期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Fixed Neural Network Image Steganography Based on Secure Diffusion Models
1
作者 Yixin Tang Minqing Zhang +2 位作者 Peizheng Lai Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第9期5733-5750,共18页
Traditional steganography conceals information by modifying cover data,but steganalysis tools easily detect such alterations.While deep learning-based steganography often involves high training costs and complex deplo... Traditional steganography conceals information by modifying cover data,but steganalysis tools easily detect such alterations.While deep learning-based steganography often involves high training costs and complex deployment.Diffusion model-based methods face security vulnerabilities,particularly due to potential information leakage during generation.We propose a fixed neural network image steganography framework based on secure diffu-sion models to address these challenges.Unlike conventional approaches,our method minimizes cover modifications through neural network optimization,achieving superior steganographic performance in human visual perception and computer vision analyses.The cover images are generated in an anime style using state-of-the-art diffusion models,ensuring the transmitted images appear more natural.This study introduces fixed neural network technology that allows senders to transmit only minimal critical information alongside stego-images.Recipients can accurately reconstruct secret images using this compact data,significantly reducing transmission overhead compared to conventional deep steganography.Furthermore,our framework innovatively integrates ElGamal,a cryptographic algorithm,to protect critical information during transmission,enhancing overall system security and ensuring end-to-end information protection.This dual optimization of payload reduction and cryptographic reinforcement establishes a new paradigm for secure and efficient image steganography. 展开更多
关键词 Image steganography fixed neural network secure diffusion models ELGAMAL
在线阅读 下载PDF
Pursuing the Asian Security Model:Strategic Focuses and Practical Approaches
2
作者 Huang Dahui 《Contemporary International Relations》 2025年第4期26-35,共10页
Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for... Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for Asia that features sharing weal and woe,seeking common ground while shelving differences,and prioritizing dialogue and consultation.”1 This fully demonstrates that China prioritizes neighborhood on its diplomatic agenda,regards security and stability in its neighborhood as a core strategic support,and is ready to collaborate with neighboring countries for a future of shared peace,development,and prosperity. 展开更多
关键词 security stability security model model security Asian security common ground dialogue sharing weal woe neighborhood diplomacy
在线阅读 下载PDF
The Asian Security Model Provides a New Paradigm for Resolving the Security Dilemmas in Asia
3
作者 Liu Qing 《Contemporary International Relations》 2025年第4期18-25,共8页
Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries... Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries suffered from colonial aggression and plundering for a long time in history,they as a whole attach special importance to national security. 展开更多
关键词 national security colonial aggression plundering peace stability security priority colonial aggression security dilemmas Asian security model
在线阅读 下载PDF
NeuroShield:A Biomimetic Security Model for Web Applications Based on Neural Control Mechanisms
4
作者 Li Tao Bian Qingyuan Hu Aiqun 《China Communications》 2025年第9期226-243,共18页
In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model... In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model,called NeuroShield,specifically designed for web applications.Inspired by the“perception-strategy-effect-feedback”mechanism of the human nervous control system,the model inte-grates biomimetic elements akin of neural receptors and effectors into applications.This integration fa-cilitates a multifaceted approach to security:enabling data introspection for detailed perception and regula-tion of application behavior,providing proactive de-fense capabilities to detect and block security risks in real-time,and incorporating feedback optimization to continuously adjust and enhance security strategies based on prevailing conditions.Experimental results affirm the efficacy of this neural control mechanism-based biomimetic security model,demonstrating a proactive defense success rate exceeding 95%,thereby offering a theoretical and structural foundation for biomimetic immunity in web applications. 展开更多
关键词 active security biometric security security model software security
在线阅读 下载PDF
VOTI:Jailbreaking Vision-Language Models via Visual Obfuscation and Task Induction
5
作者 ZHU Yifan CHU Zhixuan REN Kui 《ZTE Communications》 2025年第3期15-26,共12页
In recent years,large vision-language models(VLMs)have achieved significant breakthroughs in cross-modal understanding and generation.However,the safety issues arising from their multimodal interactions become promine... In recent years,large vision-language models(VLMs)have achieved significant breakthroughs in cross-modal understanding and generation.However,the safety issues arising from their multimodal interactions become prominent.VLMs are vulnerable to jailbreak attacks,where attackers craft carefully designed prompts to bypass safety mechanisms,leading them to generate harmful content.To address this,we investigate the alignment between visual inputs and task execution,uncovering locality defects and attention biases in VLMs.Based on these findings,we propose VOTI,a novel jailbreak framework leveraging visual obfuscation and task induction.VOTI subtly embeds malicious keywords within neutral image layouts to evade detection,and breaks down harmful queries into a sequence of subtasks.This approach disperses malicious intent across modalities,exploiting VLMs’over-reliance on local visual cues and their fragility in multi-step reasoning to bypass global safety mechanisms.Implemented as an automated framework,VOTI integrates large language models as red-team assistants to generate and iteratively optimize jailbreak strategies.Extensive experiments across seven mainstream VLMs demonstrate VOTI’s effectiveness,achieving a 73.46%attack success rate on GPT-4o-mini.These results reveal critical vulnerabilities in VLMs,highlighting the urgent need for improving robust defenses and multimodal alignment. 展开更多
