Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can...Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can respond immediately to the threat.Therefore,when an animal detects a threat through its visual system,it must quickly direct its gaze and attention toward the source of danger,assess the threat level,and take appropriate action.展开更多
This paper proposes a threat assessment framework for non-cooperative satellites by analyzing their motion characteristics,developing a quantitative evaluation methodology,and demonstrating its effectiveness via repre...This paper proposes a threat assessment framework for non-cooperative satellites by analyzing their motion characteristics,developing a quantitative evaluation methodology,and demonstrating its effectiveness via representative scenarios with neural network acceleration.The framework first establishes a threat evaluation model that integrates three core parameters:capability,opportunity,and hidden values.Subsequently,this research systematically investigates the critical role of transfer windows in threat quantification and introduces a transfer window-based threat assessment approach.The proposed methodology is validated through multiple representative scenarios,with simulation results demonstrating superior performance compared to conventional methods relying solely on optimal transfer windows or minimum distance metrics,enabling more nuanced threat ranking in scenarios where traditional techniques prove inadequate.To address computational demands,a neural networkbased approximation system is implemented to achieve a 25,200×speedup(0.005 s vs.baseline 126 s per 1000-sample batch)through parallel processing,maintaining 99.3%accuracy.Finally,the study explores the framework's extensibility to diverse NCS objectives.It identifies discrepancies between intention inference models and threat evaluation paradigms,providing methodological insights for next-generation space domain awareness systems.展开更多
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta...This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.展开更多
The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors.This creates a significant gap betwee...The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors.This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field.To address this,we propose TeachSecure-CTI,a novel framework for adaptive cybersecurity curriculumgeneration that integrates real-time Cyber Threat Intelligence(CTI)with AI-driven personalization.Our framework employs a layered architecture featuring a CTI ingestion and clusteringmodule,natural language processing for semantic concept extraction,and a reinforcement learning agent for adaptive content sequencing.Bydynamically aligning learningmaterialswithboththe evolving threat environment and individual learner profiles,TeachSecure-CTI ensures content remains current,relevant,and tailored.A 12-week study with 150 students across three institutions demonstrated that the framework improves learning gains by 34%,significantly exceeding the 12%–21%reported in recent literature.The system achieved 84.8%personalization accuracy,85.9%recognition accuracy for MITRE ATT&CK tactics,and a 31%faster competency development rate compared to static curricula.These findings have implications beyond academia,extending to workforce development,cyber range training,and certification programs.By bridging the gap between dynamic threats and static educational materials,TeachSecure-CTI offers an empirically validated,scalable solution for cultivating cybersecurity professionals capable of responding to modern threats.展开更多
Researchers are increasingly focused on enabling groups of multiple unmanned vehicles to operate cohesively in complex,real-world environments,where coordinated formation control and obstacle avoidance are essential f...Researchers are increasingly focused on enabling groups of multiple unmanned vehicles to operate cohesively in complex,real-world environments,where coordinated formation control and obstacle avoidance are essential for executing sophisticated collective tasks.This paper presents a Distributed Formation Control and Obstacle Avoidance(DFCOA)framework for multi-unmanned ground vehicles(UGV).DFCOA integrates a virtual leader structure for global guidance,an improved A^(*)path planning algorithm with an advanced cost function for efficient path planning,and a repulsive-force-based improved vector field histogram star(VFH^(*))technique for collision avoidance.The virtual leader generates a reference trajectory while enabling distributed execution;the improved A^(*)algorithm reduces planning time and number of nodes to determine the shortest path from the starting position to the goal;and the improved VFH^(*)uses 2D LiDAR data with inter-agent repulsive force to simultaneously avoid collision with obstacles and maintain safe inter-vehicle distances.The formation stability of the proposed DFCOA reaches 95.8%and 94.6%in two scenarios,with root mean square(RMS)centroid errors of 0.9516 and 1.0008 m,respectively.Velocity tracking is precise(velocity centroid error RMS of 0.2699 and 0.1700 m/s),and linear velocities closely match the desired 0.3 m/s.Safety metrics showed average collision risks of 0.7773 and 0.5143,with minimum inter-vehicle distances of 0.4702 and 0.8763 m,confirming collision-free navigation of four UGVs.DFCOA outperforms conventional methods in formation stability,path efficiency,and scalability,proving its suitability for decentralized multi-UGV applications.展开更多
