期刊文献+
共找到274篇文章
< 1 2 14 >
每页显示 20 50 100
Adaptive Simulation Backdoor Attack Based on Federated Learning
1
作者 SHI Xiujin XIA Kaixiong +3 位作者 YAN Guoying TAN Xuan SUN Yanxu ZHU Xiaolong 《Journal of Donghua University(English Edition)》 2026年第1期50-58,共9页
In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mec... In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mechanisms during aggregation,it is difficult to conduct effective backdoor attacks.In addition,existing backdoor attack methods are faced with challenges,such as low backdoor accuracy,poor ability to evade anomaly detection,and unstable model training.To address these challenges,a method called adaptive simulation backdoor attack(ASBA)is proposed.Specifically,ASBA improves the stability of model training by manipulating the local training process and using an adaptive mechanism,the ability of the malicious model to evade anomaly detection by combing large simulation training and clipping,and the backdoor accuracy by introducing a stimulus model to amplify the impact of the backdoor in the global model.Extensive comparative experiments under five advanced defense scenarios show that ASBA can effectively evade anomaly detection and achieve high backdoor accuracy in the global model.Furthermore,it exhibits excellent stability and effectiveness after multiple rounds of attacks,outperforming state-of-the-art backdoor attack methods. 展开更多
关键词 federated learning backdoor attack PRIVACY adaptive attack SIMULATION
在线阅读 下载PDF
CASBA:Capability-Adaptive Shadow Backdoor Attack against Federated Learning
2
作者 Hongwei Wu Guojian Li +2 位作者 Hanyun Zhang Zi Ye Chao Ma 《Computers, Materials & Continua》 2026年第3期1139-1163,共25页
Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global... Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global model through compromised updates,posing significant threats to model integrity and becoming a key focus in FL security.Existing backdoor attack methods typically embed triggers directly into original images and consider only data heterogeneity,resulting in limited stealth and adaptability.To address the heterogeneity of malicious client devices,this paper proposes a novel backdoor attack method named Capability-Adaptive Shadow Backdoor Attack(CASBA).By incorporating measurements of clients’computational and communication capabilities,CASBA employs a dynamic hierarchical attack strategy that adaptively aligns attack intensity with available resources.Furthermore,an improved deep convolutional generative adversarial network(DCGAN)is integrated into the attack pipeline to embed triggers without modifying original data,significantly enhancing stealthiness.Comparative experiments with Shadow Backdoor Attack(SBA)across multiple scenarios demonstrate that CASBA dynamically adjusts resource consumption based on device capabilities,reducing average memory usage per iteration by 5.8%.CASBA improves resource efficiency while keeping the drop in attack success rate within 3%.Additionally,the effectiveness of CASBA against three robust FL algorithms is also validated. 展开更多
关键词 Federated learning backdoor attack generative adversarial network adaptive attack strategy distributed machine learning
在线阅读 下载PDF
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
3
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
AMA:Adaptive Multimodal Adversarial Attack with Dynamic Perturbation Optimization
4
作者 Yufei Shi Ziwen He +2 位作者 Teng Jin Haochen Tong Zhangjie Fu 《Computer Modeling in Engineering & Sciences》 2025年第8期1831-1848,共18页
This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts... This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts perturbation amplitude based on task complexity and optimizes the perturbation direction based on the gradient direction in real time to enhance attack efficiency.Experimental results demonstrate that AMA elevates attack success rates from approximately 78.95%to 89.56%on visual question answering and from78.82%to 84.96%on visual reasoning tasks across representative vision-language benchmarks.These findings demonstrate AMA’s superior attack efficiency and reveal the vulnerability of current visual language models to carefully crafted adversarial examples,underscoring the need to enhance their robustness. 展开更多
