期刊文献+
共找到67,246篇文章
< 1 2 250 >
每页显示 20 50 100
PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs
1
作者 Abeer Alhuzali Qamar Al-Qahtani +2 位作者 Asmaa Niyazi Lama Alshehri Fatemah Alharbi 《Computers, Materials & Continua》 2026年第1期2194-2212,共19页
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra... The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies. 展开更多
关键词 Smishing attack detection phishing attacks ensemble learning CYBERSECURITY deep learning transformer-based models large language models
在线阅读 下载PDF
A Novel Unsupervised Structural Attack and Defense for Graph Classification
2
作者 Yadong Wang Zhiwei Zhang +2 位作者 Pengpeng Qiao Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第1期1761-1782,共22页
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev... Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations. 展开更多
关键词 Graph classification graph neural networks adversarial attack
在线阅读 下载PDF
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
3
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
4
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
5
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Lightweight,rigid,ordered RSF/PVA/MXene aerogels with Janus structure for effective electromagnetic interference shielding with low reflectivity
6
作者 Bohan Ding Yanxiang Wang +5 位作者 Yingfan Li Haotian Jiang Peiyi Gao Yue Sun Jinghe Guo Chao Teng 《Nano Research》 2026年第1期1277-1289,共13页
Electromagnetic interference(EMI)shielding materials principally attain shielding by reflecting electromagnetic waves through impedance mismatch caused by high conductivity,which inevitably leads to secondary electrom... Electromagnetic interference(EMI)shielding materials principally attain shielding by reflecting electromagnetic waves through impedance mismatch caused by high conductivity,which inevitably leads to secondary electromagnetic wave pollution.Consequently,the development of multifunctional,low-reflection electromagnetic shielding materials remains a significant challenge.Materials that are lightweight,possess high mechanical strength,exhibit excellent electromagnetic shielding absorption,and demonstrate low reflectivity have historically been the focus of significant interest.Natural silk,lightweight and strong,is an ideal composite matrix.Regenerated silk fibroin(RSF)synthesized via a bottom-up approach and cross-linked with polyvinyl alcohol(PVA)forms an aerogel matrix with remarkable compressive strength.In accordance with the principle of integrating functional design with structural design,spherical NiFe_(2)O_(4)particles were grown on the MXene surface via electrostatic self-assembly and combined with RSF/PVA as the aerogel absorptive layer,while RSF/PVA/MXene served as the reflective layer.A vertically oriented structure of Janus aerogel was prepared through sequential directed freezing.The resulting aerogel with 0.058 g/cm^(3) reveals the high compression strength(3.52 MPa).Reasonable functional and structural design enables aerogel to effectively dissipate incident electromagnetic waves through absorption,reflection,and reabsorption processes,achieving an average SET value of 48.05±1.75 dB and reaching a minimum reflection coefficient of 0.19.Furthermore,the aerogel displays remarkable infrared stealth capabilities.This lightweight,rigid,multifunctional aerogel is poised to play a significant role in the field of next-generation electronic devices. 展开更多
关键词 vertically oriented aerogels electromagnetic interference shielding low reflectivity regenerated silk fibroin directional freeze drying LIGHTWEIGHT
原文传递
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
7
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
8
作者 Xin Liu Liang Zheng +3 位作者 Sumi Helal Weishan Zhang Chunfu Jia Jiehan Zhou 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1180-1189,共10页
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices ... The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing resources.This paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to victims.It defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection attacks.BLCD also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS packets.For evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence locations.Experiments show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%. 展开更多
关键词 Denial-of-service DRDoS SSDP reflection attack Broad learning Traffic detection
在线阅读 下载PDF
Characteristics and differential diagnosis of common verrucous proliferative skin diseases under dermoscopy and reflectance confocal microscopy 被引量:1
9
作者 ZHOU Lu FU Yule +7 位作者 HUANG Jian TANG Zhen LU Jianyun TAN Lina WANG Dan ZENG Jinrong WANG Jia GAO Lihua 《中南大学学报(医学版)》 北大核心 2025年第3期358-365,共8页