To address the critical challenge of risk perception and assessment for autonomous vehicles in dynamic interactive envi-ronments,this study proposes a semi-supervised spatiotemporal interaction risk cognition network ...To address the critical challenge of risk perception and assessment for autonomous vehicles in dynamic interactive envi-ronments,this study proposes a semi-supervised spatiotemporal interaction risk cognition network with attention mecha-nism(SS-SIRCN),inspired by the behavioral adaptation patterns of biological groups under external threats.First,by thoroughly analyzing the dynamic interaction characteristics exhibited by typical biological collectives when exposed to risk,the study reveals the underlying patterns of trajectory changes influenced by external danger.Then,an attention-based spatiotemporal risk cognition network is designed to establish a mapping between driving behavior features and potential driving risks.Finally,a semi-supervised learning framework is employed to enable risk assessment for autono-mous vehicles using only a small amount of labeled data.Experimental results on real-world vehicle trajectory datasets demonstrate that the proposed method achieves a risk prediction accuracy of 90.76%,outperforming other baseline models in performance.展开更多
The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threa...The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threats is both necessary and complex,yet these interconnected healthcare settings generate enormous amounts of heterogeneous data.Traditional Intrusion Detection Systems(IDS),which are generally centralized and machine learning-based,often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy.Moreover,traditional AI-driven IDS usually face challenges in handling large-scale,heterogeneous healthcare data while ensuring data privacy and operational efficiency.To address these issues,emerging technologies such as Big Data Analytics(BDA)and Federated Learning(FL)provide a hybrid framework for scalable,adaptive intrusion detection in IoT-driven healthcare systems.Big data techniques enable processing large-scale,highdimensional healthcare data,and FL can be used to train a model in a decentralized manner without transferring raw data,thereby maintaining privacy between institutions.This research proposes a privacy-preserving Federated Learning–based model that efficiently detects cyber threats in connected healthcare systems while ensuring distributed big data processing,privacy,and compliance with ethical regulations.To strengthen the reliability of the reported findings,the resultswere validated using cross-dataset testing and 95%confidence intervals derived frombootstrap analysis,confirming consistent performance across heterogeneous healthcare data distributions.This solution takes a significant step toward securing next-generation healthcare infrastructure by combining scalability,privacy,adaptability,and earlydetection capabilities.The proposed global model achieves a test accuracy of 99.93%±0.03(95%CI)and amiss-rate of only 0.07%±0.02,representing state-of-the-art performance in privacy-preserving intrusion detection.The proposed FL-driven IDS framework offers an efficient,privacy-preserving,and scalable solution for securing next-generation healthcare infrastructures by combining adaptability,early detection,and ethical data management.展开更多
Legged robots have considerable potential for traversing unstructured situations;nonetheless,their inflexible frameworks often constrain adaptability and obstacle negotiation.The study article presents a revolutionary...Legged robots have considerable potential for traversing unstructured situations;nonetheless,their inflexible frameworks often constrain adaptability and obstacle negotiation.The study article presents a revolutionary Soft Tri-Legged Robot(STLR)that improves movement and obstacle-avoidance skills by using a bio-inspired pneumatic artificial muscle(Bubble Artificial Muscles)and a bio-inspired tactile sensor(TacTip).The STLR is activated by BAMs,which are flexible,pneu-matic-driven actuators that provide fine control over forward,backward,and steering movements.Obstacle identification and avoidance are facilitated by the TacTip sensor,which delivers tactile input for traversing unstructured terrains.We delineate the mechanical features of the BAMs,assess the functionality of the robot's legs,and elaborate on the incorpora-tion of the tactile sensing system.Experimental results demonstrate that the STLR can effectively achieve multi-directional flexible movement and obstacle avoidance through a cross-modal perception-actuation mechanism.This study highlights the promise of soft robotics for search and rescue,medical aid,and autonomous exploration,while delineating difficulties and opportunities for future improvements in functionality and efficiency.展开更多
As joint operations have become a key trend in modern military development,unmanned aerial vehicles(UAVs)play an increasingly important role in enhancing the intelligence and responsiveness of combat systems.However,t...As joint operations have become a key trend in modern military development,unmanned aerial vehicles(UAVs)play an increasingly important role in enhancing the intelligence and responsiveness of combat systems.However,the heterogeneity of aircraft,partial observability,and dynamic uncertainty in operational airspace pose significant challenges to autonomous collision avoidance using traditional methods.To address these issues,this paper proposes an adaptive collision avoidance approach for UAVs based on deep reinforcement learning.First,a unified uncertainty model incorporating dynamic wind fields is constructed to capture the complexity of joint operational environments.Then,to effectively handle the heterogeneity between manned and unmanned aircraft and the limitations of dynamic observations,a sector-based partial observation mechanism is designed.A Dynamic Threat Prioritization Assessment algorithm is also proposed to evaluate potential collision threats from multiple dimensions,including time to closest approach,minimum separation distance,and aircraft type.Furthermore,a Hierarchical Prioritized Experience Replay(HPER)mechanism is introduced,which classifies experience samples into high,medium,and low priority levels to preferentially sample critical experiences,thereby improving learning efficiency and accelerating policy convergence.Simulation results show that the proposed HPER-D3QN algorithm outperforms existing methods in terms of learning speed,environmental adaptability,and robustness,significantly enhancing collision avoidance performance and convergence rate.Finally,transfer experiments on a high-fidelity battlefield airspace simulation platform validate the proposed method's deployment potential and practical applicability in complex,real-world joint operational scenarios.展开更多