关键词 Adversarial attack visual language model black-box attack adaptive multimodal attack disturbance intensity
在线阅读 下载PDF
Adaptive regulation-based Mutual Information Camouflage Poisoning Attack in Graph Neural Networks
5
作者 Jihui Yin Taorui Yang +3 位作者 Yifei Sun Jianzhi Gao Jiangbo Lu Zhi-Hui Zhan 《Journal of Automation and Intelligence》 2025年第1期21-28,共8页
Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks ... Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks to generate a set of fake nodes,injecting them into a clean GNNs to poison the graph structure and evaluate the robustness of GNNs.In the attack process,the computation of new node connections and the attack loss are independent,which affects the attack on the GNN.To improve this,a Fake Node Camouflage Attack based on Mutual Information(FNCAMI)algorithm is proposed.By incorporating Mutual Information(MI)loss,the distribution of nodes injected into the GNNs become more similar to the original nodes,achieving better attack results.Since the loss ratios of GNNs and MI affect performance,we also design an adaptive weighting method.By adjusting the loss weights in real-time through rate changes,larger loss values are obtained,eliminating local optima.The feasibility,effectiveness,and stealthiness of this algorithm are validated on four real datasets.Additionally,we use both global and targeted attacks to test the algorithm’s performance.Comparisons with baseline attack algorithms and ablation experiments demonstrate the efficiency of the FNCAMI algorithm. 展开更多
关键词 Mutual information adaptive weighting Poisoning attack Graph neural networks
在线阅读 下载PDF
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
6
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks 被引量:8
7
作者 Xianggui Guo Dongyu Zhang +1 位作者 Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第10期1644-1656,共13页
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-d... This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when Do S attacks occur.To save network resources,an adaptive memory event-triggered mechanism(AMETM)is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM's updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality(LMI)technique.Finally,simulation examples show the effectiveness of the proposed control scheme. 展开更多
关键词 adaptive memory event-triggered mechanism(AMETM) compensation mechanism denial-of-service(DoS)attacks nonlinear multi-agent systems(MASs) observer-based anti-disturbance control
在线阅读 下载PDF
Dynamic load-altering attack detection based on adaptive fading Kalman filter in power systems 被引量:1
8
作者 Qiang Ma Zheng Xu +4 位作者 Wenting Wang Lin Lin Tiancheng Ren Shuxian Yang Jian Li 《Global Energy Interconnection》 CAS CSCD 2021年第2期184-192,共9页
This paper presents an effective and feasible method for detecting dynamic load-altering attacks(D-LAAs)in a smart grid.First,a smart grid discrete system model is established in view of D-LAAs.Second,an adaptive fadi... This paper presents an effective and feasible method for detecting dynamic load-altering attacks(D-LAAs)in a smart grid.First,a smart grid discrete system model is established in view of D-LAAs.Second,an adaptive fading Kalman filter(AFKF)is designed for estimating the state of the smart grid.The AFKF can completely filter out the Gaussian noise of the power system,and obtain a more accurate state change curve(including consideration of the attack).A Euclidean distance ratio detection algorithm based on the AFKF is proposed for detecting D-LAAs.Amplifying imperceptible D-LAAs through the new Euclidean distance ratio improves the D-LAA detection sensitivity,especially for very weak D-LAA attacks.Finally,the feasibility and effectiveness of the Euclidean distance ratio detection algorithm are verified based on simulations. 展开更多
关键词 adaptive fading Kalman filter Dynamic load attack detection.