Objective:Verrucous epidermal nevus(VEN),seborrheic keratosis(SK),verruca plana(VP),verruca vulgaris(VV),and nevus sebaceous(NS)are common verrucous proliferative skin diseases with similar clinical appearances,often ... Objective:Verrucous epidermal nevus(VEN),seborrheic keratosis(SK),verruca plana(VP),verruca vulgaris(VV),and nevus sebaceous(NS)are common verrucous proliferative skin diseases with similar clinical appearances,often posing diagnostic challenges.Dermoscopy and reflectance confocal microscopy(RCM)can aid in their differentiation,yet their specific features under these tools have not been systematically described.This study aims to summarize and analyze the dermoscopic and RCM features of VEN,SK,VP,VV,and NS.Methods:A total of 121 patients with histopathologically confirmed verrucous proliferative skin diseases were enrolled.Dermoscopy and RCM imaging was used to observe and analyze the microscopic features of these conditions.Results:Under dermoscopy,the 5 diseases displayed distinct characteristics:VEN typically showed gyriform structures;SK was characterized by gyriform structures,comedo-like openings,and milia-like cysts;VP and VV featured dotted vessels and frogspawn-like structures;NS presented as brownish-yellow globules.RCM revealed shared features such as hyperkeratosis and acanthosis across all 5 diseases.Specific features included gyriform structures and elongated rete ridges in VEN;pseudocysts and gyriform structures in SK;evenly distributed ring-like structures in VP;vacuolated cells and papillomatous proliferation in VV;and frogspawn-like structures in NS.Conclusion:These 5 verrucous proliferative skin conditions exhibit distinguishable features under both dermoscopy and RCM.The combination of these 2 noninvasive imaging modalities holds significant clinical value for the differential diagnosis of verrucous proliferative skin diseases. 展开更多
关键词 reflectance confocal microscopy DERMOSCOPY verrucous proliferation verrucous epidermal nevus seborrheic keratosis verruca plana verruca vulgaris nevus sebaceous
暂未订购
Comparison of Reflectivity Consistency between Spaceborne Precipitation Radar and Ground-based Weather Radar in China and the United States 被引量:1
10
作者 Peng CHEN Lin CHEN +3 位作者 Gang WANG Qiong WU Huiying WANG Peng ZHANG 《Advances in Atmospheric Sciences》 2025年第7期1376-1394,共19页
The Global Precipitation Measurement(GPM)dual-frequency precipitation radar(DPR)products(Version 07A)are employed for a rigorous comparative analysis with ground-based operational weather radar(GR)networks.The reflect... The Global Precipitation Measurement(GPM)dual-frequency precipitation radar(DPR)products(Version 07A)are employed for a rigorous comparative analysis with ground-based operational weather radar(GR)networks.The reflectivity observed by GPM Ku PR is compared quantitatively against GR networks from CINRAD of China and NEXRAD of the United States,and the volume matching method is used for spatial matching.Additionally,a novel frequency correction method for all phases as well as precipitation types is used to correct the GPM Ku PR radar frequency to the GR frequency.A total of 20 GRs(including 10 from CINRAD and 10 from NEXRAD)are included in this comparative analysis.The results indicate that,compared with CINRAD matched data,NEXRAD exhibits larger biases in reflectivity when compared with the frequency-corrected Ku PR.The root-mean-square difference for CINRAD is calculated at 2.38 d B,whereas for NEXRAD it is 3.23 d B.The mean bias of CINRAD matched data is-0.16 d B,while the mean bias of NEXRAD is-2.10 d B.The mean standard deviation of bias for CINRAD is 2.15 d B,while for NEXRAD it is 2.29 d B.This study effectively assesses weather radar data in both the United States and China,which is crucial for improving the overall consistency of global precipitation estimates. 展开更多
关键词 GPM DPR volume matching reflectIVITY ground-based radar
在线阅读 下载PDF
Multistage microcellular waterborne polyurethane composite with optionally low-reflection behavior for ultra-efficient electromagnetic interference shielding 被引量:5
11
作者 Jianming Yang Hu Wang +4 位作者 Hexin Zhang Peng Lin Hong Gao Youyi Xia Xia Liao 《Journal of Materials Science & Technology》 2025年第5期132-140,共9页
Electromagnetic interference(EMI)shielding materials with superior shielding efficiency and low-reflection properties hold promising potential for utilization across electronic components,precision instruments,and fif... Electromagnetic interference(EMI)shielding materials with superior shielding efficiency and low-reflection properties hold promising potential for utilization across electronic components,precision instruments,and fifth-generation communication equipment.In this study,multistage microcellular waterborne polyurethane(WPU)composites were constructed via gradient induction,layer-by-layer casting,and supercritical carbon dioxide foaming.The gradient-structured WPU/ironcobalt loaded reduced graphene oxide(FeCo@rGO)foam serves as an impedance-matched absorption layer,while the highly conductive WPU/silver loaded glass microspheres(Ag@GM)layer is employed as a reflection layer.Thanks to the incorporation of an asymmetric structure,as well as the introduction of gradient and porous configurations,the composite foam demonstrates excellent conductivity,outstanding EMI SE(74.9 dB),and minimal reflection characteristics(35.28%)in 8.2-12.4 GHz,implying that more than 99.99999%of electromagnetic(EM)waves were blocked and only 35.28%were reflected to the external environment.Interestingly,the reflectivity of the composite foam is reduced to 0.41%at 10.88 GHz due to the resonance for incident and reflected EM waves.Beyond that,the composite foam is characterized by low density(0.47 g/cm^(3))and great stability of EMI shielding properties.This work offers a viable approach for craft-ing lightweight,highly shielding,and minimally reflective EMI shielding composites. 展开更多
