期刊文献+
共找到718篇文章
< 1 2 36 >
每页显示 20 50 100
Recent Advances in Deep-Learning Side-Channel Attacks on AES Implementations
1
作者 Junnian Wang Xiaoxia Wang +3 位作者 Zexin Luo Qixiang Ouyang Chao Zhou Huanyu Wang 《Computers, Materials & Continua》 2026年第4期95-133,共39页
Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attracti... Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attractive victims for themalicious actions of adversaries.Within the spectrumof existing threats,Side-ChannelAttacks(SCAs)have established themselves as an effective way to compromise cryptographic implementations.These attacks exploit unintended,unintended physical leakage that occurs during the cryptographic execution of devices,bypassing the theoretical strength of the crypto design.In recent times,the advancement of deep learning has provided SCAs with a powerful ally.Well-trained deep-learningmodels demonstrate an exceptional capacity to identify correlations between side-channel measurements and sensitive data,thereby significantly enhancing such attacks.To further understand the security threats posed by deep-learning SCAs and to aid in formulating robust countermeasures in the future,this paper undertakes an exhaustive investigation of leading-edge SCAs targeting Advanced Encryption Standard(AES)implementations.The study specifically focuses on attacks that exploit power consumption and electromagnetic(EM)emissions as primary leakage sources,systematically evaluating the extent to which diverse deep learning techniques enhance SCAs acrossmultiple critical dimensions.These dimensions include:(i)the characteristics of publicly available datasets derived from various hardware and software platforms;(ii)the formalization of leakage models tailored to different attack scenarios;(iii)the architectural suitability and performance of state-of-the-art deep learning models.Furthermore,the survey provides a systematic synthesis of current research findings,identifies significant unresolved issues in the existing literature and suggests promising directions for future work,including cross-device attack transferability and the impact of quantum-classical hybrid computing on side-channel security. 展开更多
关键词 side-channel attacks deep learning advanced encryption standard power analysis EM analysis
在线阅读 下载PDF
An Efficient Method against Side-Channel Attacks on ECC
2
作者 LIU Shuanggen HU Yupu XU Wensheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. 展开更多
关键词 side-channel attacks ECC scalar multiplication algorithm
在线阅读 下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
3
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel attackS information LEAKAGE virtual machine migration GENETIC algorithm
在线阅读 下载PDF
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:16
4
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function 被引量:2
5
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
Introduction of firefighting methods in U.S. underground mines 被引量:1
6
作者 ZHANG Xi-chen ZHANG Yu-tao Jerry C. Tien 《西安科技大学学报》 CAS 北大核心 2011年第6期672-678,697,共8页
Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and ex... Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and extinguishing fires in underground mine have long been studied and there have been significant improvements.In order to know clearly about the firefighting technology used,this paper summarizes most of the underground mine firefighting methods used in the United States the past 150 years.This paper describes not only the accepted firefighting theories,but also the technologies,both direct and indirect attacking,in accordance to regulations or codes,with special attention is given to the indirect attack method and its related technologies.Further research needed is also briefly discussed at the end of this paper. 展开更多
关键词 FIREFIGHTING extinguishing agent attack method remote sealing