在线阅读 下载PDF
Adaptive output regulation for cyber-physical systems under time-delay attacks
9
作者 Dan Jin Bo Chen +1 位作者 Li Yu Shichao Liu 《Control Theory and Technology》 EI CSCD 2022年第1期20-31,共12页
In this paper,we present an output regulation method for unknown cyber-physical systems(CPSs)under time-delay attacks in both the sensor-to-controller(S-C)channel and the controller-to-actuator(C-A)channel.The propose... In this paper,we present an output regulation method for unknown cyber-physical systems(CPSs)under time-delay attacks in both the sensor-to-controller(S-C)channel and the controller-to-actuator(C-A)channel.The proposed approach is designed using control inputs and tracking errors which are accessible data.Reinforcement learning is leveraged to update the control gains in real time using policy or value iterations.A thorough stability analysis is conducted and it is found that the proposed controller can sustain the convergence and asymptotic stability even when two channels are attacked.Finally,comparison results with a simulated CPS verify the effectiveness of the proposed output regulation method. 展开更多
关键词 adaptive output regulation Cyber-physical systems Time-delay attacks Reinforcement learning
原文传递
Design of a Kind of Model Reference Adaptive Missile Control System 被引量:1
10
作者 王军 张天桥 王正杰 《Journal of Beijing Institute of Technology》 EI CAS 1999年第1期84-88,共5页
Aim To present an adaptive missile control system adaped to the external disturbance and the mobility of target movement. Methods Model reference adaptive control (MRAC) was applied and modified in the light of the ... Aim To present an adaptive missile control system adaped to the external disturbance and the mobility of target movement. Methods Model reference adaptive control (MRAC) was applied and modified in the light of the traits of the anti tank missile. Results Simulation results demonstrated this control system satisfied the requirement of anti tank missile of dive overhead attack. Conclusion It is successful to use MRAC in missile control system design, the quality is better than that designed by classical control theory. 展开更多
关键词 dive overhead attack anti tank missile model reference adaptive control missile control system
在线阅读 下载PDF
Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary 被引量:1
11
作者 龙宇 李祥学 +1 位作者 陈克非 洪璇 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期102-106,共5页
This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The pro... This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model. 展开更多
关键词 adaptive security certificateless key encapsulation mechanism chosen-ciphertext attack
原文传递
Defense against Membership Inference Attack Applying Domain Adaptation with Addictive Noise
12
作者 Hongwei Huang 《Journal of Computer and Communications》 2021年第5期92-108,共17页
Deep learning can train models from a dataset to solve tasks. Although deep learning has attracted much interest owing to the excellent performance, security issues are gradually exposed. Deep learning may be prone to... Deep learning can train models from a dataset to solve tasks. Although deep learning has attracted much interest owing to the excellent performance, security issues are gradually exposed. Deep learning may be prone to the membership inference attack, where the attacker can determine the membership of a given sample. In this paper, we propose a new defense mechanism against membership inference: NoiseDA. In our proposal, a model is not directly trained on a sensitive dataset to alleviate the threat of membership inference attack by leveraging domain adaptation. Besides, a module called Feature Crafter has been designed to reduce the necessary training dataset from 2 to 1, which creates features for domain adaptation training using noise addictive mechanisms. Our experiments have shown that, with the noises properly added by Feature Crafter, our proposal can reduce the success of membership inference with a controllable utility loss. 展开更多