According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the...According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.展开更多
The guidance strategy is an extremely critical factor in determining the striking effect of the missile operation.A novel guidance law is presented by exploiting the deep reinforcement learning(DRL)with the hierarchic...The guidance strategy is an extremely critical factor in determining the striking effect of the missile operation.A novel guidance law is presented by exploiting the deep reinforcement learning(DRL)with the hierarchical deep deterministic policy gradient(DDPG)algorithm.The reward functions are constructed to minimize the line-of-sight(LOS)angle rate and avoid the threat caused by the opposed obstacles.To attenuate the chattering of the acceleration,a hierarchical reinforcement learning structure and an improved reward function with action penalty are put forward.The simulation results validate that the missile under the proposed method can hit the target successfully and keep away from the threatened areas effectively.展开更多
As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despit...As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO.展开更多
[Objectives]To explore the threat factors of frost damage to‘Shushanggan’Apricot in the Ili River Valley,and to provide measures for avoiding frost damage.[Methods]Based on the meteorological data of the Ili River V...[Objectives]To explore the threat factors of frost damage to‘Shushanggan’Apricot in the Ili River Valley,and to provide measures for avoiding frost damage.[Methods]Based on the meteorological data of the Ili River Valley counties and cities during the 12 years from 2010 to 2021 and using the critical low temperature of‘Shushanggan’Apricot as the main factor,we comprehensively analyzed the threats of low temperature in winter in January and late frost in April in spring in the Ili River Valley.[Results]During the 12 years,there were 4 years of low temperature below the critical(-26—-28℃)of‘Shushanggan’Apricot in the Ili River Valley counties and cities in January,accounting for 33.3%,and a total of 59 d.The frequency of occurrence was:Nilka County>Qapqal County>Yining City>Gongliu County>Huocheng County>Khorgos City>Yining County>Tekes County>Xinyuan County.In April,there were 9 years with a low temperature below the critical temperature(-0.6℃)flowering and fruit setting of‘Shushanggan’Apricot,accounting for 75%,and a total of 134 d.The frequency of occurrence was:Nilka County>Tekes County>Gongliu County>Yining County>Huocheng County>Khorgos City>Xinyuan County>Yining City>Qapqal County.The low temperature threats of‘Shushanggan’Apricot suitable cultivation areas were ranked as follows:Nilka County>Gongliu County>Tekes County>Qapqal County>Huocheng County>Yining City>Yining County>Khorgos City>Xinyuan County.Combined with the observation and survey of frost damage on the spot,we comprehensively analyzed and evaluated the cultivation area of‘Shushanggan’Apricot in the Ili River Valley:three counties(Nilka County,Gongliu County,and Tekes County)in the eastern region,except Xinyuan County,suffered frequent late frost damage,are suitable areas for the cultivation of‘Shushanggan’Apricot;three counties and two cities in the western region(Qapqal County,Huocheng County,Yining City,Yining County,Khorgos City)and Xinyuan County in the eastern region are suitable areas for‘Shushanggan’Apricot.The inversion zone at an altitude of 820-1100 in the valley is the superior area for‘Shushanggan’Apricot.[Conclusions]We explored the suitable areas in the origin area of‘Shushanggan’Apricot,and came up with measures to avoid frost damage,to provide a reference for the development of‘Shushanggan’Apricot.展开更多
The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making co...The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making collision avoidance significantly more challenging than that for space debris.Much existing research focuses on the continuous thrust model,whereas the impulsive maneuver model is more appropriate for long-duration and long-distance avoidance missions.Additionally,it is important to minimize the impact on the original mission while avoiding noncooperative targets.On the other hand,the existing avoidance algorithms are computationally complex and time-consuming especially with the limited computing capability of the on-board computer,posing challenges for practical engineering applications.To conquer these difficulties,this paper makes the following key contributions:(A)a turn-based(sequential decision-making)limited-area impulsive collision avoidance model considering the time delay of precision orbit determination is established for the first time;(B)a novel Selection Probability Learning Adaptive Search-depth Search Tree(SPL-ASST)algorithm is proposed for non-cooperative target avoidance,which improves the decision-making efficiency by introducing an adaptive-search-depth mechanism and a neural network into the traditional Monte Carlo Tree Search(MCTS).Numerical simulations confirm the effectiveness and efficiency of the proposed method.展开更多
Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to...Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to better implement advertising activities,this study intends to summarize the relevant research on advertising avoidance in recent years.The specific method is to use the core literature meta-analysis method to identify,filter,and screen relevant literature published in core journals from 1997 to 2020 with the keywords advertising avoidance and advertising resistance.We review the collected articles from the following perspectives:the definition and classification,external stimulating factors,internal perception factors,and moderating factors of advertising avoidance.On this basis,the SOMR model of advertising avoidance is constructed according to the SOR model.Finally,some prospects for future related research are presented.展开更多
Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework n...Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework named the Formation Interfered Fluid Dynamical System(FIFDS) with Moderate Evasive Maneuver Strategy(MEMS) is proposed in this study.First, the UAV formation collision avoidance problem including quantifiable performance indexes is formulated. Second, inspired by the phenomenon of fluids continuously flowing while bypassing objects, the FIFDS for multiple UAVs is presented, which contains a Parallel Streamline Tracking(PST) method for formation keeping and the traditional IFDS for collision avoidance. Third, to rationally balance flight safety and collision avoidance cost, MEMS is proposed to generate moderate evasive maneuvers that match up with collision risks. Comprehensively containing the time and distance safety information, the 3-D dynamic collision regions are modeled for collision prediction. Then, the moderate evasive maneuver principle is refined, which provides criterions of the maneuver amplitude and direction. On this basis, an analytical parameter mapping mechanism is designed to online optimize IFDS parameters. Finally, the performance of the proposed method is validated by comparative simulation results and real flight experiments using fixed-wing UAVs.展开更多
1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf h...1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf has become a widespread risk in the artificial intelligence(AI)era.展开更多
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.展开更多
This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting ...This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting and corporate governance.The study examines key determinants of tax avoidance,including firm characteristics(such as size,leverage,and multinational scale),managerial attributes,executive compensation,ownership structure,corporate social responsibility(CSR)performance,as well as the impact of regulations and legal reforms.The review findings highlight that the motivations behind tax avoidance are multifaceted,driven by the interaction of economic incentives,organizational ethics,external pressures,and public policies.Moreover,strict regulatory environments and strong CSR practices can mitigate tax avoidance behaviors,although their effectiveness is often contingent upon a firm’s cultural and political context.This study offers a comprehensive mapping of the current literature and recommends future research that integrates additional variables and broader time spans to enhance the understanding of tax avoidance behavior across different national contexts.展开更多
The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Tr...The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Traditional single-modal AI-based detection systems, which analyze both text, photos, or movies in isolation, have established useless at taking pictures multi-modal threats, in which malicious actors spread dangerous content throughout a couple of formats. To cope with these demanding situations, we advise a multi-modal deep mastering framework that integrates Natural Language Processing (NLP), Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) networks to become aware of and mitigate online threats effectively. Our proposed model combines BERT for text class, ResNet50 for photograph processing, and a hybrid LSTM-3-d CNN community for video content material analysis. We constructed a large-scale dataset comprising 500,000 textual posts, 200,000 offensive images, and 50,000 annotated motion pictures from more than one platform, which includes Twitter, Reddit, YouTube, and online gaming forums. The system became carefully evaluated using trendy gadget mastering metrics which include accuracy, precision, remember, F1-score, and ROC-AUC curves. Experimental outcomes demonstrate that our multi-modal method extensively outperforms single-modal AI classifiers, achieving an accuracy of 92.3%, precision of 91.2%, do not forget of 90.1%, and an AUC rating of 0.95. The findings validate the necessity of integrating multi-modal AI for actual-time, high-accuracy online chance detection and moderation. Future paintings will have consciousness on improving hostile robustness, enhancing scalability for real-world deployment, and addressing ethical worries associated with AI-driven content moderation.展开更多
基金supported by the National Natural Science Foundation of China(32471055 and 82171090)Shanghai Municipal Science and Technology Major Project(2018SHZDZX01)ZJLab,Shanghai Center for Brain Science and Brain-Inspired Technology,the Lingang Laboratory(LG-QS-202203-12).
文摘Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can respond immediately to the threat.Therefore,when an animal detects a threat through its visual system,it must quickly direct its gaze and attention toward the source of danger,assess the threat level,and take appropriate action.
