated graded macadam attacked by 1%sodium sulfate content.Using scanning electron microscopy,needle-like crystals were observed during sulfate attack of cement-treated graded macadam.Through quantitative analysis,we determined the recoverable and unrecoverable deformations of graded macadam under FT cycles.For graded macadam under sulfate attack,the expansion is mainly induced by periodic frost heave and salt expansion,as well as salt migration.For cement-treated graded macadam under sulfate attack,the expansion is mainly induced by chemical attack and salt migration.This study can serve as a reference for future research on the mechanics of sulfate attack on cement-treated aggregates that experience FT cycles,and provide theoretical support for methods that remediate the expansion induced by sulfate attack. 展开更多
关键词 Sulfate attack Freeze-thaw(FT)cycle Expansion Cement-treated aggregates Dominant factors
原文传递
Unsteady aerodynamic modeling and analysis of aircraft model in multi-DOF coupling maneuvers at high angles of attack with attention mechanism 被引量:1
15
作者 Wenzhao DONG Xiaoguang WANG +1 位作者 Dongbo HAN Qi LIN 《Chinese Journal of Aeronautics》 2025年第6期349-361,共13页
Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Deg... Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Degrees-of-Freedom(multi-DOF) and complex flow field structure.In this paper, a special kind of cable-driven parallel mechanism is firstly utilized as a new suspension method to conduct unsteady dynamic wind tunnel tests at high angles of attack, thereby providing experimental aerodynamic data. These tests include a wide range of multi-DOF coupled oscillatory motions with various amplitudes and frequencies. Then, for aerodynamic modeling and analysis, a novel data-driven Feature-Level Attention Recurrent neural network(FLAR) is proposed. This model incorporates a specially designed feature-level attention module that focuses on the state variables affecting the aerodynamic coefficients, thereby enhancing the physical interpretability of the aerodynamic model. Subsequently, spin maneuver simulations, using a mathematical model as the baseline, are conducted to validate the effectiveness of the FLAR. Finally, the results on wind tunnel data reveal that the FLAR accurately predicts aerodynamic coefficients, and observations through the visualization of attention scores identify the key state variables that affect the aerodynamic coefficients. It is concluded that the proposed FLAR enhances the interpretability of the aerodynamic model while achieving good prediction accuracy and generalization capability for multi-DOF coupling motion at high angles of attack. 展开更多
关键词 Unsteady aerodynamics Aerodynamic modeling High angle of attack Wind tunnel test Attention mechanism
原文传递
Experimental Observing Damage Evolution in Cement Pastes Exposed to External Sulfate Attack by in situ X-ray Computed Tomography
16
作者 WU Min CAO Kailei +4 位作者 XIAO Weirong YU Zetai CAO Jierong DING Qingjun LI Jinhui 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2025年第1期164-170,共7页
The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an ... The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an X-ray computed tomography(X-ray CT)was used,i e,the tomography system of Zeiss Xradia 510 versa.The results indicate that X-CT can monitor the development process and distribution characteristics of the internal cracks of cement pastes under ESA with attack time.In addition,the C3A content in the cement significantly affects the damage mode of cement paste specimens during sulfate erosion.The damage of ordinary Portland cement(OPC)pastes subjected to sulfate attack with high C3A content are severe,while the damage of sulfate resistant Portland cement(SRPC)pastes is much smaller than that of OPC pastes.Furthermore,a quadratic function describes the correlation between the crack volume fraction and development depth for two cement pastes immermed in sulfate solution. 展开更多
关键词 CONCRETE external sulfate attack damage evolution situ X-ray computed tomography
原文传递
Investigation of the infection route of HIV-associated cytomegalovirus retinitis 被引量:1
17
作者 Jie Cai Zi-Kang Xie +2 位作者 Dong-Yong Tang Hui-Yi Zuo Hao Liang 《International Journal of Ophthalmology(English edition)》 2025年第3期478-486,共9页
AIM:To investigate the etiology of ocular pathogens and to establish the various pathogens present in human immunodeficiency virus(HIV)patients with cytomegalovirus retinitis(CMVR).METHODS:A total of 17 HIV-infected p... AIM:To investigate the etiology of ocular pathogens and to establish the various pathogens present in human immunodeficiency virus(HIV)patients with cytomegalovirus retinitis(CMVR).METHODS:A total of 17 HIV-infected patients with concomitant eye disorders were enrolled.Patients were divided into CMVR group(10 patients,18 eyes)and non-CMVR group(7 patients,9 eyes)based on clinical manifestations and the presence of cytomegalovirus(CMV)-DNA in ocular specimens.The viral load of CMV was assessed using polymerase chain reaction in aqueous humor,vitreous fluid,and peripheral blood samples of patients in the CMVR group.Additionally,peripheral blood CD4^(+)T cell counts were measured in both groups.RESULTS:In the CMVR group,the CMV-DNA load in the vitreous and aqueous humor samples was substantially higher than in the peripheral blood samples(P<0.01).CMVDNA load in the aqueous humor and vitreous samples of the two eyes in the CMVR group was determined to be statistically significant(10 patients,16 eyes,P=0.018,0.012).Peripheral blood CD4^(+)T cell counts in the CMVR group were adversely linked with the CMV-DNA load in both the aqueous