关键词 Privacy-Preserving Machine Learning Membership Inference attack Domain adaptation Deep Learning
在线阅读 下载PDF
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
13
作者 Chirag Ganguli Shishir Kumar Shandilya +1 位作者 Michal Gregus Oleh Basystiuk 《Computer Systems Science & Engineering》 2024年第3期739-758,共20页
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori... Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. 展开更多
关键词 Artificial bee colonization adaptive defense cyber attack nature inspired cyber security cyber security cyber physical infrastructure
在线阅读 下载PDF
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
14
作者 Prasanalakshmi Balaji Sangita Babu +4 位作者 Maode Ma Zhaoxi Fang Syarifah Bahiyah Rahayu Mariyam Aysha Bivi Mahaveerakannan Renganathan 《Computers, Materials & Continua》 2025年第9期5831-5858,共28页
The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptibl... The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptible to security threats.One significant risk to cloud networks is Distributed Denial-of-Service(DoS)attacks,where attackers aim to overcome a target system with excessive data and requests.Among these,low-rate DoS(LR-DoS)attacks present a particular challenge to detection.By sending bursts of attacks at irregular intervals,LR-DoS significantly degrades the targeted system’s Quality of Service(QoS).The low-rate nature of these attacks confuses their detection,as they frequently trigger congestion control mechanisms,leading to significant instability in IoT systems.Therefore,to detect the LR-DoS attack,an innovative deep-learning model has been developed for this research work.The standard dataset is utilized to collect the required data.Further,the deep feature extraction process is executed using the Residual Autoencoder with Sparse Attention(ResAE-SA),which helps derive the significant feature required for detection.Ultimately,the Adaptive Dense Recurrent Neural Network(ADRNN)is implemented to detect LR-DoS effectively.To enhance the detection process,the parameters present in the ADRNN are optimized using the Renovated Random Attribute-based Fennec Fox Optimization(RRA-FFA).The proposed optimization reduces the False Discovery Rate and False Positive Rate,maximizing the Matthews Correlation Coefficient from 23,70.8,76.2,84.28 in Dataset 1 and 70.28,73.8,74.1,82.6 in Dataset 2 on EPC-ADRNN,DPO-ADRNN,GTO-ADRNN,FFA-ADRNN respectively to 95.8 on Dataset 1 and 91.7 on Dataset 2 in proposed model.At batch size 4,the accuracy of the designed RRA-FFA-ADRNN model progressed by 9.2%to GTO-ADRNN,11.6%to EFC-ADRNN,10.9%to DPO-ADRNN,and 4%to FFA-ADRNN for Dataset 1.The accuracy of the proposed RRA-FFA-ADRNN is boosted by 12.9%,9.09%,11.6%,and 10.9%over FFCNN,SVM,RNN,and DRNN,using Dataset 2,showing a better improvement in accuracy with that of the proposed RRA-FFA-ADRNN model with 95.7%using Dataset 1 and 94.1%with Dataset 2,which is better than the existing baseline models. 展开更多
关键词 Detecting low-rate DoS attacks adaptive dense recurrent neural network residual autoencoder with sparse attention renovated random attribute-based fennec fox optimization
在线阅读 下载PDF
Switching-Like Sliding Mode Security Control Against DoS Attacks:A Novel Attack-Related Adaptive Event-Triggered Scheme