关键词 Electromagnetic interference shielding Supercritical carbon dioxide(ScCO_(2))foaming Low reflectivity Multilayered structure MICROCELLULAR
原文传递
An Empirical Study on the Reflective Feedback Model Based on Pedagogical Agents to Improve Students’ Problem-Solving Ability 被引量:1
12
作者 Hui-Lin Zhang Jun-Jie Yan +4 位作者 Jing Liu Zhuo-Cen Zou Qun-Fang Zeng Yu-Lu Jin Jian-Nan Wu 《教育技术与创新》 2025年第1期66-75,共10页
This study constructs a reflective feedback model based on a pedagogical agent(PA)and explores its impact on students’problem-solving ability and cognitive load.A quasi-experimental design was used in the study,with ... This study constructs a reflective feedback model based on a pedagogical agent(PA)and explores its impact on students’problem-solving ability and cognitive load.A quasi-experimental design was used in the study,with 84 students from a middle school selected as the research subjects(44 in the experimental group and 40 in the control group).The experimental group used the reflective feedback model,while the control group used the factual feedback model.The results show that,compared with factual feedback,the reflective feedback model based on the pedagogical agent significantly improves students’problem-solving ability,especially at the action and thinking levels.In addition,this model effectively reduces students’cognitive load,especially in terms of internal and external load. 展开更多
关键词 pedagogical agent problem-solving ability reflective feedback
在线阅读 下载PDF
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
13
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
14
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack
15
作者 Jing Guo Ziying Wang +1 位作者 Yajuan Guo Haitao Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期427-442,共16页
The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charg... The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure. 展开更多
关键词 Anomaly detection electric vehicle aggregation attack deep cross-network
在线阅读 下载PDF
An Empirical Study of the Impact of AI-Based Reflective Dialogue Model on EFL Students’Oral Expression Skills 被引量:1
16
作者 Yu Zhao You-You Zhang +2 位作者 Xiao-Nan Luo Dan-Ting Deng Qun-Fang Zeng 《教育技术与创新》 2025年第3期9-20,共12页
Oral expression skills play an essential role in the development of EFL students’language abilities,and how to improve EFL students’oral expression skills is an essential and challenging task.This study adopts a qua... Oral expression skills play an essential role in the development of EFL students’language abilities,and how to improve EFL students’oral expression skills is an essential and challenging task.This study adopts a quasi-experimental research method to carry out the research and proposes an AI-based reflective dialogue model.Based on this,an analysis of the impact brought by this model on EFL students’oral expression performance and learning anxiety levels.The results show that students in the experimental group have significantly higher oral expression performance than those in the control group in the three dimensions of grammatical accuracy,expressive fluency,and word accuracy.In addition,the students in the experimental group produced facilitated anxiety after using the AI-based reflective dialogue model for oral expression learning,which prompted the students to learn more diligently. 展开更多
关键词 human-computer dialogue model oral expression reflective dialogue AI EFL student
在线阅读 下载PDF
Expansion mechanism of sulfate attack on cement-treated aggregates under freeze-thaw cycles 被引量:1
17
作者 Qi WANG Jiankun LIU +3 位作者 Xu LI Pengcheng WANG Jingyu LIU Mingzhi SUN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 2025年第1期36-49,共14页
Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.According... Sulfate attack-induced expansion of cement-treated aggregates in seasonally frozen regions is a well-known issue which causes continuous expansion in railway subgrades,and particularly in high-speed railways.Accordingly,we investigated the influence of material proportions,the number of freeze-thaw(FT)cycles,and temperature gradients on the expansion mechanism of sulfate attack on cement-treated aggregates subjected to FT cycles.The conditions,laws,and dominant factors causing the expansion of aggregates were analyzed through swelling tests.The results indicate that under FT cycles,3%content cement-treated graded macadam only experiences slight deformation.The maximum strain of graded macadam attacked by 1%sodium sulfate content in each FT cycle is significantly larger than that of 3%content cement-treated graded macadam attacked by 1%sodium sulfate content.Using scanning electron microscopy,needle-like crystals were observed during sulfate attack of cement-treated graded macadam.Through quantitative analysis,we determined the recoverable and unrecoverable deformations of graded macadam under FT cycles.For graded macadam under sulfate attack,the expansion is mainly induced by periodic frost heave and salt expansion,as well as salt migration.For cement-treated graded macadam under sulfate attack,the expansion is mainly induced by chemical attack and salt migration.This study can serve as a reference for future research on the mechanics of sulfate attack on cement-treated aggregates that experience FT cycles,and provide theoretical support for methods that remediate the expansion induced by sulfate attack. 展开更多