基金supported by the National Key R&D Programof China:Gravitational Wave Detection Project(Grant Nos.2021YFC2026,2021YFC2202601,2021YFC2202603)the Na-tional Natural Science Foundation of China(Grant Nos.12172288and 12472046)。
文摘This paper proposes a threat assessment framework for non-cooperative satellites by analyzing their motion characteristics,developing a quantitative evaluation methodology,and demonstrating its effectiveness via representative scenarios with neural network acceleration.The framework first establishes a threat evaluation model that integrates three core parameters:capability,opportunity,and hidden values.Subsequently,this research systematically investigates the critical role of transfer windows in threat quantification and introduces a transfer window-based threat assessment approach.The proposed methodology is validated through multiple representative scenarios,with simulation results demonstrating superior performance compared to conventional methods relying solely on optimal transfer windows or minimum distance metrics,enabling more nuanced threat ranking in scenarios where traditional techniques prove inadequate.To address computational demands,a neural networkbased approximation system is implemented to achieve a 25,200×speedup(0.005 s vs.baseline 126 s per 1000-sample batch)through parallel processing,maintaining 99.3%accuracy.Finally,the study explores the framework's extensibility to diverse NCS objectives.It identifies discrepancies between intention inference models and threat evaluation paradigms,providing methodological insights for next-generation space domain awareness systems.
基金supported by the National Science and Technology Council of under Grant NSTC 114-2221-E-130-007.
文摘This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.
文摘The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors.This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field.To address this,we propose TeachSecure-CTI,a novel framework for adaptive cybersecurity curriculumgeneration that integrates real-time Cyber Threat Intelligence(CTI)with AI-driven personalization.Our framework employs a layered architecture featuring a CTI ingestion and clusteringmodule,natural language processing for semantic concept extraction,and a reinforcement learning agent for adaptive content sequencing.Bydynamically aligning learningmaterialswithboththe evolving threat environment and individual learner profiles,TeachSecure-CTI ensures content remains current,relevant,and tailored.A 12-week study with 150 students across three institutions demonstrated that the framework improves learning gains by 34%,significantly exceeding the 12%–21%reported in recent literature.The system achieved 84.8%personalization accuracy,85.9%recognition accuracy for MITRE ATT&CK tactics,and a 31%faster competency development rate compared to static curricula.These findings have implications beyond academia,extending to workforce development,cyber range training,and certification programs.By bridging the gap between dynamic threats and static educational materials,TeachSecure-CTI offers an empirically validated,scalable solution for cultivating cybersecurity professionals capable of responding to modern threats.
文摘Researchers are increasingly focused on enabling groups of multiple unmanned vehicles to operate cohesively in complex,real-world environments,where coordinated formation control and obstacle avoidance are essential for executing sophisticated collective tasks.This paper presents a Distributed Formation Control and Obstacle Avoidance(DFCOA)framework for multi-unmanned ground vehicles(UGV).DFCOA integrates a virtual leader structure for global guidance,an improved A^(*)path planning algorithm with an advanced cost function for efficient path planning,and a repulsive-force-based improved vector field histogram star(VFH^(*))technique for collision avoidance.The virtual leader generates a reference trajectory while enabling distributed execution;the improved A^(*)algorithm reduces planning time and number of nodes to determine the shortest path from the starting position to the goal;and the improved VFH^(*)uses 2D LiDAR data with inter-agent repulsive force to simultaneously avoid collision with obstacles and maintain safe inter-vehicle distances.The formation stability of the proposed DFCOA reaches 95.8%and 94.6%in two scenarios,with root mean square(RMS)centroid errors of 0.9516 and 1.0008 m,respectively.Velocity tracking is precise(velocity centroid error RMS of 0.2699 and 0.1700 m/s),and linear velocities closely match the desired 0.3 m/s.Safety metrics showed average collision risks of 0.7773 and 0.5143,with minimum inter-vehicle distances of 0.4702 and 0.8763 m,confirming collision-free navigation of four UGVs.DFCOA outperforms conventional methods in formation stability,path efficiency,and scalability,proving its suitability for decentralized multi-UGV applications.
基金the Jilin Provincial Department of Science and Technology Youth Science and Technology Talent Cultivation Project(20250602051RC)Fundamental Research Funds for the Central Universities(2025-JCXK-19)National Natural Science Foundation of China under Grant 52272417.