15
作者 Jiancun Wu Zhiru Cao +1 位作者 Engang Tian Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期137-148,共12页
In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication r... In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication resources more effectively,a novel adaptive event-triggered(AET) mechanism is introduced,whose triggering coefficient can be adaptively adjusted according to the evolution trend of system states.Differing from existing event-triggered(ET) mechanisms,the proposed one demonstrates exceptional relevance and flexibility.It is closely related to attack probability,and its triggering coefficient dynamically adjusts depending on the presence or absence of an attack.To leverage attacker information more effectively,a switching-like sliding mode security controller is designed,which can autonomously select different controller gains based on the sliding function representing the attack situation.Sufficient conditions for the existence of the switching-like sliding mode secure controller are presented to ensure the stochastic stability of the system and the reachability of the sliding surface.Compared with existing time-invariant control strategies within the triggered interval,more resilient defense performance can be expected since the correlation with attack information is established in both the proposed AET scheme and the control strategy.Finally,a simulation example is conducted to verify the effectiveness and feasibility of the proposed security control method. 展开更多
关键词 adaptive event-triggered(AET)mechanism denial of service(DoS)attacks networked control systems(NCSs) sliding mode control(SMC)
在线阅读 下载PDF
Memory-based event-triggered model-free adaptive security tracking control for nonlinear multi-agent systems
16
作者 Xiao-Meng LI Qi ZHOU +2 位作者 Hongyi LI Renquan LU Zijia LIN 《Science China(Technological Sciences)》 2026年第1期309-319,共11页
This paper studies the challenging problem of model-free adaptive(MFA)security tracking control for nonlinear multi-agent systems(MASs)under mixed denial-of-service(DoS)attacks.First,in contrast to existing results fo... This paper studies the challenging problem of model-free adaptive(MFA)security tracking control for nonlinear multi-agent systems(MASs)under mixed denial-of-service(DoS)attacks.First,in contrast to existing results focusing on DoS attacks with one monotonic characteristic only,a more realistic mixed DoS attacks model is constructed,which can describe multiple types of DoS attacks and reflect the real attack strategy.Second,to mitigate the negative effect of mixed DoS attacks on control performance,an effective memory event-triggered mechanism is considered.Compared with existing event-triggered schemes,the developed memory event-triggered scheme utilizes historically triggered data and allows the released data to adjust adaptively using the long-term changes of the system state,which optimizes the utilization of communication resources and withstands the effect of mixed DoS attacks.Further,with the help of a dynamic linearization technique based on memory eventtriggered strategy,a linearized data model of the MASs is first established only depending on input/output information.Then,an improved memory event-triggered MFA security tracking control scheme is developed so that MASs can guarantee the tracking errors of all agents are bounded under mixed DoS attacks.Finally,a simulation example is presented of the designed MFA security tracking control method to illustrate its usefulness and advantages. 展开更多