关键词 Sulfate attack Freeze-thaw(FT)cycle Expansion Cement-treated aggregates Dominant factors
原文传递
Unsteady aerodynamic modeling and analysis of aircraft model in multi-DOF coupling maneuvers at high angles of attack with attention mechanism 被引量:1
18
作者 Wenzhao DONG Xiaoguang WANG +1 位作者 Dongbo HAN Qi LIN 《Chinese Journal of Aeronautics》 2025年第6期349-361,共13页
Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Deg... Unsteady aerodynamic characteristics at high angles of attack are of great importance to the design and development of advanced fighter aircraft, which are characterized by post-stall maneuverability with multiple Degrees-of-Freedom(multi-DOF) and complex flow field structure.In this paper, a special kind of cable-driven parallel mechanism is firstly utilized as a new suspension method to conduct unsteady dynamic wind tunnel tests at high angles of attack, thereby providing experimental aerodynamic data. These tests include a wide range of multi-DOF coupled oscillatory motions with various amplitudes and frequencies. Then, for aerodynamic modeling and analysis, a novel data-driven Feature-Level Attention Recurrent neural network(FLAR) is proposed. This model incorporates a specially designed feature-level attention module that focuses on the state variables affecting the aerodynamic coefficients, thereby enhancing the physical interpretability of the aerodynamic model. Subsequently, spin maneuver simulations, using a mathematical model as the baseline, are conducted to validate the effectiveness of the FLAR. Finally, the results on wind tunnel data reveal that the FLAR accurately predicts aerodynamic coefficients, and observations through the visualization of attention scores identify the key state variables that affect the aerodynamic coefficients. It is concluded that the proposed FLAR enhances the interpretability of the aerodynamic model while achieving good prediction accuracy and generalization capability for multi-DOF coupling motion at high angles of attack. 展开更多
关键词 Unsteady aerodynamics Aerodynamic modeling High angle of attack Wind tunnel test Attention mechanism
原文传递
Experimental Observing Damage Evolution in Cement Pastes Exposed to External Sulfate Attack by in situ X-ray Computed Tomography
19
作者 WU Min CAO Kailei +4 位作者 XIAO Weirong YU Zetai CAO Jierong DING Qingjun LI Jinhui 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2025年第1期164-170,共7页
The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an ... The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an X-ray computed tomography(X-ray CT)was used,i e,the tomography system of Zeiss Xradia 510 versa.The results indicate that X-CT can monitor the development process and distribution characteristics of the internal cracks of cement pastes under ESA with attack time.In addition,the C3A content in the cement significantly affects the damage mode of cement paste specimens during sulfate erosion.The damage of ordinary Portland cement(OPC)pastes subjected to sulfate attack with high C3A content are severe,while the damage of sulfate resistant Portland cement(SRPC)pastes is much smaller than that of OPC pastes.Furthermore,a quadratic function describes the correlation between the crack volume fraction and development depth for two cement pastes immermed in sulfate solution. 展开更多
关键词 CONCRETE external sulfate attack damage evolution situ X-ray computed tomography
原文传递
Determination of angle of attack and dynamic stall loop in the complex vortical flow of a vertical axis wind turbine 被引量:1
20
作者 Wenzhong Shen Tao Xie +2 位作者 Lingpeng Ge Jiamin Yin Zhenye Sun 《Theoretical & Applied Mechanics Letters》 2025年第1期9-16,共8页
To improve the vertical axis wind turbine(VAWT)design,the angle of attack(AOA)and airfoil data must be treated correctly.The present paper develops a method for determining AOA on a VAWT based on computational fluid d... To improve the vertical axis wind turbine(VAWT)design,the angle of attack(AOA)and airfoil data must be treated correctly.The present paper develops a method for determining AOA on a VAWT based on computational fluid dynamics(CFD)analysis.First,a CFD analysis of a two-bladed VAWT equipped with a NACA 0012 airfoil is conducted.The thrust and power coefficients are validated through experiments.Second,the blade force and velocity data at monitoring points are collected.The AOA at different azimuth angles is determined by removing the blade self-induction at the monitoring point.Then,the lift and drag coefficients as a function of AOA are extracted.Results show that this method is independent of the monitoring points selection located at certain distance to the blades and the extracted dynamic stall hysteresis is more precise than the one with the“usual”method without considering the self-induction from bound vortices. 展开更多
关键词 Vertical axis wind turbine Computational fluid dynamics Angle of attack Dynamic stall
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部