关键词 large vision-language models jailbreak attacks red teaming security of large models safety alignment
在线阅读 下载PDF
A Role-Based PMI Security Model for E-Government 被引量:2
6
作者 WULi-jun SUKai-le YANGZhi-hua 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期329-332,共4页
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In... We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system. 展开更多
关键词 E-govemment public key certificate role-specification AC role-assignmentAC ihe security model for E- government
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
7
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model
8
作者 Jun Zhang Hao Xiao +1 位作者 Hongqun Zhai Xiaoli Meng 《Computers, Materials & Continua》 SCIE EI 2020年第4期301-313,共13页
Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potent... Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes. 展开更多
关键词 Blind signature quantum superposition decoy qubit hash function relaxed security model
在线阅读 下载PDF
Formal Analysis on an Extended Security Model for Database Systems
9
作者 ZHU Hong ZHU Yi LI Chenyang SHI Jie FU Ge WANG Yuanzhen 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期519-522,共4页
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security mode... In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient. 展开更多
关键词 Bell-LaPudula (BLP) model security model COQ integrity constraints
在线阅读 下载PDF
Research on the Application Security Isolation Model
10
作者 Gong Lei Zhao Yong Liao Jianhua 《China Communications》 SCIE CSCD 2010年第6期153-156,共4页
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi... Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI. 展开更多
关键词 application isolation security model application security protection
在线阅读 下载PDF
Provably Secure Short Proxy Signature Scheme from Bilinear Maps
11
作者 胡国政 洪帆 《Journal of Southwest Jiaotong University(English Edition)》 2009年第3期199-206,共8页
An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two shor... An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature; the other is used for computing proxy signature. Finally, a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover, the proxy signature generation needs no pairing operation and verification needs just two pairing operation. 展开更多
关键词 Security model Provable security Proxy signature Bilinear maps
在线阅读 下载PDF
Security Risk Analysis Model for Identification and Resolution System of Industrial Internet
12
作者 MA Baoluo CHEN Wenqu CHI Cheng 《ZTE Communications》 2020年第1期49-54,共6页
Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if th... Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if the identification and resolution system is attacked.Moreover,it may become a threat to national security.Therefore,security plays an important role in identification and resolution system of the industrial Internet.In this paper,an innovative security risk analysis model is proposed for the first time,which can help control risks from the root at the initial stage of industrial Internet construction,provide guidance for related enterprises in the early design stage of identification and resolution system of the industrial Internet,and promote the healthy and sustainable development of the industrial identification and resolution system. 展开更多
关键词 industrial Internet identification and resolution system security risk analysis model
在线阅读 下载PDF
Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization
13
作者 Zhiyi Ding Lei Sun +2 位作者 Xiuqing Mao Leyu Dai Ruiyang Ding 《Computers, Materials & Continua》 SCIE EI 2024年第9期4387-4412,共26页
Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural netw... Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural networks when confronted with carefully crafted adversarial examples.This not only reveals their shortcomings in defending against malicious attacks but also raises widespread concerns about the security of existing systems.Most existing adversarial attack strategies focus primarily on image classification problems,failing to fully exploit the unique characteristics of object detectionmodels,thus resulting in widespread deficiencies in their transferability.Furthermore,previous research has predominantly concentrated on the transferability issues of non-targeted attacks,whereas enhancing the transferability of targeted adversarial examples presents even greater challenges.Traditional attack techniques typically employ cross-entropy as a loss measure,iteratively adjusting adversarial examples to match target categories.However,their inherent limitations restrict their broad applicability and transferability across different models.To address the aforementioned challenges,this study proposes a novel targeted adversarial attack method aimed at enhancing the transferability of adversarial samples across object detection models.Within the framework of iterative attacks,we devise a new objective function designed to mitigate consistency issues arising from cumulative noise and to enhance the separation between target and non-target categories(logit margin).Secondly,a data augmentation framework incorporating random erasing and color transformations is introduced into targeted adversarial attacks.This enhances the diversity of gradients,preventing overfitting to white-box models.Lastly,perturbations are applied only within the specified object’s bounding box to reduce the perturbation range,enhancing attack stealthiness.Experiments were conducted on the Microsoft Common Objects in Context(MS COCO)dataset using You Only Look Once version 3(YOLOv3),You Only Look Once version 8(YOLOv8),Faster Region-based Convolutional Neural Networks(Faster R-CNN),and RetinaNet.The results demonstrate a significant advantage of the proposed method in black-box settings.Among these,the success rate of RetinaNet transfer attacks reached a maximum of 82.59%. 展开更多
关键词 Object detection model security targeted attack gradient diversity
在线阅读 下载PDF
Integrating AnyLogic Simulation in Emergency Evacuation Management for Enhanced Security
14
作者 Lina Liu Songyan Liu Xu Gong 《Journal of Electronic Research and Application》 2024年第3期213-220,共8页