关键词 model-free adaptive control mixed DoS attacks memory-based event-triggered strategy nonlinear multi-agent systems
原文传递
自适应约束上界的对抗攻击优化方法
17
作者 周强 李哲 +1 位作者 陶蔚 陶卿 《计算机科学》 北大核心 2026年第1期404-412,共9页
深度神经网络易受对抗样本攻击。现有迁移攻击优化方法普遍使用固定的约束上界表示不可察觉性强度,重点关注如何提升攻击成功率,忽略了样本间的敏感性差异,导致不可察觉性(FID)效果有待提高。受自适应梯度方法的启发,以提高不可察觉性... 深度神经网络易受对抗样本攻击。现有迁移攻击优化方法普遍使用固定的约束上界表示不可察觉性强度,重点关注如何提升攻击成功率,忽略了样本间的敏感性差异,导致不可察觉性(FID)效果有待提高。受自适应梯度方法的启发,以提高不可察觉性为主要目的,提出了一种自适应约束上界的对抗攻击优化方法。首先,通过梯度幅值建立敏感性指标,量化不同样本的敏感性差异程度;在此基础上,自适应确定对抗攻击优化方法的约束上界,实现敏感样本低强度、非敏感样本高强度对抗扰动的差异化处理;最后,通过替换投影算子和步长,将自适应约束机制无缝集成至现有攻击方法。ImageNet-Compatible数据集上的实验表明,所提方法在相同的黑盒攻击成功率下,FID较传统固定约束方法降低2.68%~3.49%;基于该方法的MI-LA对抗攻击算法较对抗攻击领域表现优异的5种攻击方法,FID降低6.32%~26.35%。 展开更多
关键词 对抗攻击 自适应 约束上界 样本敏感性 黑盒迁移性 不可察觉性
在线阅读 下载PDF
面向联邦学习的投毒攻击检测与防御机制
18
作者 钟琪 张淑芬 +2 位作者 张镇博 菅银龙 景忠瑞 《计算机应用》 北大核心 2026年第2期445-457,共13页
为了解决联邦学习中恶意客户端通过上传恶意更新破坏全局模型可靠性的问题,提出一种面向联邦学习的投毒攻击检测与防御算法FedDyna。首先,设计一种异常客户端检测方案,利用余弦相似度与欧几里得距离的历史标准差初步检测异常更新,并结... 为了解决联邦学习中恶意客户端通过上传恶意更新破坏全局模型可靠性的问题,提出一种面向联邦学习的投毒攻击检测与防御算法FedDyna。首先,设计一种异常客户端检测方案,利用余弦相似度与欧几里得距离的历史标准差初步检测异常更新,并结合多视角模型评估机制进一步检测可疑的客户端;其次,提出一种自适应调整策略,根据权重调整因子逐步降低被判定为异常客户端的参与权重,直至将恶意更新从模型训练过程中剔除。在EMNIST和CIFAR-10数据集上评估FedDyna在不同攻击场景下的防御性能,并与现有的先进防御算法进行对比。实验结果表明,在固定攻击频率的条件下,将FedDyna算法与Scope算法进行效果对比:面对投影梯度下降(PGD)、模型替换(MR)以及PGD+MR这3种攻击方式,FedDyna均取得了最优效果,攻击成功率(ASR)分别降低了1.07和0.53、1.49和1.45、10.55和1.25个百分点;在余弦约束攻击(CCA)攻击的EMNIST数据集下,FedDyna的ASR虽略有下降,但仍取得了次优结果。此外,当在不同攻击者池中与对比算法进行效果评估时,FedDyna的ASR在多数条件下表现最优,其余条件下也处于次优水平。尤为突出的是,在不同攻击强度的场景下,FedDyna的平均全局模型准确率(MA)高达98.5%。可见,FedDyna在不同攻击场景下表现出显著的抗投毒攻击稳健性,且能够有效检测并剔除投毒模型。 展开更多
关键词 联邦学习 投毒攻击 异常检测 多视角模型评估 自适应调整
在线阅读 下载PDF
基于Web中文自适应分词算法的网络安全风险识别
19
作者 蔡翔 李卫国 +3 位作者 刘立亮 程兰芳 张科健 文涛 《自动化技术与应用》 2026年第2期123-127,共5页
由于缺少对资产文本数据二元切分路径的提取,使得挖掘出的风险特征不完善。为此,提出基于Web中文自适应分词算法的网络安全风险识别。采集网络安全的运行数据,进行预处理和分类,构造风险影响因素集,确定网络潜在安全系数,采用Web中文自... 由于缺少对资产文本数据二元切分路径的提取,使得挖掘出的风险特征不完善。为此,提出基于Web中文自适应分词算法的网络安全风险识别。采集网络安全的运行数据,进行预处理和分类,构造风险影响因素集,确定网络潜在安全系数,采用Web中文自适应分词算法对网络安全文本数据进行分词处理,并利用二级Hash表加载词频字典,以获取词长的二元切分路径,对风险特征维度进行等级赋值,确定网络安全的风险等级,实现对网络安全的风险识别。实验结果可知,所提技术得到的约登指数始终控制在0.85以上,识别结果与实测值更为接近,识别精度较高。 展开更多
关键词 Web中文自适应分词 网络安全 风险识别 攻击检测 风险因素
在线阅读 下载PDF
Adaptive Consensus in Multi-Agent Systems Employing Event-Driven Communication Under Actuator and Sensor Attacks
20
作者 Bohan Li Qing Gao +2 位作者 Zhenqian Wang Wei Wang Jinhu Lü 《Guidance, Navigation and Control》 2025年第2期221-233,共13页
This paper addresses the leader-following consensus problem in multi-agent systems(MASs)with limited communication rates,while also considering sensor and actuator false data injection(FDI)attacks.A distributed event-... This paper addresses the leader-following consensus problem in multi-agent systems(MASs)with limited communication rates,while also considering sensor and actuator false data injection(FDI)attacks.A distributed event-triggered adaptive control protocol is developed to achieve cooperative uniform ultimate boundedness(UUB)in consensus tracking for compromised networked MASs.To implement this protocol,a distributed estimator is first designed to allow followers to estimate the leader's state.Then,adaptive internal controllers are constructed for each follower to mitigate the impact of FDI attack signals.Additionally,an event-triggered transmission logic is introduced to handle the constraints imposed by finite communication rates.Simulation results demonstrate the effectiveness of the proposed approach. 展开更多
关键词 Event-triggered control adaptive consensus networked multi-agent system(MAS) finite communication rate false data injection attacks uniform ultimate boundedness(UUB)
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部