在线阅读 下载PDF
A CALCULATING METHOD OF THE KILL PROBABILITY ATTACK AREA FOR AAM 被引量:1
7
作者 Li Ting-jie, Liu Run-quan and Wang Chao-zhiBeijing University of Aeronautics and Astronautics Zhu Gu-xiang and Wang Li-zhen014 Center of Ministry of Aeronautics and Astronautics 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1991年第4期339-346,共8页
This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained... This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method. 展开更多
关键词 A CALCULATING method OF THE KILL PROBABILITY attack AREA FOR AAM area
在线阅读 下载PDF
Side-channel attack-resistant AES S-box with hidden subfield inversion and glitch-free masking
8
作者 Xiangyu Li Pengyuan Jiao Chaoqun Yang 《Journal of Semiconductors》 EI CAS CSCD 2021年第3期60-65,共6页
A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach a... A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach and apply the PAH method to the inversion in the nonlinear kernel and a masking method to the other parts.In addition,a delaymatched enable control technique is used to suppress glitches in the masked parts.The evaluation results show that its area is contracted to 63.3%of the full PAH S-box,and its power-delay product is much lower than that of the masking implementation.The leakage assessment using simulation power traces concludes that it has no detectable leakage under t-test and that it at least can thwart the moment-correlation analysis using 665000 noiseless traces. 展开更多
关键词 ASIC side-channel attack AES S-box power-aware hiding glitch-free
在线阅读 下载PDF
Research on Detection Method of Interest Flooding Attack on Content Centric Network
9
作者 Yabin Xu Ting Xu Xiaowei Xu 《Computers, Materials & Continua》 SCIE EI 2020年第8期1075-1089,共15页
To improve the attack detection capability of content centric network(CCN),we propose a detection method of interest flooding attack(IFA)making use of the feature of self-similarity of traffic and the information entr... To improve the attack detection capability of content centric network(CCN),we propose a detection method of interest flooding attack(IFA)making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet.On the one hand,taking advantage of the characteristics of self-similarity is very sensitive to traffic changes,calculating the Hurst index of the traffic,to identify initial IFA attacks.On the other hand,according to the randomness of user requests,calculating the information entropy of content name of the interest packets,to detect the severity of the IFA attack,is.Finally,based on the above two aspects,we use the bilateral detection method based on non-parametric CUSUM algorithm to judge the possible attack behavior in CCN.The experimental results show that flooding attack detection method proposed for CCN can not only detect the attack behavior at the early stage of attack in CCN,but also is more accurate and effective than other methods. 展开更多
关键词 CCN interest flooding attack self-similar feature information entropy bilateral detection method
在线阅读 下载PDF
Side-Channel Attacks Based on Collaborative Learning
10
作者 Biao Liu Zhao Ding +2 位作者 Yang Pan Jiali Li Huamin Feng 《国际计算机前沿大会会议论文集》 2017年第1期139-141,共3页
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement i... Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement is usually not met.In this paper,an attack algorithm based on collaborative learning is proposed.The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device.By experimenting with the DPA contest V4 dataset,the results show that the algorithm can improve the accuracy by about 20%compared with the pure supervised learning in the case of using only 10 labeled power traces. 展开更多
关键词 side-channel attackS Supervised LEARNING COLLABORATIVE LEARNING POWER TRACE
在线阅读 下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
11
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
