期刊文献+
共找到1,568篇文章
< 1 2 79 >
每页显示 20 50 100
Guidance laws for attacking defended target 被引量:8
1
作者 Qilong SUN Chenfeng ZHANG +2 位作者 Ning LIU Weixue ZHOU Naiming QI 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第10期2337-2353,共17页
In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyze... In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyzed when the target and defender using the differential game guidance law based on the linear model.The core ideas underlying the two guidance laws are the attacker evading to a critical safe boundary from the defender,and then maintaining a critical miss distance.The guidance law more appropriate for the attacker to win the game differs according to the initial parameters.Unlike other guidance laws,when using the derived guidance laws there is no need to know the target and the defender’s control efforts.The results of numerical simulations show that the attacker can evade the defender and hit the target successfully by using the proposed derived guidance laws. 展开更多
关键词 attacking Control EFFORT Differential GAME theory GUIDANCE LAW MISS DISTANCE
原文传递
Effects of Rebixiao Granules (热痹消颗粒剂) on Blood Uric Acid in Patients with Repeatedly Attacking Acute Gouty Arthritis 被引量:2
2
作者 纪伟 朱萱萱 +1 位作者 谈文峰 陆燕 《Chinese Journal of Integrated Traditional and Western Medicine》 2005年第1期15-21,共7页
Objective: To observe the clinical effect of Rebixiao granule (热痹消颗粒剂, RBXG) in treating repeatedly attacking acute gouty arthritis and through experimental study on blood uric acid to explore RBXG's therape... Objective: To observe the clinical effect of Rebixiao granule (热痹消颗粒剂, RBXG) in treating repeatedly attacking acute gouty arthritis and through experimental study on blood uric acid to explore RBXG's therapeutic mechanism. Methods: Ninety repeatedly attacking acute gouty arthritis patients were divided into the treated group ( n =60) and control group ( n =30). The treated group was treated with RBXG, and the control group was treated with Futalin tablets (diclofenac sodium). The baseline treatment including good rest, low purine diet, sufficient water drinking and urine alkalization, etc. was then given to both groups. Hypoxanthine 600 mg/kg and niacin 100 mg/kg was applied to hyperuricemic mice by gastrogavage to establish the animal models. Results: The clinical effective rate of the treated group was 95.0% and that of the control 90.0%. Good therapeutic effects were won, insignificant difference ( P >0.05)was shown between the two groups. However, the cure rate of the treated group was 26.7% while that of the control group was 10.0%, with significant difference ( P <0.01) shown between them. The treated group had its blood uric acid lowered, which was significantly different ( P <0.05) from that of the control group. The animal experiment indicated that all the three groups treated with different dosages of RBXG, as well as the Ash bark and Smilax glabra rhizome groups had their blood uric acid content reduced in the hyperuricemic mice. Conclusion: RBXG has a quicker initiation and better treatment effects than sole anti-inflammatory and analgesic agents on the treatment of repeatedly attacking acute gouty arthritis, showing no obvious toxic or adverse reactions and therefore good for long-term administration and likely to be a safe TCM preparation to control the symptoms and reduce the onsets of repeatedly attacking of acute gouty arthritis. The animal experiment shows that both the compound preparation and part of the single ingredients in the recipe have the function of reducing blood uric acid. However, the compound recipe has better therapeutic effects, proving to be superior to single drugs. 展开更多
关键词 traditional Chinese medicine compound repeatedly attacking acute gouty arthritis TREATMENT
暂未订购
Molecule aging induced by electron attacking
3
作者 Ping Song Yining Dong +5 位作者 Xue Gong Mingbo Ruan Baoxin Ni Xuanhao Mei Kun Jiang Weilin Xu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第6期519-525,I0013,共8页
