Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving dat...Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving data privacy and avoiding direct data sharing.Despite its privacy-preserving advantages,FL remains vulnerable to backdoor attacks,where malicious participants introduce backdoors into local models that are then propagated to the global model through the aggregation process.While existing differential privacy defenses have demonstrated effectiveness against backdoor attacks in FL,they often incur a significant degradation in the performance of the aggregated models on benign tasks.To address this limitation,we propose a novel backdoor defense mechanism based on differential privacy.Our approach first utilizes the inherent out-of-distribution characteristics of backdoor samples to identify and exclude malicious model updates that significantly deviate from benign models.By filtering out models that are clearly backdoor-infected before applying differential privacy,our method reduces the required noise level for differential privacy,thereby enhancing model robustness while preserving performance.Experimental evaluations on the CIFAR10 and FEMNIST datasets demonstrate that our method effectively limits the backdoor accuracy to below 15%across various backdoor scenarios while maintaining high main task accuracy.展开更多
In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the...In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the higher-order velocity energy and the higher-order acceleration energy of the system in event space are defined, the higher-order d'Alembert- Lagrange principle of the system in event space is established, and the parametric forms of Euler-Lagrange, Nielsen and Appell for this principle are given. Finally, the higher-order differential equations of motion for holonomic systems in event space are obtained.展开更多
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has...This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round.展开更多
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same...We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.展开更多
The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in ...The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in view of applications to the theory of finite asymptotic expansions in the real domain, the asymptotic study of ordinary differential equations and the like. The main results concern: 1) a detailed study of the types of asymptotic variation of an infinite series so extending the results known for the sole power series;2) the type of asymptotic variation of a Wronskian completing the many already-published results on the asymptotic behaviors of Wronskians;3) a comparison between the two main standard approaches to the concept of “type of asymptotic variation”: via an asymptotic differential equation or an asymptotic functional equation;4) a discussion about the simple concept of logarithmic variation making explicit and completing the results which, in the literature, are hidden in a quite-complicated general theory.展开更多
Recent engineering applications increasingly adopt smart materials,whose mechanical responses are sensitive to magnetic and electric fields.In this context,new and computationally efficient modeling strategies are ess...Recent engineering applications increasingly adopt smart materials,whose mechanical responses are sensitive to magnetic and electric fields.In this context,new and computationally efficient modeling strategies are essential to predict the multiphysic behavior of advanced structures accurately.Therefore,the manuscript presents a higher-order formulation for the static analysis of laminated anisotropic magneto-electro-elastic doubly-curved shell structures.The fundamental relations account for the full coupling between the electric field,magnetic field,and mechanical elasticity.The configuration variables are expanded along the thickness direction using a generalized formulation based on the Equivalent Layer-Wise approach.Higher-order polynomials are selected,allowing for the assessment of prescribed values of the configuration variables at the top and bottom sides of solids.In addition,an effective strategy is provided for modeling general surface distributions of mechanical pressures and electromagnetic external fluxes.The model is based on a continuum-based formulation which employs an analytical homogenization of the multifield material properties,based on Mori&Tanaka approach,of a magneto-electro-elastic composite material obtained from a piezoelectric and a piezomagnetic phase,with coupled magneto-electro-elastic effects.A semi-analytical Navier solution is applied to the fundamental equations,and an efficient post-processing equilibrium-based procedure is here used,based on the numerical assessment with the Generalized Differential Quadrature(GDQ)method,to recover the response of three-dimensional shells.The formulation is validated through various examples,investigating the multifield response of panels of different curvatures and lamination schemes.An efficient homogenization procedure,based on the Mori&Tanaka approach,is employed to obtain the three-dimensional constitutive relation of magneto-electro-elastic materials.Each model is validated against three-dimensional finite-element simulations,as developed in commercial codes.Furthermore,the full coupling effect between the electric and magnetic response is evaluated via a parametric investigation,with useful insights for design purposes of many engineering applications.The paper,thus,provides a formulation for the magneto-electro-elastic analysis of laminated structures,with a high computational efficiency,since it provides results with three-dimensional capabilities with a two-dimensional formulation.The