在线阅读 下载PDF
Research on Fault Probability Based on Hamming Weight in Fault Injection Attack
12
作者 Tong Wu Dawei Zhou 《Computers, Materials & Continua》 2025年第11期3067-3094,共28页
Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal data requirement.However,the lack of a unified leakage model remai... Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal data requirement.However,the lack of a unified leakage model remains a critical challenge,as existing methods often rely on algorithm-specific details or prior knowledge of plaintexts and intermediate values.This paper proposes the Fault Probability Model based on Hamming Weight(FPHW)to address this.This novel statistical framework quantifies fault attacks by solely analyzing the statistical response of the target device,eliminating the need for attack algorithm details or implementation specifics.Building on this model,a Fault Injection Attack method based on Mutual Information(FPMIA)is introduced,which recovers keys by leveraging the mutual information between measured fault probability traces and simulated leakage derived from Hamming weight,reducing data requirements by at least 44%compared to the existing Mutual Information Analysis method while achieving a high correlation coefficient of 0.9403 between measured and modeled fault probabilities.Experimental validation on an AES-128 implementation via a Microcontroller Unit demonstrates that FPHW accurately captures the data dependence of fault probability and FPMIA achieves efficient key recovery with robust noise tolerance,establishing a unified and efficient framework that surpasses traditional methods in terms of generality,data efficiency,and practical applicability. 展开更多
关键词 Fault attacks side-channel attacks AES hamming weight data dependence mutual information analysis
在线阅读 下载PDF
Refined entropy analysis in turbine cascade:A novel loss decomposition method for flow with large separation
13
作者 Junheng WANG Weihao ZHANG +2 位作者 Yufan WANG Dongming HUANG Zhengping ZOU 《Chinese Journal of Aeronautics》 2025年第12期134-147,共14页
To address the deficiency in loss diagnostic methods for turbines working at off-design angles of attack,a novel loss decomposition method suitable for cascade flow with large separation is proposed.The method propose... To address the deficiency in loss diagnostic methods for turbines working at off-design angles of attack,a novel loss decomposition method suitable for cascade flow with large separation is proposed.The method proposed has the following advantages over existing methods:(A)It enables refined loss decomposition for cascade flows,capable of identifying the spatial range of specific regions such as shear layers and backflow regions,thereby obtaining the loss characteristics of these regions.(B)The region identification criteria in this method have clear physical meanings,rather than relying on arbitrary area division.(C)The method has good applicability and is suitable for cascade flows under various angles of attack.Validation shows that this method achieves satisfactory results.Based on this method,the loss mechanisms of a low-pressure turbine cascade at a low Reynolds number of 4.3×10^(4)and angles of attack of-5°,-20°,and-45°are investigated using Large Eddy Simulations(LESs).Entropy analysis quantitatively demonstrates significant differences in the composition of losses among flow regions,due to their different flow characteristics.From the perspective of flow regions,wake loss dominates total loss,while loss in backflow region is negligible.Furthermore,the variation mechanisms of loss with incidence differ among different flow regions. 展开更多
关键词 Entropy analysis Large eddy simulation Loss decomposition method Negative angle of attack Turbine cascade Unsteady aerodynamics
原文传递
拆分学习系统的隐私攻击和防御技术综述
14
作者 刘雅欣 王鹃 +5 位作者 杨梦达 李子昂 易文哲 徐枭洋 陈美会 韦韬 《计算机研究与发展》 北大核心 2026年第3期710-734,共25页
拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数... 拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数据隐私,同时缓解了模型端侧运行的计算负荷。随着拆分学习技术在多个领域的广泛应用,针对拆分学习系统的各种隐私攻击也层出不穷,攻击者能利用中间特征和分割层的梯度等中间信息重构出用户隐私数据或者推断出其隐私信息,严重危及数据的隐私性。目前,学术界尚缺乏针对拆分学习研究成果的系统性、全面性综述,部分研究将其与联邦学习技术混淆,或总结不够详尽具体。因此,为填补这一空白,需全面总结拆分学习的相关攻击与防御技术,为后续研究发展提供指导。首先介绍拆分学习技术的定义以及其训练和推理过程,并对其多种扩展架构进行概述。随后分析拆分学习系统的威胁模型,并针对拆分学习系统的重构攻击和属性推理、成员推理、标签推理等推理攻击的基本概念、实施阶段和现有方案进行总结归纳。接着总结相应的防御技术,包括异常检测、正则化防御、噪声混淆、对抗性表征学习、特征裁剪等方法。最后探讨拆分学习中隐私安全问题的研究挑战和未来研究方向。 展开更多
关键词 拆分学习 数据隐私 重构攻击 推理攻击 防御方法
在线阅读 下载PDF
基于非定常涡格-涡粒子的开式转子气动噪声预测方法研究
15
作者 陈南树 刘汉儒 +2 位作者 朱磊 贺象 王掩刚 《推进技术》 北大核心 2026年第1期98-115,共18页
开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三... 开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三维普朗特-葛劳渥法则,进行可压缩性修正。针对NASA(National Aeronautics and Space Administration)SR-7A单排开式转子的起飞工况进行了验证计算,气动结果与NASA试验值和商业软件计算值的误差均小于1%,主要单音噪声与总声压级指向性结果预测误差可低至1 dB以内。在同等研究对象和硬件条件下,本文方法计算所需CPU核时低于通用URANS(Unsteady Reynolds-Averaged Navier-Stokes)计算所需的1%。考虑起飞迎角下的周向不均匀来流畸变,系统研究了SR-7A单排转子在0°~20°来流迎角下的气动参数和噪声特性。结果表明,随着来流迎角的增大,转子的时均推力、功率、效率呈现指数增长趋势,转子桨盘内载荷时均值呈现线性增长趋势。转子各项载荷的非定常波动幅值随着迎角的增大而增加。单个叶片的载荷波动峰谷值与运动相位相比存在17°~56°的相位滞后现象,这与噪声周向指向性结果中的偏转非常相关。在0°~20°迎角内,转子上方总声压级从107 dB降低至99 dB,转子下方位置总声压级从107 dB升高至114 dB。此外,来流迎角与桨盘的相互作用会额外导致最高达73 dB的轴频率单音噪声。针对单排转子的噪声源项解耦分析表明,来流迎角对非定常载荷噪声的增益作用非常显著。本文开发的方法可以用较低成本得到开式转子的非定常气动及噪声特性,并且具备多角度的噪声源解耦能力,为未来低噪声开式转子设计提供了有力工具。 展开更多
关键词 开式转子 非定常涡格法 涡粒子法 气动噪声 起飞迎角
原文传递
基于声固耦合法的水翼结构模态特性研究
16
作者 王薇 敬若玺 +3 位作者 曾柯烨 刘铠华 夏翔 张尚弘 《农业机械学报》 北大核心 2026年第3期261-269,305,共10页
模态特性分析是进行水力机械设计的关键环节,当水力激励特性与结构的固有模态契合时,可能导致强烈共振,威胁电站的安全稳定运行。以叶轮的简化模型——水翼为研究对象,采用声固耦合法分析了水翼的干湿模态特性,探究了不同攻角和尾部修... 模态特性分析是进行水力机械设计的关键环节,当水力激励特性与结构的固有模态契合时,可能导致强烈共振,威胁电站的安全稳定运行。以叶轮的简化模型——水翼为研究对象,采用声固耦合法分析了水翼的干湿模态特性,探究了不同攻角和尾部修型下水翼的模态特性。研究发现,附加质量作用下水翼固有频率大幅度降低,湿模态振型也发生显著变化。攻角线性变化时,水翼固有频率呈现非线性变化趋势,2°攻角下频率最大。攻角增大到10°和15°,水翼固有频率会明显下降,15°时频率最小。攻角变化对水翼前4阶模态的展向模态位移和扭转模态的弦向模态位移影响较小,弯曲模态f_(s1)和f_(s3)的弦向模态位移差异性会增大。尾缘修型情况下,水翼固有频率会增加,30°修型对应的频率最大。尾缘修型对水翼尾缘的变形作用明显,抑制f_(s1)和f_(s3)的弯曲变形,模态位移变化范围明显减小。而且扭转模态f_(s2)、f_(s4)尾缘的弦向模态位移和f_(s3)展向模态位移出现小幅度减小。 展开更多
关键词 水翼 模态特性 攻角 尾缘修型 声固耦合法
在线阅读 下载PDF
基于噪声能量检测音频对抗样本
17
作者 冯燕茹 李靖 《计算机应用与软件》 北大核心 2026年第1期210-215,共6页
针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型... 针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型Noise-Energy。实验表明,Noise-Energy模型对CW攻击的检测准确率达到99.5%,对其他多种攻击的准确率均超过98%,表现出较强的鲁棒性和良好的泛化性。 展开更多
关键词 对抗样本 自动语音识别 噪声能量 检测方法
在线阅读 下载PDF
吴勉华教授基于以毒攻毒法应用虫类药治疗慢性癌性疼痛经验
18
作者 朱恒舟 俞心河 +2 位作者 吴艳 杜婉莹 李文婷 《南京中医药大学学报》 北大核心 2026年第2期307-314,共8页
慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽... 慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽固性疼痛。本文从吴勉华教授基于癌毒理论对慢性癌性疼痛的认识出发,探讨以毒攻毒法的理论内涵、作用机制、慢性癌痛的病机特点及辨治原则,并依据癌毒伴随病理因素不同,根据癌性疼痛痰毒、郁毒、瘀毒、虚毒核心病机,选择相应的虫类药物进行治疗。通过系统总结以毒攻毒法运用虫类药的实践经验,进一步拓宽癌毒理论在癌性疼痛治疗中的应用范畴,为中医药干预癌性疼痛提供新的思路与方法。 展开更多
关键词 癌毒理论 以毒攻毒法 虫类药 慢性癌性疼痛 痛证 名医经验 吴勉华
暂未订购
基于BiTCN的无人机指挥控制链路DoS攻击检测方法
19
作者 赵长啸 方玉麟 汪克念 《航空学报》 北大核心 2026年第1期249-265,共17页
无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)... 无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)的攻击检测方法,基于网络数据与物理数据的信息特征融合构建检测数据集,通过时间戳对齐与前向填充,解决网络与物理数据的异步问题;实验基于完整数据集和数据缺失率为5%、15%、30%、40%、50%的数据集展开,利用BiTCN模型通过双向机制捕捉数据的前后文信息,完成特征提取和分类,实现对DoS攻击的检测。将所提方法在真实无人机攻击数据集上进行验证,结果表明:与纯网络数据和纯物理数据检测模型相比,该方法准确率(97.8%)、召回率(95.9%)、F1分数(97.8%)和AUC(0.997)均优于单一维度数据检测模型;与传统FNN、1D-CNN、LSTM、GRU检测模型相比,即使在40%的数据缺失情况下,所提方法仍能保持较高检测精度。 展开更多
关键词 无人机C2链路 DOS攻击检测 双向时间卷积网络 网络数据与物理数据融合 攻击检测方法
原文传递
虚假数据注入攻击下直流微电网分布式弹性控制
20
作者 邰源政 孟范伟 张煜 《东北大学学报(自然科学版)》 北大核心 2026年第1期67-74,81,共9页
针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过... 针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过Lyapunov稳定理论证明了直流微电网在受到任意常值虚假数据注入攻击时均能保证正常稳定运行,实现电压调控和电流分配2个控制目标.利用MATLAB/Simulink搭建了仿真模型,验证了该控制方法的有效性. 展开更多
关键词 直流微电网 虚假数据注入攻击 分布式二次控制 弹性控制方法 电压调控 电流分配
在线阅读 下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部