Here we propose a new concept of"molecule aging":with some special treatment,a molecule could be"aged"by losing some unknown tiny particles or pieces from atoms in the molecule,Such"aging"... Here we propose a new concept of"molecule aging":with some special treatment,a molecule could be"aged"by losing some unknown tiny particles or pieces from atoms in the molecule,Such"aging"or loss of unknown tiny particles does not change apparently its molecular structure or chemical composition,but some physicochemical properties could be changed irreversibly.We further confirm such"molecule aging"via a long-term electron attacking to age water(H_(2)O)molecules.The IR spectra show no structural difference between the fresh water and the aged one,while the NMR spectra show that the electron attacking can decrease the size of water clusters.Such facts indicate that the electron attacking indeed can"affect"the structure of water molecule slightly but without damaging to its basic molecule frame.Further exploration reveals that the hydrogen evolution reaction(HER)activity of the aged water molecule is lower than the fresh water on the same Pt/C electrocatalyst.The density functional theory calculations indicate that the shortened O-H bond in H_(2)O indeed can present lower HER activity,so the observed size decrease of water clusters from NMR probably could be attributed to the shortening of O-H bond in water molecules.Such results indicate significantly that the molecule aging can produce materials with new functions for new possible applications. 展开更多
关键词 Aging of molecules Electron attacking Full width at half maxima Hydrogen evolution reaction
在线阅读 下载PDF
Attacking Strategy of Multiple Unmanned Surface Vehicles with Improved GWO Algorithm Under Control of Unmanned Aerial Vehicles 被引量:2
4
作者 WU Xin PU Juan XIE Shaorong 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第2期201-207,共7页
Unmanned combat system is one of the important means to capture information superiority,carry out precision strike and accomplish special combat tasks in information war.Unmanned attack strategy plays a crucial role i... Unmanned combat system is one of the important means to capture information superiority,carry out precision strike and accomplish special combat tasks in information war.Unmanned attack strategy plays a crucial role in unmanned combat system,which has to ensure the attack by unmanned surface vehicles(USVs)from failure.To meet the challenge,we propose a task allocation algorithm called distributed auction mechanism task allocation with grey wolf optimization(DAGWO).The traditional grey wolf optimization(GWO)algorithm is improved with a distributed auction mechanism(DAM)to constrain the initialization of wolves,which improves the optimization process according to the actual situation.In addition,one unmanned aerial vehicle(UAV)is employed as the central control system to establish task allocation model and construct fitness function for the multiple constraints of USV attack problem.The proposed DAGWO algorithm can not only ensure the diversity of wolves,but also avoid the local optimum problem.Simulation results show that the proposed DAGWO algorithm can effectively solve the problem of attack task allocation among multiple USVs. 展开更多
关键词 unmanned surface vehicle(USV) ATTACK strategy GREY WOLF optimization(GWO) task ALLOCATION unmanned AERIAL vehicle(UAV)
原文传递
A Fast Two-Stage Black-Box Deep Learning Network Attacking Method Based on Cross-Correlation 被引量:1
5
作者 Deyin Li Mingzhi Cheng +2 位作者 Yu Yang Min Lei Linfeng Shen 《Computers, Materials & Continua》 SCIE EI 2020年第7期623-635,共13页
Deep learning networks are widely used in various systems that require classification.However,deep learning networks are vulnerable to adversarial attacks.The study on adversarial attacks plays an important role in de... Deep learning networks are widely used in various systems that require classification.However,deep learning networks are vulnerable to adversarial attacks.The study on adversarial attacks plays an important role in defense.Black-box attacks require less knowledge about target models than white-box attacks do,which means black-box attacks are easier to launch and more valuable.However,the state-of-arts black-box attacks still suffer in low success rates and large visual distances between generative adversarial images and original images.This paper proposes a kind of fast black-box attack based on the cross-correlation(FBACC)method.The attack is carried out in two stages.In the first stage,an adversarial image,which would be missclassified as the target label,is generated by using gradient descending learning.By far the image may look a lot different than the original one.Then,in the second stage,visual quality keeps getting improved on the condition that the label keeps being missclassified.By using the cross-correlation method,the error of the smooth region is ignored,and the number of iterations is reduced.Compared with the proposed black-box adversarial attack methods,FBACC achieves a better fooling rate and fewer iterations.When attacking LeNet5 and AlexNet respectively,the fooling rates are 100%and 89.56%.When attacking them at the same time,the fooling rate is 69.78%.FBACC method also provides a new adversarial attack method for the study of defense against adversarial attacks. 展开更多