文摘To address the critical challenge of risk perception and assessment for autonomous vehicles in dynamic interactive envi-ronments,this study proposes a semi-supervised spatiotemporal interaction risk cognition network with attention mecha-nism(SS-SIRCN),inspired by the behavioral adaptation patterns of biological groups under external threats.First,by thoroughly analyzing the dynamic interaction characteristics exhibited by typical biological collectives when exposed to risk,the study reveals the underlying patterns of trajectory changes influenced by external danger.Then,an attention-based spatiotemporal risk cognition network is designed to establish a mapping between driving behavior features and potential driving risks.Finally,a semi-supervised learning framework is employed to enable risk assessment for autono-mous vehicles using only a small amount of labeled data.Experimental results on real-world vehicle trajectory datasets demonstrate that the proposed method achieves a risk prediction accuracy of 90.76%,outperforming other baseline models in performance.
文摘The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threats is both necessary and complex,yet these interconnected healthcare settings generate enormous amounts of heterogeneous data.Traditional Intrusion Detection Systems(IDS),which are generally centralized and machine learning-based,often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy.Moreover,traditional AI-driven IDS usually face challenges in handling large-scale,heterogeneous healthcare data while ensuring data privacy and operational efficiency.To address these issues,emerging technologies such as Big Data Analytics(BDA)and Federated Learning(FL)provide a hybrid framework for scalable,adaptive intrusion detection in IoT-driven healthcare systems.Big data techniques enable processing large-scale,highdimensional healthcare data,and FL can be used to train a model in a decentralized manner without transferring raw data,thereby maintaining privacy between institutions.This research proposes a privacy-preserving Federated Learning–based model that efficiently detects cyber threats in connected healthcare systems while ensuring distributed big data processing,privacy,and compliance with ethical regulations.To strengthen the reliability of the reported findings,the resultswere validated using cross-dataset testing and 95%confidence intervals derived frombootstrap analysis,confirming consistent performance across heterogeneous healthcare data distributions.This solution takes a significant step toward securing next-generation healthcare infrastructure by combining scalability,privacy,adaptability,and earlydetection capabilities.The proposed global model achieves a test accuracy of 99.93%±0.03(95%CI)and amiss-rate of only 0.07%±0.02,representing state-of-the-art performance in privacy-preserving intrusion detection.The proposed FL-driven IDS framework offers an efficient,privacy-preserving,and scalable solution for securing next-generation healthcare infrastructures by combining adaptability,early detection,and ethical data management.
基金the Natural Science Foundation of China(Project for Young Scientists:Grant No.52105010,Regular Project:Grant No.62173096)Natural Science Foundationof Guangdong Province(Regular Project:Grant No.2025A1515012124,Grant No.2022A1515010327)Guangdong-Hong Kong-Macao Key Laboratory of Multi-scaleInformation Fusion and Collaborative Optimization Control Manufacturing Process.
文摘Legged robots have considerable potential for traversing unstructured situations;nonetheless,their inflexible frameworks often constrain adaptability and obstacle negotiation.The study article presents a revolutionary Soft Tri-Legged Robot(STLR)that improves movement and obstacle-avoidance skills by using a bio-inspired pneumatic artificial muscle(Bubble Artificial Muscles)and a bio-inspired tactile sensor(TacTip).The STLR is activated by BAMs,which are flexible,pneu-matic-driven actuators that provide fine control over forward,backward,and steering movements.Obstacle identification and avoidance are facilitated by the TacTip sensor,which delivers tactile input for traversing unstructured terrains.We delineate the mechanical features of the BAMs,assess the functionality of the robot's legs,and elaborate on the incorpora-tion of the tactile sensing system.Experimental results demonstrate that the STLR can effectively achieve multi-directional flexible movement and obstacle avoidance through a cross-modal perception-actuation mechanism.This study highlights the promise of soft robotics for search and rescue,medical aid,and autonomous exploration,while delineating difficulties and opportunities for future improvements in functionality and efficiency.
基金supported by the National Key Research and Development Program of China(No.2022YFB4300902).
文摘As joint operations have become a key trend in modern military development,unmanned aerial vehicles(UAVs)play an increasingly important role in enhancing the intelligence and responsiveness of combat systems.However,the heterogeneity of aircraft,partial observability,and dynamic uncertainty in operational airspace pose significant challenges to autonomous collision avoidance using traditional methods.To address these issues,this paper proposes an adaptive collision avoidance approach for UAVs based on deep reinforcement learning.First,a unified uncertainty model incorporating dynamic wind fields is constructed to capture the complexity of joint operational environments.Then,to effectively handle the heterogeneity between manned and unmanned aircraft and the limitations of dynamic observations,a sector-based partial observation mechanism is designed.A Dynamic Threat Prioritization Assessment algorithm is also proposed to evaluate potential collision threats from multiple dimensions,including time to closest approach,minimum separation distance,and aircraft type.Furthermore,a Hierarchical Prioritized Experience Replay(HPER)mechanism is introduced,which classifies experience samples into high,medium,and low priority levels to preferentially sample critical experiences,thereby improving learning efficiency and accelerating policy convergence.Simulation results show that the proposed HPER-D3QN algorithm outperforms existing methods in terms of learning speed,environmental adaptability,and robustness,significantly enhancing collision avoidance performance and convergence rate.Finally,transfer experiments on a high-fidelity battlefield airspace simulation platform validate the proposed method's deployment potential and practical applicability in complex,real-world joint operational scenarios.