humor and peripheral blood(P=0.005,0.048).Compared with the non-CMVR group,the peripheral blood CD4^(+)T cell count in the CMVR group decreased significantly(P=0.014).The peripheral blood CD4^(+)T cell count exceeded 300 cells/μL in 85.71%of non-CMVR patients,whereas it was below 100 cells/μL in 90.00%of the CMVR group.The intraocular specimens of the patients who underwent CMVR testing did not include any additional infections.CONCLUSION:In HIV-associated CMVR patients,there may exist alternative,yet unidentified,infection pathways for intraocular CMV in addition to the conventional route.The substantial difference in CMV-DNA load between the eyes of most CMVR patients suggests that CMV may originate from different sources in each eye.The proportion of peripheral blood CD4^(+)T cells in HIV patients is negatively correlated with the quantity of CMV viruses in their eyes.The peripheral blood count of<100 cells/μL indicates a considerable increase in the risk of concurrent CMVR.Multi-ocular pathogen presentations are uncommon in HIV individuals with CMVR. 展开更多
关键词 CYTOMEGALOvirus RETINITIS acquired immunodeficiency syndrome human immunodeficiency virus
原文传递
Determination of angle of attack and dynamic stall loop in the complex vortical flow of a vertical axis wind turbine 被引量:1
18
作者 Wenzhong Shen Tao Xie +2 位作者 Lingpeng Ge Jiamin Yin Zhenye Sun 《Theoretical & Applied Mechanics Letters》 2025年第1期9-16,共8页
To improve the vertical axis wind turbine(VAWT)design,the angle of attack(AOA)and airfoil data must be treated correctly.The present paper develops a method for determining AOA on a VAWT based on computational fluid d... To improve the vertical axis wind turbine(VAWT)design,the angle of attack(AOA)and airfoil data must be treated correctly.The present paper develops a method for determining AOA on a VAWT based on computational fluid dynamics(CFD)analysis.First,a CFD analysis of a two-bladed VAWT equipped with a NACA 0012 airfoil is conducted.The thrust and power coefficients are validated through experiments.Second,the blade force and velocity data at monitoring points are collected.The AOA at different azimuth angles is determined by removing the blade self-induction at the monitoring point.Then,the lift and drag coefficients as a function of AOA are extracted.Results show that this method is independent of the monitoring points selection located at certain distance to the blades and the extracted dynamic stall hysteresis is more precise than the one with the“usual”method without considering the self-induction from bound vortices. 展开更多
关键词 Vertical axis wind turbine Computational fluid dynamics Angle of attack Dynamic stall
在线阅读 下载PDF
Interleukin 1βreceptor and synaptic dysfunction in recurrent brain infection with Herpes simplex virus type-1
19
作者 Roberto Piacentini Claudio Grassi 《Neural Regeneration Research》 SCIE CAS 2025年第2期416-423,共8页
Several experimental evidence suggests a link between brain Herpes simplex virus type-1 infection and the occurrence of Alzheimer’s disease.However,the molecular mechanisms underlying this association are not complet... Several experimental evidence suggests a link between brain Herpes simplex virus type-1 infection and the occurrence of Alzheimer’s disease.However,the molecular mechanisms underlying this association are not completely understood.Among the molecular mediators of synaptic and cognitive dysfunction occurring after Herpes simplex virus type-1 infection and reactivation in the brain neuroinflammatory cytokines seem to occupy a central role.Here,we specifically reviewed literature reports dealing with the impact of neuroinflammation on synaptic dysfunction observed after recurrent Herpes simplex virus type-1 reactivation in the brain,highlighting the role of interleukins and,in particular,interleukin 1βas a possible target against Herpes simplex virus type-1-induced neuronal dysfunctions. 展开更多
关键词 herpes simplex virus type 1 interleukin MICROGLIA NEUROINFLAMMATION synaptic dysfunction
暂未订购
Artemisia annua L.leaf extracts suppress influenza virus infection by targeting the viral nucleoprotein and blocking mitochondria-mediated apoptosis 被引量:1
20
作者 Xiwen Zhao Xuan Dai +8 位作者 Fuyi Wang Chenyang Li Xun Song Yingying Han Chaowei Zhang Lu Wang Zhendan He Rongping Zhang Liang Ye 《Virologica Sinica》 2025年第2期247-259,共13页
Artemisia annua L.is a medicinal herb with multiple therapeutic applications,whereas its antiinfluenza A virus(IAV)efficiency and mechanism of action are still unclear.Here,we investigated the inhibition activity and ... Artemisia annua L.is a medicinal herb with multiple therapeutic applications,whereas its antiinfluenza A virus(IAV)efficiency and mechanism of action are still unclear.Here,we investigated the inhibition activity and mechanism of A.annua leaf methanol extracts(AALME)against IAV in vitro and in vivo.Our results revealed that AALME exhibits potent anti-IAV activity by interacting with IAV particles.Mechanistically,AALME directly targets the IAV nucleoprotein(NP)protein and abolishes the nuclear import of IAV NP.AALME profoundly suppresses IAV-induced mitochondrial apoptosis via suppressing ROS-mediated AIF-dependent pathways.More importantly,we found that AALME plays a crucial role in protecting mice from IAV infection and mitigating IAV pathogenicity.This current work provides mechanistic insight into the mechanism by which AALME controls IAV infection in vitro and in vivo,potentially contributing to the development of antiviral treatments for IAV infection. 展开更多
关键词 Artemisia annua L Influenza A virus(IAV) Nucleoprotein(NP) Mitochondrial apoptosis
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部