关键词 Black-box adversarial attack CROSS-CORRELATION two-module
在线阅读 下载PDF
Attacking a high-dimensional quantum key distribution system with wavelength-dependent beam splitter
6
作者 Ge-Hai Du Hong-Wei Li +1 位作者 Yang Wang Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期87-92,共6页
The unconditional security of quantum key distribution(QKD) can be guaranteed by the nature of quantum physics.Compared with the traditional two-dimensional BB84 QKD protocol, high-dimensional quantum key distribution... The unconditional security of quantum key distribution(QKD) can be guaranteed by the nature of quantum physics.Compared with the traditional two-dimensional BB84 QKD protocol, high-dimensional quantum key distribution(HDQKD) can be applied to generate much more secret key.Nonetheless, practical imperfections in realistic systems can be exploited by the third party to eavesdrop the secret key.The practical beam splitter has a correlation with wavelength,where different wavelengths have different coupling ratios.Using this property, we propose a wavelength-dependent attack towards time-bin high-dimensional QKD system.What is more, we demonstrate that this attacking protocol can be applied to arbitrary d-dimensional QKD system, and higher-dimensional QKD system is more vulnerable to this attacking strategy. 展开更多
关键词 HIGH-DIMENSIONAL quantum key distribution beam SPLITTER wavelength ATTACK
原文传递
Effect of Polymer-based Grinding Aid on Sulfate Attacking Resistance of Concrete
7
作者 张太龙 HU Jingchao +1 位作者 高建明 SUN Wei 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2017年第5期1095-1100,共6页
Influences of polymer-based grinding aid(PGA) on the damage process of concrete exposed to sulfate attack under dry-wet cycles were investigated. The mass loss, dynamic modulus of elasticity(Erd), and S and Ca ele... Influences of polymer-based grinding aid(PGA) on the damage process of concrete exposed to sulfate attack under dry-wet cycles were investigated. The mass loss, dynamic modulus of elasticity(Erd), and S and Ca element contents of concrete specimens were measured. Scanning electron microscopy(SEM), mercury intrusion porosimetry(MIP), and X-ray diffractometry(XRD) were used to investigate the changing of microstructure of interior concrete. The results indicated that PGA was capable of reducing the mass loss and improving the sulfate attack resistance of concrete. X-ray fluorescence(XRF) analysis revealed that PGA delayed the transport process of sulfate ions and Ca ions. In addition, MIP analysis disclosed that the micropores of concrete with PGA increased in the fraction of 20-100 nm and decreased in the residues of 200 nm. Compared with the blank sample, concrete with PGA had more slender and well-organized hydration products, and no changes in hydration products ratio or type were observed. 展开更多
关键词 polymer-based grinding aid concrete sulfate attack microstructure
原文传递
Clinical observation of suppurative moxibustion with wheat-grain sized moxa cones plus Western medication for cough variant asthma due to wind-cold attacking the lung
8
作者 REN Zhengyu ZHANG Yang +3 位作者 SHAO Zhiyu GUO Jinyi ZHU Hailiang SU Xiuzhen 《Journal of Acupuncture and Tuina Science》 2025年第2期126-134,共9页
Objective:To observe the clinical efficacy of modified painless suppurative moxibustion with wheat-grain sized moxa cones plus Western medication in treating cough variant asthma(CVA)due to wind-cold attacking the lun... Objective:To observe the clinical efficacy of modified painless suppurative moxibustion with wheat-grain sized moxa cones plus Western medication in treating cough variant asthma(CVA)due to wind-cold attacking the lung and its effects on pulmonary function,serum immunoglobulin(Ig)-E,hypersensitive C-reactive protein(hs-CRP),and interleukin(IL)-6.Methods:A total of 98 CVA patients were randomly divided into an observation group and a control group using the random