adoption of higher-order theories,indeed,allows us to efficiently predict not only the mechanical response of the structure as happens in existing literature,but also the through-the-thickness distribution of electric and magnetic variables.A novel higher-order theory has been proposed in this work for the magneto-electro-elastic analysis of laminated shell structures with varying curvatures.This theory employs a generalized method to model the distribution of the displacement field components,electrostatic,and magneto-static potential,accounting for higher-order polynomials.The thickness functions have been defined to prescribe the arbitrary values of configuration variables at the top and bottom surfaces,even though the model is ESL-based.The fundamental governing equations have been derived in curvilinear principal coordinates,considering all coupling effects among different physical phenomena,including piezoelectric,piezomagnetic,and magneto-electric effects.A homogenization algorithm based on a Mori&Tanaka approach has been adopted to obtain the equivalent magneto-electro-mechanical properties of a two-phase transversely isotropic composite.In addition,an effective method has been adopted involving the external loads in terms of surface tractions,as well as the electric and magnetic fluxes.In the post-processing stage,a GDQ-based procedure provides the actual 3D response of a doubly-curved solid.The model has been validated through significant numerical examples,showing that the results of this semi-analytical theory align well with those obtained from 3D numerical models from commercial codes.In particular,the accuracy of the model has been verified for lamination schemes with soft layers and various curvatures under different loading conditions.Moreover,this formulation has been used to predict the effect of combined electric and magnetic loads on the mechanical response of panels with different curvatures and lamination schemes.As a consequence,this theory can be applied in engineering applications where the combined effect of electric and magnetic loads is crucial,thus facilitating their study and design.An existing limitation of this study is that the solution is that it is derived only for structures with uniform curvature,cross-ply lamination scheme,and simply supported boundary conditions.Furthermore,it requires that each lamina within the stacking sequence exhibits magneto-electro-elastic behavior.Therefore,at the present stage,it cannot be used for multifield analysis of classical composite structures with magneto-electric patches.A further enhancement of the research work could be the derivation of a solution employing a numerical technique,to overcome the limitations of the Navier method.In this way,the same theory may be adopted to predict the multifield response of structures with variable curvatures and thickness,as well as anisotropic materials and more complicated boundary conditions.Acknowledgement:The authors are grateful to the Department of Innovation Engineering of Univer-sity of Salento for the support.展开更多
In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-r...In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 286 lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96 (SIMON64/128) is 286.2 (21182) with a success probability of 0.61, while the data complexity and the memory complexity are 263.3 and 290 bytes, respectively.展开更多
A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integr...A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integral differential(PID) controller is introduced to control the velocity track. The backstepping design is applied for constructing the controllers for the altitude subsystem.To avoid the explosion of differentiation from backstepping, the higher-order filter dynamic is used for replacing the virtual controller in the backstepping design steps. In the design procedure,the radial basis function(RBF) neural network is investigated to approximate the unknown nonlinear functions in the system dynamic of the hypersonic vehicle. The simulations show the effectiveness of the design method.展开更多
A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also...A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also further extended to handle the boundary conditions of plates. The computational convergence was studied, and the numerical results were obtained for different grid spacings and compared with the existing results. The results show that the DQ method is fairly reliable and effective.展开更多
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protectio...In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.展开更多
This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we stu...This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we study both parabolic and hyperbolic equations.We focus on ADI (alternating direction implicit) methods and LOD (locally one-dimensional) methods,which are standard splitting methods of lower order,e.g.second-order.Our aim is to develop higher-order ADI methods,which are performed by Richardson extrapolation,Crank-Nicolson methods and higher-order LOD methods,based on locally higher-order methods.We discuss the new theoretical results of the stability and consistency of the ADI methods.The main idea is to apply a higher- order time discretization and combine it with the ADI methods.We also discuss the dis- cretization and splitting methods for first-order and second-order evolution equations. The stability analysis is given for the ADI method for first-order time derivatives and for the LOD (locally one-dimensional) methods for second-order time derivatives.The higher-order methods are unconditionally stable.Some numerical experiments verify our results.展开更多
Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadr...Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadrature (DQ) method of nonlinear analysis to the problem was presented. New DQ approach, presented by Wang and Bert (DQWB), is extended to handle the multiple boundary conditions of plates. The techniques were also further extended to simplify nonlinear computations. The numerical convergence and comparison of solutions were studied. The results show that the DQ method presented is very reliable and valid. Moreover, the influences of geometric and material parameters as well as the transverse shear deformations on nonlinear bending were investigated. Numerical results show the influence of the shear deformation on the static bending of orthotropic moderately thick plate is significant.展开更多
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas...Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.展开更多
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at...The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.展开更多
The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactic...The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.展开更多
We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear ...We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient.展开更多
In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyze...In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyzed when the target and defender using the differential game guidance law based on the linear model.The core ideas underlying the two guidance laws are the attacker evading to a critical safe boundary from the defender,and then maintaining a critical miss distance.The guidance law more appropriate for the attacker to win the game differs according to the initial parameters.Unlike other guidance laws,when using the derived guidance laws there is no need to know the target and the defender’s control efforts.The results of numerical simulations show that the attacker can evade the defender and hit the target successfully by using the proposed derived guidance laws.展开更多
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA...An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.展开更多
文摘Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving data privacy and avoiding direct data sharing.Despite its privacy-preserving advantages,FL remains vulnerable to backdoor attacks,where malicious participants introduce backdoors into local models that are then propagated to the global model through the aggregation process.While existing differential privacy defenses have demonstrated effectiveness against backdoor attacks in FL,they often incur a significant degradation in the performance of the aggregated models on benign tasks.To address this limitation,we propose a novel backdoor defense mechanism based on differential privacy.Our approach first utilizes the inherent out-of-distribution characteristics of backdoor samples to identify and exclude malicious model updates that significantly deviate from benign models.By filtering out models that are clearly backdoor-infected before applying differential privacy,our method reduces the required noise level for differential privacy,thereby enhancing model robustness while preserving performance.Experimental evaluations on the CIFAR10 and FEMNIST datasets demonstrate that our method effectively limits the backdoor accuracy to below 15%across various backdoor scenarios while maintaining high main task accuracy.
基金Project supported by the Science and Technology Program of Xi’an City,China(Grant No.CXY1352WL34)
文摘In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the higher-order velocity energy and the higher-order acceleration energy of the system in event space are defined, the higher-order d'Alembert- Lagrange principle of the system in event space is established, and the parametric forms of Euler-Lagrange, Nielsen and Appell for this principle are given. Finally, the higher-order differential equations of motion for holonomic systems in event space are obtained.
基金This work has been performed in the Project "The Research on the New Analysis in Block Ciphers" supported by the Fundamental Research Funds for the Central Universities of China,the National Natural Science Foundation of China,the 111 Project of China,the Scientific Research Foundation of Education Department of Shaanxi Provincial Government of China
文摘This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round.
基金the National Natural Science Foundation of China (No. 61272434)the Natural Science Foundation of Shandong Province (Nos. ZR2011FQ032 and ZR2012FM004)+1 种基金the Project of Shandong Province Higher Educational Science and Technology Program(No. J11LG33)the Project of Senior Visiting Scholar of Shandong Province
文摘We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.
文摘The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in view of applications to the theory of finite asymptotic expansions in the real domain, the asymptotic study of ordinary differential equations and the like. The main results concern: 1) a detailed study of the types of asymptotic variation of an infinite series so extending the results known for the sole power series;2) the type of asymptotic variation of a Wronskian completing the many already-published results on the asymptotic behaviors of Wronskians;3) a comparison between the two main standard approaches to the concept of “type of asymptotic variation”: via an asymptotic differential equation or an asymptotic functional equation;4) a discussion about the simple concept of logarithmic variation making explicit and completing the results which, in the literature, are hidden in a quite-complicated general theory.
基金funded by the Project PNRR M4C2—Innovation Grant DIRECT:Digital twIns foR EmergenCy supporT—CUP F83C22000740001.