This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to si... This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to simulate and optimize evacuation scenarios in various settings,including public venues,residential areas,and urban environments.By integrating real-world data and behavioral models,the simulation accurately represents human movements,decision-making processes,and traffic flow dynamics during evacuation scenarios.The study evaluates the effectiveness of various evacuation strategies,including route planning,crowd behavior,and emergency response coordination,using a scenario-driven approach within the AnyLogic simulation environment.Furthermore,this research contributes to the establishment of optimized emergency response protocols by systematically evaluating and refining evacuation plans.The research frameworks mentioned in the research imply the efficient use of the AnyLogic simulation model to be used in different sectors and fields to enhance the strategies for saving lives and implementing an efficient evacuation management system. 展开更多
关键词 AnyLogic simulation model Evacuation management Security system simulation model
在线阅读 下载PDF
The ethical security of large language models:A systematic review
15
作者 Feng LIU Jiaqi JIANG +2 位作者 Yating LU Zhanyi HUANG Jiuming JIANG 《Frontiers of Engineering Management》 2025年第1期128-140,共13页
The widespread application of large language models(LLMs)has highlighted new security challenges and ethical concerns,attracting significant academic and societal attention.Analysis of the security vulnerabilities of ... The widespread application of large language models(LLMs)has highlighted new security challenges and ethical concerns,attracting significant academic and societal attention.Analysis of the security vulnerabilities of LLMs and their misuse in cybercrime reveals that their advanced text-generation capabilities pose serious threats to personal privacy,data security,and information integrity.In addition,the effectiveness of current LLM-based defense strategies has been reviewed and evaluated.This paper examines the social implications of LLMs and proposes future directions for enhancing their security applications and ethical governance,aiming to inform the development of the field. 展开更多
关键词 security of large language models ethical governance model defense adversarial training social impact
原文传递
Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
16
作者 Shuaishuai Zhu Yiliang Han 《China Communications》 SCIE CSCD 2021年第8期35-46,共12页
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally har... Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC problems.So the trapdoor in a public key encryption mechanism turns out to be a type of limited resource.In this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search technique.The basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input messages.The architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two generator.The evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors. 展开更多
关键词 generative model public key encryption indistinguishability model security model deep learning
在线阅读 下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
17
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
在线阅读 下载PDF
On the Security of TLS Resumption and Renegotiation
18
作者 Xinyu Li Jingy Xu +1 位作者 Zhenfeng Zhang Dengguo Feng 《China Communications》 SCIE CSCD 2016年第12期176-188,共13页
The Transport Layer Security(TLS) protocol is the most important standard on the Internet for key exchange. TLS standard supports many additional handshake modes such as resumption and renegotiation besides the full h... The Transport Layer Security(TLS) protocol is the most important standard on the Internet for key exchange. TLS standard supports many additional handshake modes such as resumption and renegotiation besides the full handshake. The interaction and dependence of different modes may lead to some practical attacks on TLS. In 2014, Bhargavan et al. described a triple handshake attack on TLS 1.2 by exploiting the sequential running of three different modes of TLS, which can lead to a client impersonation attack after the third handshake. Subsequently, TLS 1.2 was patched with the extended master secret extension of RFC 7627 to prevent this attack. In this paper we introduce a new definition of "uniqueness" and present a renegotiable & resumable ACCE security model. We identify the triple handshake attack within the new model, and furthermore show TLS with the proposed fix can be proven secure in our model. 展开更多
关键词 TLS 1.2 resumption RENEGOTIATION security model
在线阅读 下载PDF
Remote Attestation-Based Access Control on Trusted Computing Platform
19
作者 LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期190-194,共5页
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller (RABAC), which is based on a combination of techniques, such as random number, Bell-La Padula (BLP) model, user identity combined with his security properties and so on. The component can validate the current hardware and software integrity of the remote platform, and implement access control with different security policy. We prove that the RABAC can not only improve the security of transferred information in remote attestation process but also integrate remote attestation and classical system security mechanism effectively. 展开更多
关键词 trusted computing remote attestation access control security model
原文传递
Cloud Security Service for Identifying Unauthorized User Behaviour
20
作者 D.Stalin David Mamoona Anam +4 位作者 Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2581-2600,共20页
Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing numbe... Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model.The cloud computing environment extracts the execution details of services and systems from end-users and developers.Additionally,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more accessible.The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper.With the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud.This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner.Based on attack-oriented threat model security,the evaluation works.By considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems. 展开更多
关键词 Cloud computing user behaviour access control security model
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部