number table method,with 49 cases in each group.The control group was treated with salmeterol xinafoate and fluticasone propionate powder for inhalation,and the observation group was treated with additional modified painless suppurative moxibustion with wheat-grain sized moxa cones.The treatment lasted for 8 weeks.The traditional Chinese medicine(TCM)symptom score of the patients in both groups was observed before treatment,after treatment,and at 1-month follow-up after treatment for its changes.The clinical efficacy after treatment and at 1-month follow-up was compared between the two groups.The pulmonary function[forced expiratory volume in the first second(FEV1),FEV1/forced vital capacity(FVC),and peak expiratory flow(PEF)]and serum IgE,hs-CRP,and IL-6 levels were compared between the two groups before and after treatment.The adverse reactions that occurred during the treatment in both groups were observed and recorded.Results:The total effective rate of the observation group after treatment and at follow-up was higher than that of the control group(P<0.05).The TCM symptom scores in both groups after treatment and at follow-up were lower compared to the baseline(P<0.05),and the scores in the observation group were lower than those in the control group(P<0.05).The FEV1,FEV1/FVC,and PEF after treatment in both groups were higher compared to the baseline(P<0.05),and the levels in the observation group were higher than those in the control group(P<0.05).The serum levels of IgE,IL-6,and hs-CRP after treatment in both groups were lower than the baseline(P<0.05),and the levels in the observation group were lower than those in the control group(P<0.05).There were no adverse reactions in either group during the course of the study.Conclusion:Modified painless suppurative moxibustion with wheat-grain sized moxa cones plus salmeterol xinafoate and fluticasone propionate powder for inhalation is effective in treating CVA due to wind-cold attacking the lung;it can relieve the clinical symptoms of the patients,improve their pulmonary function,and also reduce serum IgE,hs-CRP,and IL-6 levels. 展开更多
关键词 Wheat-grain Sized Cone Moxibustion Scarring Moxibustion Cough Variant Asthma Syndrome of Wind-cold attacking Lung Immunoglobulin E C-reactive Protein INTERLEUKIN-6 Randomized Controlled Trial
原文传递
PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs
9
作者 Abeer Alhuzali Qamar Al-Qahtani +2 位作者 Asmaa Niyazi Lama Alshehri Fatemah Alharbi 《Computers, Materials & Continua》 2026年第1期2194-2212,共19页
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra... The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies. 展开更多
关键词 Smishing attack detection phishing attacks ensemble learning CYBERSECURITY deep learning transformer-based models large language models
在线阅读 下载PDF
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
10
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
Graph-Based Intrusion Detection with Explainable Edge Classification Learning
11
作者 Jaeho Shin Jaekwang Kim 《Computers, Materials & Continua》 2026年第1期610-635,共26页
Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to ... Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to changing attack patterns and complex network environments.In addition,it is difficult to explain the detection results logically using artificial intelligence.We propose a method for classifying network attacks using graph models to explain the detection results.First,we reconstruct the network packet data into a graphical structure.We then use a graph model to predict network attacks using edge classification.To explain the prediction results,we observed numerical changes by randomly masking and calculating the importance of neighbors,allowing us to extract significant subgraphs.Our experiments on six public datasets demonstrate superior performance with an average F1-score of 0.960 and accuracy of 0.964,outperforming traditional machine learning and other graph models.The visual representation of the extracted subgraphs highlights the neighboring nodes that have the greatest impact on the results,thus explaining detection.In conclusion,this study demonstrates that graph-based models are suitable for network attack detection in complex environments,and the importance of graph neighbors can be calculated to efficiently analyze the results.This approach can contribute to real-world network security analyses and provide a new direction in the field. 展开更多