文摘Recent engineering applications increasingly adopt smart materials,whose mechanical responses are sensitive to magnetic and electric fields.In this context,new and computationally efficient modeling strategies are essential to predict the multiphysic behavior of advanced structures accurately.Therefore,the manuscript presents a higher-order formulation for the static analysis of laminated anisotropic magneto-electro-elastic doubly-curved shell structures.The fundamental relations account for the full coupling between the electric field,magnetic field,and mechanical elasticity.The configuration variables are expanded along the thickness direction using a generalized formulation based on the Equivalent Layer-Wise approach.Higher-order polynomials are selected,allowing for the assessment of prescribed values of the configuration variables at the top and bottom sides of solids.In addition,an effective strategy is provided for modeling general surface distributions of mechanical pressures and electromagnetic external fluxes.The model is based on a continuum-based formulation which employs an analytical homogenization of the multifield material properties,based on Mori&Tanaka approach,of a magneto-electro-elastic composite material obtained from a piezoelectric and a piezomagnetic phase,with coupled magneto-electro-elastic effects.A semi-analytical Navier solution is applied to the fundamental equations,and an efficient post-processing equilibrium-based procedure is here used,based on the numerical assessment with the Generalized Differential Quadrature(GDQ)method,to recover the response of three-dimensional shells.The formulation is validated through various examples,investigating the multifield response of panels of different curvatures and lamination schemes.An efficient homogenization procedure,based on the Mori&Tanaka approach,is employed to obtain the three-dimensional constitutive relation of magneto-electro-elastic materials.Each model is validated against three-dimensional finite-element simulations,as developed in commercial codes.Furthermore,the full coupling effect between the electric and magnetic response is evaluated via a parametric investigation,with useful insights for design purposes of many engineering applications.The paper,thus,provides a formulation for the magneto-electro-elastic analysis of laminated structures,with a high computational efficiency,since it provides results with three-dimensional capabilities with a two-dimensional formulation.The adoption of higher-order theories,indeed,allows us to efficiently predict not only the mechanical response of the structure as happens in existing literature,but also the through-the-thickness distribution of electric and magnetic variables.A novel higher-order theory has been proposed in this work for the magneto-electro-elastic analysis of laminated shell structures with varying curvatures.This theory employs a generalized method to model the distribution of the displacement field components,electrostatic,and magneto-static potential,accounting for higher-order polynomials.The thickness functions have been defined to prescribe the arbitrary values of configuration variables at the top and bottom surfaces,even though the model is ESL-based.The fundamental governing equations have been derived in curvilinear principal coordinates,considering all coupling effects among different physical phenomena,including piezoelectric,piezomagnetic,and magneto-electric effects.A homogenization algorithm based on a Mori&Tanaka approach has been adopted to obtain the equivalent magneto-electro-mechanical properties of a two-phase transversely isotropic composite.In addition,an effective method has been adopted involving the external loads in terms of surface tractions,as well as the electric and magnetic fluxes.In the post-processing stage,a GDQ-based procedure provides the actual 3D response of a doubly-curved solid.The model has been validated through significant numerical examples,showing that the results of this semi-analytical theory align well with those obtained from 3D numerical models from commercial codes.In particular,the accuracy of the model has been verified for lamination schemes with soft layers and various curvatures under different loading conditions.Moreover,this formulation has been used to predict the effect of combined electric and magnetic loads on the mechanical response of panels with different curvatures and lamination schemes.As a consequence,this theory can be applied in engineering applications where the combined effect of electric and magnetic loads is crucial,thus facilitating their study and design.An existing limitation of this study is that the solution is that it is derived only for structures with uniform curvature,cross-ply lamination scheme,and simply supported boundary conditions.Furthermore,it requires that each lamina within the stacking sequence exhibits magneto-electro-elastic behavior.Therefore,at the present stage,it cannot be used for multifield analysis of classical composite structures with magneto-electric patches.A further enhancement of the research work could be the derivation of a solution employing a numerical technique,to overcome the limitations of the Navier method.In this way,the same theory may be adopted to predict the multifield response of structures with variable curvatures and thickness,as well as anisotropic materials and more complicated boundary conditions.Acknowledgement:The authors are grateful to the Department of Innovation Engineering of Univer-sity of Salento for the support.