基金supported by the Aeronautical Science Foundation of China (20085584010)
文摘According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.
基金supported by the National Natural Science Foundation of China(62003021,91212304).
文摘The guidance strategy is an extremely critical factor in determining the striking effect of the missile operation.A novel guidance law is presented by exploiting the deep reinforcement learning(DRL)with the hierarchical deep deterministic policy gradient(DDPG)algorithm.The reward functions are constructed to minimize the line-of-sight(LOS)angle rate and avoid the threat caused by the opposed obstacles.To attenuate the chattering of the acceleration,a hierarchical reinforcement learning structure and an improved reward function with action penalty are put forward.The simulation results validate that the missile under the proposed method can hit the target successfully and keep away from the threatened areas effectively.
文摘As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO.
基金the Finance and Forestry Project of Xinjiang Uygur Autonomous Region:Integration and Demonstration of Technology for Quality Improvement and Efficiency Improvement of‘Shushanggan’Apricot in Ili River Valley(XJLYKJ-2020-01).
文摘[Objectives]To explore the threat factors of frost damage to‘Shushanggan’Apricot in the Ili River Valley,and to provide measures for avoiding frost damage.[Methods]Based on the meteorological data of the Ili River Valley counties and cities during the 12 years from 2010 to 2021 and using the critical low temperature of‘Shushanggan’Apricot as the main factor,we comprehensively analyzed the threats of low temperature in winter in January and late frost in April in spring in the Ili River Valley.[Results]During the 12 years,there were 4 years of low temperature below the critical(-26—-28℃)of‘Shushanggan’Apricot in the Ili River Valley counties and cities in January,accounting for 33.3%,and a total of 59 d.The frequency of occurrence was:Nilka County>Qapqal County>Yining City>Gongliu County>Huocheng County>Khorgos City>Yining County>Tekes County>Xinyuan County.In April,there were 9 years with a low temperature below the critical temperature(-0.6℃)flowering and fruit setting of‘Shushanggan’Apricot,accounting for 75%,and a total of 134 d.The frequency of occurrence was:Nilka County>Tekes County>Gongliu County>Yining County>Huocheng County>Khorgos City>Xinyuan County>Yining City>Qapqal County.The low temperature threats of‘Shushanggan’Apricot suitable cultivation areas were ranked as follows:Nilka County>Gongliu County>Tekes County>Qapqal County>Huocheng County>Yining City>Yining County>Khorgos City>Xinyuan County.Combined with the observation and survey of frost damage on the spot,we comprehensively analyzed and evaluated the cultivation area of‘Shushanggan’Apricot in the Ili River Valley:three counties(Nilka County,Gongliu County,and Tekes County)in the eastern region,except Xinyuan County,suffered frequent late frost damage,are suitable areas for the cultivation of‘Shushanggan’Apricot;three counties and two cities in the western region(Qapqal County,Huocheng County,Yining City,Yining County,Khorgos City)and Xinyuan County in the eastern region are suitable areas for‘Shushanggan’Apricot.The inversion zone at an altitude of 820-1100 in the valley is the superior area for‘Shushanggan’Apricot.[Conclusions]We explored the suitable areas in the origin area of‘Shushanggan’Apricot,and came up with measures to avoid frost damage,to provide a reference for the development of‘Shushanggan’Apricot.
基金co-supported by the Foundation of Shanghai Astronautics Science and Technology Innovation,China(No.SAST2022-114)the National Natural Science Foundation of China(No.62303378),the National Natural Science Foundation of China(Nos.124B2031,12202281)the Foundation of China National Key Laboratory of Science and Technology on Test Physics&Numerical Mathematics,China(No.08-YY-2023-R11)。
文摘The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making collision avoidance significantly more challenging than that for space debris.Much existing research focuses on the continuous thrust model,whereas the impulsive maneuver model is more appropriate for long-duration and long-distance avoidance missions.Additionally,it is important to minimize the impact on the original mission while avoiding noncooperative targets.On the other hand,the existing avoidance algorithms are computationally complex and time-consuming especially with the limited computing capability of the on-board computer,posing challenges for practical engineering applications.To conquer these difficulties,this paper makes the following key contributions:(A)a turn-based(sequential decision-making)limited-area impulsive collision avoidance model considering the time delay of precision orbit determination is established for the first time;(B)a novel Selection Probability Learning Adaptive Search-depth Search Tree(SPL-ASST)algorithm is proposed for non-cooperative target avoidance,which improves the decision-making efficiency by introducing an adaptive-search-depth mechanism and a neural network into the traditional Monte Carlo Tree Search(MCTS).Numerical simulations confirm the effectiveness and efficiency of the proposed method.