关键词 Intrusion detection graph neural network explainable AI network attacks GraphSAGE
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
12
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
A Novel Unsupervised Structural Attack and Defense for Graph Classification
13
作者 Yadong Wang Zhiwei Zhang +2 位作者 Pengpeng Qiao Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第1期1761-1782,共22页
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev... Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations. 展开更多
关键词 Graph classification graph neural networks adversarial attack
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
14
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
15
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
Fire Burning Characteristics, Attacking Techniques and Safety Precautions in Pinus pumila Scrubs
16
作者 king Techniques and Safety Precautions in Pinus pumila ScrubsZHAO Fengjun1 DU Jianhua2 SHU Lifu1 1. Institute of Forest Ecology, Environment and Protection, Chinese Academy of Forestry Key Open Laboratory of Forest Protection, State Forestry Administration, Beijing 100091, P.R.China 2. Forest Fire Management Office, State Forestry Administration, Beijing 100714, P.R.China 《Chinese Forestry Science and Technology》 2010年第1期67-73,共7页
In China, Pinus pumila is mainly distributed in Daxing’anling, while those growing in the eastern Daxing’anling are primarily covered under the jurisdiction of Huzhong Forest Bureau. P. pumila is an evergreen shrub,... In China, Pinus pumila is mainly distributed in Daxing’anling, while those growing in the eastern Daxing’anling are primarily covered under the jurisdiction of Huzhong Forest Bureau. P. pumila is an evergreen shrub, 3-6 m high, and always grows vigorously. Its trunks creep along the ground, usually 10 m long or more. It is easily flammable because of the large amounts of resins and volatile oils in its body. Attacking forest fires is a dangerous work, especially in P. pumila scrubs. The fires in P. pumila scrubs are very different from those in other forest types, e.g. fierce combustion and heavy smoke. In this paper, the distribution characteristics of P. pumila scrubs were presented. Attacking techniques and safety precautions for attacking fires in P. pumila scrubs were also discussed. 展开更多
关键词 Pinus pumila forest fire attacking technique safety precaution
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
17
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
Expansion mechanism of sulfate attack on cement-treated aggregates under freeze-thaw cycles 被引量:1
18
作者 Qi WANG Jiankun LIU +3 位作者 Xu LI Pengcheng WANG Jingyu LIU Mingzhi SUN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 2025年第1期36-49,共14页
Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.According... Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.Accordingly,we investigated the influence of material proportions,the number of freeze-thaw(FT)cycles,and temperature gradients on the expansion mechanism of sulfate attack on cement-treated aggregates subjected to FT cycles.The conditions,laws,and dominant factors causing the expansion of aggregates were analyzed through swelling tests.The results indicate that under FT cycles,3%content cement-treated graded macadam only experiences slight deformation.The maximum strain of graded macadam attacked by 1%sodium sulfate content in each FT cycle is significantly larger than that of 3%content cement-treated graded macadam attacked by 1%sodium sulfate content.Using scanning electron microscopy,needle-like crystals were observed during sulfate attack of cement-treated graded macadam.Through quantitative analysis,we determined the recoverable and unrecoverable deformations of graded macadam under FT cycles.For graded macadam under sulfate attack,the expansion is mainly induced by periodic frost heave and salt expansion,as well as salt migration.For cement-treated graded macadam under sulfate attack,the expansion is mainly induced by chemical attack and salt migration.This study can serve as a reference for future research on the mechanics of sulfate attack on cement-treated aggregates that experience FT cycles,and provide theoretical support for methods that remediate the expansion induced by sulfate attack. 展开更多
关键词 Sulfate attack Freeze-thaw(FT)cycle Expansion Cement-treated aggregates Dominant factors
原文传递