基金Supported by the National Natural Science Foundation of China(61373142,61572125)Dissertation Innovation Funds(112-06-0019025)
文摘In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 286 lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96 (SIMON64/128) is 286.2 (21182) with a success probability of 0.61, while the data complexity and the memory complexity are 263.3 and 290 bytes, respectively.
基金supported by the National Natural Science Foundation of China (61903374)。
文摘A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integral differential(PID) controller is introduced to control the velocity track. The backstepping design is applied for constructing the controllers for the altitude subsystem.To avoid the explosion of differentiation from backstepping, the higher-order filter dynamic is used for replacing the virtual controller in the backstepping design steps. In the design procedure,the radial basis function(RBF) neural network is investigated to approximate the unknown nonlinear functions in the system dynamic of the hypersonic vehicle. The simulations show the effectiveness of the design method.
基金key Project of the Municipal Commission of Science and Technology of Shanghai
文摘A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also further extended to handle the boundary conditions of plates. The computational convergence was studied, and the numerical results were obtained for different grid spacings and compared with the existing results. The results show that the DQ method is fairly reliable and effective.
基金This work is supported by Major Scientific and Technological Special Project of Guizhou Province(20183001)Research on the education mode for complicate skill students in new media with cross specialty integration(22150117092)+2 种基金Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ014)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
文摘In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.
文摘This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we study both parabolic and hyperbolic equations.We focus on ADI (alternating direction implicit) methods and LOD (locally one-dimensional) methods,which are standard splitting methods of lower order,e.g.second-order.Our aim is to develop higher-order ADI methods,which are performed by Richardson extrapolation,Crank-Nicolson methods and higher-order LOD methods,based on locally higher-order methods.We discuss the new theoretical results of the stability and consistency of the ADI methods.The main idea is to apply a higher- order time discretization and combine it with the ADI methods.We also discuss the dis- cretization and splitting methods for first-order and second-order evolution equations. The stability analysis is given for the ADI method for first-order time derivatives and for the LOD (locally one-dimensional) methods for second-order time derivatives.The higher-order methods are unconditionally stable.Some numerical experiments verify our results.
文摘Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadrature (DQ) method of nonlinear analysis to the problem was presented. New DQ approach, presented by Wang and Bert (DQWB), is extended to handle the multiple boundary conditions of plates. The techniques were also further extended to simplify nonlinear computations. The numerical convergence and comparison of solutions were studied. The results show that the DQ method presented is very reliable and valid. Moreover, the influences of geometric and material parameters as well as the transverse shear deformations on nonlinear bending were investigated. Numerical results show the influence of the shear deformation on the static bending of orthotropic moderately thick plate is significant.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261 and 11304397)the National Basic Research Program of China(Grant No.2013CB338002)
文摘Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.
文摘The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.
文摘The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.
基金the National Natural Science Foundation of China(No.70 0 710 42 and No.60 0 73 0 43 )
文摘We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient.
基金co-supported by the National Natural Science Foundation of China(No.11672093)the Shanghai Aerospace Science and Technology Innovation Foundation,China(No.SAST2016039)
文摘In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyzed when the target and defender using the differential game guidance law based on the linear model.The core ideas underlying the two guidance laws are the attacker evading to a critical safe boundary from the defender,and then maintaining a critical miss distance.The guidance law more appropriate for the attacker to win the game differs according to the initial parameters.Unlike other guidance laws,when using the derived guidance laws there is no need to know the target and the defender’s control efforts.The results of numerical simulations show that the attacker can evade the defender and hit the target successfully by using the proposed derived guidance laws.
基金supported by the National Natural Science Foundation of China(60373109)Ministry of Science and Technologyof China and the National Commercial Cryptography Application Technology Architecture and Application DemonstrationProject(2008BAA22B02).
文摘An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.