文摘Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to better implement advertising activities,this study intends to summarize the relevant research on advertising avoidance in recent years.The specific method is to use the core literature meta-analysis method to identify,filter,and screen relevant literature published in core journals from 1997 to 2020 with the keywords advertising avoidance and advertising resistance.We review the collected articles from the following perspectives:the definition and classification,external stimulating factors,internal perception factors,and moderating factors of advertising avoidance.On this basis,the SOMR model of advertising avoidance is constructed according to the SOR model.Finally,some prospects for future related research are presented.
基金supported in part by the National Natural Science Foundations of China(Nos.61175084,61673042 and 62203046)the China Postdoctoral Science Foundation(No.2022M713006).
文摘Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework named the Formation Interfered Fluid Dynamical System(FIFDS) with Moderate Evasive Maneuver Strategy(MEMS) is proposed in this study.First, the UAV formation collision avoidance problem including quantifiable performance indexes is formulated. Second, inspired by the phenomenon of fluids continuously flowing while bypassing objects, the FIFDS for multiple UAVs is presented, which contains a Parallel Streamline Tracking(PST) method for formation keeping and the traditional IFDS for collision avoidance. Third, to rationally balance flight safety and collision avoidance cost, MEMS is proposed to generate moderate evasive maneuvers that match up with collision risks. Comprehensively containing the time and distance safety information, the 3-D dynamic collision regions are modeled for collision prediction. Then, the moderate evasive maneuver principle is refined, which provides criterions of the maneuver amplitude and direction. On this basis, an analytical parameter mapping mechanism is designed to online optimize IFDS parameters. Finally, the performance of the proposed method is validated by comparative simulation results and real flight experiments using fixed-wing UAVs.
基金supported by the National Key Research and Development Program of China(2022YFB2703503)the National Natural Science Foundation of China(62293501,62525210,and 62293502)the China Scholarship Council(202306280318).
文摘1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf has become a widespread risk in the artificial intelligence(AI)era.
文摘The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.
文摘This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting and corporate governance.The study examines key determinants of tax avoidance,including firm characteristics(such as size,leverage,and multinational scale),managerial attributes,executive compensation,ownership structure,corporate social responsibility(CSR)performance,as well as the impact of regulations and legal reforms.The review findings highlight that the motivations behind tax avoidance are multifaceted,driven by the interaction of economic incentives,organizational ethics,external pressures,and public policies.Moreover,strict regulatory environments and strong CSR practices can mitigate tax avoidance behaviors,although their effectiveness is often contingent upon a firm’s cultural and political context.This study offers a comprehensive mapping of the current literature and recommends future research that integrates additional variables and broader time spans to enhance the understanding of tax avoidance behavior across different national contexts.
文摘The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Traditional single-modal AI-based detection systems, which analyze both text, photos, or movies in isolation, have established useless at taking pictures multi-modal threats, in which malicious actors spread dangerous content throughout a couple of formats. To cope with these demanding situations, we advise a multi-modal deep mastering framework that integrates Natural Language Processing (NLP), Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) networks to become aware of and mitigate online threats effectively. Our proposed model combines BERT for text class, ResNet50 for photograph processing, and a hybrid LSTM-3-d CNN community for video content material analysis. We constructed a large-scale dataset comprising 500,000 textual posts, 200,000 offensive images, and 50,000 annotated motion pictures from more than one platform, which includes Twitter, Reddit, YouTube, and online gaming forums. The system became carefully evaluated using trendy gadget mastering metrics which include accuracy, precision, remember, F1-score, and ROC-AUC curves. Experimental outcomes demonstrate that our multi-modal method extensively outperforms single-modal AI classifiers, achieving an accuracy of 92.3%, precision of 91.2%, do not forget of 90.1%, and an AUC rating of 0.95. The findings validate the necessity of integrating multi-modal AI for actual-time, high-accuracy online chance detection and moderation. Future paintings will have consciousness on improving hostile robustness, enhancing scalability for real-world deployment, and addressing ethical worries associated with AI-driven content moderation.