Unsteady aerodynamic modeling and analysis of aircraft model in multi-DOF coupling maneuvers at high angles of attack with attention mechanism 被引量:1
19
作者 Wenzhao DONG Xiaoguang WANG +1 位作者 Dongbo HAN Qi LIN 《Chinese Journal of Aeronautics》 2025年第6期349-361,共13页
Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Deg... Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Degrees-of-Freedom(multi-DOF) and complex flow field structure.In this paper, a special kind of cable-driven parallel mechanism is firstly utilized as a new suspension method to conduct unsteady dynamic wind tunnel tests at high angles of attack, thereby providing experimental aerodynamic data. These tests include a wide range of multi-DOF coupled oscillatory motions with various amplitudes and frequencies. Then, for aerodynamic modeling and analysis, a novel data-driven Feature-Level Attention Recurrent neural network(FLAR) is proposed. This model incorporates a specially designed feature-level attention module that focuses on the state variables affecting the aerodynamic coefficients, thereby enhancing the physical interpretability of the aerodynamic model. Subsequently, spin maneuver simulations, using a mathematical model as the baseline, are conducted to validate the effectiveness of the FLAR. Finally, the results on wind tunnel data reveal that the FLAR accurately predicts aerodynamic coefficients, and observations through the visualization of attention scores identify the key state variables that affect the aerodynamic coefficients. It is concluded that the proposed FLAR enhances the interpretability of the aerodynamic model while achieving good prediction accuracy and generalization capability for multi-DOF coupling motion at high angles of attack. 展开更多
关键词 Unsteady aerodynamics Aerodynamic modeling High angle of attack Wind tunnel test Attention mechanism
原文传递
Study of entropy Weight-Grey theory-BP Network life prediction Model of unit silica fume concrete lining under the influence of carbonation-sulfate freeze-thaw cycle erosion 被引量:1
20
作者 ZhiMin Chen MingYang Yi +9 位作者 Meng Zhang ZhiQiang Yang JunHui Liu QianLong Yuan DianQiang Wang Hui Long HaoYong Zhang PengJi Zheng HongYan Shang ShengYi Xie 《Research in Cold and Arid Regions》 2025年第2期127-135,共9页
To address the challenges posed by tunnel construction in the alpine region,silica fume mixed concrete is commonly used as a construction material.The correlation between silica fume content and the lining life requir... To address the challenges posed by tunnel construction in the alpine region,silica fume mixed concrete is commonly used as a construction material.The correlation between silica fume content and the lining life requires immediate investigation.In view of this phenomenon,the durability of unit lining concrete is predicted by analyzing three key indicators:carbonation depth,relative dynamic elastic modulus,and residual quality.This prediction is achieved by integrating the Entropy Weight Method,Grey theory life prediction model and BP artificial neural networks using data from tests and predictions of these indicators.Then,the Entropy Weight-Grey theory-BP Network Model is compared with other methods to analyze the predicted life.Finally,verify the sci-entificity of this model,and the optimum silica fume content of unit concrete lining is verified.The results showed,1)The addition of silica fume will accelerate the carbonization of unit concrete lining,and slow down the freeze-thaw cycle and sulfate erosion.2)The utilization of artificial neural networks is essential for enhancing the realism of the data,as it emphasizes the significance of silica fume content.3)Silica fume content of 10%results in the longest life and is the most suitable for lining construction.4)A comparison between single-factor and multi-factor predictions indicates that the multi-factor approach yields a longer maximum life.This improvement can be attributed to the inclusion of additional factors,such as freeze-thaw cycles and carbonation,which enhance the predicted life when employing these methods.In conclusion,the Entropy Weight-Grey Theory-BP Network life prediction Model is well-suited for tunnel lining in the alpine sulfate area of northwest China. 展开更多
关键词 Lining life prediction Carbonation depth Relative dynamic elastic modulus Freeze-thaw cycle erosion Residual mass Sulfate attack
在线阅读 下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部