期刊文献+
共找到1,520篇文章
< 1 2 76 >
每页显示 20 50 100
An Attack Modeling Based on Colored Petri Net
1
作者 周世杰 秦志光 +1 位作者 张峰 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期47-52,共6页
A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic feat... A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t. 展开更多
关键词 petri net color petri net (CPN) intrusion detection and response attack modeling
在线阅读 下载PDF
Study on Anti-ship Missile Saturation Attack Model 被引量:1
2
作者 王光辉 孙学锋 +1 位作者 严建钢 谢宇鹏 《Defence Technology(防务技术)》 SCIE EI CAS 2010年第1期10-15,共6页
Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. T... Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. This model containing the probability of acquiring anti-ship missile, threat estimation, firepower distribution, interception, effectiveness evaluation and firepower turning, can dynamically simulate the antagonism process of anti-ship missile attack stream and anti-air missile weapon system. The anti-ship missile's saturation attack stream for different ship-to-air missile systems can be calculated quantitatively. The simulated results reveal the relations among the anti-ship missile saturation attack and the attack intensity of anti-ship missile, interception mode and the main parameters of anti-air missile weapon system. It provides a theoretical basis for the effective operation of anti-ship missile. 展开更多
关键词 operational research system engineering anti-ship missile ship-to-air missile saturation attack antagonism model penetrate efficiency
在线阅读 下载PDF
Analysis of SVEIR worm attack model with saturated incidence and partial immunization 被引量:2
3
作者 WANG Fangwei HUANG Wenyan +1 位作者 SHEN Yulong WANG Changguang 《Journal of Communications and Information Networks》 2016年第4期105-115,共11页
Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization ... Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization becomes a significant matter for sustaining Internet infrastructure.This paper addresses this issue by presenting a novel worm susceptible-vaccinated-exposed-infectious-recovered model,named the SVEIR model.The SVEIR model extends the classical susceptible-exposed-infectious-recovered model(refer to SEIR model)through incorporating a saturated incidence rate and a partial immunization rate.The basic reproduction number in the SVEIR model is obtained.By virtue of the basic reproduction number,we prove the global stabilities of an infection-free equilibrium point and a unique endemic equilibrium point.Numerical methods are used to verify the proposed SVEIR model.Simulation results show that partial immunization is highly effective for eliminating worms,and the SVEIR model is viable for controlling and forecasting Internet worms. 展开更多
关键词 Internet worm attack model STABILITY saturated incidence partial immunization
原文传递
HB-2 high-velocity correlation model at high angles of attack in supersonic wind tunnel tests 被引量:3
4
作者 Djordje VUKOVI? Dijana DAMLJANOVI? 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第7期1565-1576,共12页
Responding to a need for experimental data on a standard wind tunnel model at high angles of attack in the supersonic speed range, and in the absence of suitable reference data, a series of tests of two HB-2 standard ... Responding to a need for experimental data on a standard wind tunnel model at high angles of attack in the supersonic speed range, and in the absence of suitable reference data, a series of tests of two HB-2 standard models of different sizes was performed in the T-38 trisonic wind tunnel of Vojnotehnickˇi Institut(VTI), in the Mach number range 1.5–4.0, at angles of attack up to+30°. Tests were performed at relatively high Reynolds numbers of 2.2 millions to 4.5 millions(based on model forebody diameter). Results were compared with available low angle of attack data from other facilities, and, as a good agreement was found, it was assumed that, by implication, the obtained high angle of attack results were valid as well. Therefore, the results can be used as a reference database for the HB-2 model at high angles of attack in the supersonic speed range, which was not available before. The results are presented in comparison with available reference data, but also contain data for some Mach numbers not given in other publications. 展开更多
关键词 Base pressure Experimental AERODYNAMICS High angle of attack Standard model WIND TUNNEL
原文传递
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation 被引量:1
5
作者 Lingtao Qi Haiping Huang +2 位作者 Feng Li Reza Malekian Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第10期112-132,共21页
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGenl) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGenl, a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD,SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM. 展开更多
关键词 shilling attack detection model collaborative filtering recommender systems gravitation-based detection model particle filter algorithm
在线阅读 下载PDF
Unsteady aerodynamic modeling at high angles of attack using support vector machines 被引量:28
6
作者 Wang Qing Qian Weiqi He Kaifeng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期659-668,共10页
Abstract Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determ... Abstract Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determination and parameter estimation due to little understanding of the flow mechanism. Support vector machines (SVMs) based on statistical learning theory provide a novel tool for nonlinear system modeling. The work presented here examines the feasibility of applying SVMs to high angle.-of-attack unsteady aerodynamic modeling field. Mainly, after a review of SVMs, several issues associated with unsteady aerodynamic modeling by use of SVMs are discussed in detail, such as sele, ction of input variables, selection of output variables and determination of SVM parameters. The least squares SVM (LS-SVM) models are set up from certain dynamic wind tunnel test data of a delta wing and an aircraft configuration, and then used to predict the aerodynamic responses in other tests. The predictions are in good agreement with the test data, which indicates the satisfving learning and generalization performance of LS-SVMs. 展开更多
关键词 Aerodynamic modeling High angle of attack Support vector machines(SVMs) Unsteady aerodynamics Wind tunnel test
原文传递
Algebraic Attack on Filter-Combiner Model Keystream Generators
7
作者 WUZhi-ping YEDing-feng MAWei-ju 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. 展开更多
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
8
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
N-Model:多深度学习模型动态组合的智能系统安全弹性增强
9
作者 程泽凯 刘高天 +3 位作者 蒋建春 庞志伟 滕若阑 梅瑞 《计算机系统应用》 2025年第9期57-68,共12页
基于深度学习智能系统面临对抗攻击、供应链攻击等安全威胁问题日益突出,而传统智能系统采用单一模型,其防御机制是静态的、确定的模式,模型的功能存在单点脆弱性,导致智能系统缺乏安全弹性.本文提出了一种多个深度学习模型动态组合的方... 基于深度学习智能系统面临对抗攻击、供应链攻击等安全威胁问题日益突出,而传统智能系统采用单一模型,其防御机制是静态的、确定的模式,模型的功能存在单点脆弱性,导致智能系统缺乏安全弹性.本文提出了一种多个深度学习模型动态组合的方法(N-Model),实现模型的多样性和随机性,通过模型的动态变化增加智能攻击对象及攻击途径的不确定性,结合多模型的表决机制,增强智能系统的安全弹性.理论安全分析表明,N-Model组合模型在攻击情景下相比单一模型具有较高的期望准确率.实验结果进一步证实,在CIFAR-10数据集下,N-Model组合模型可抵御多种对抗攻击,其攻击成功率低于单一模型,表现出良好的综合安全性能. 展开更多
关键词 人工智能安全 深度学习防御 随机模型调度 多模型表决 攻击容忍性 系统安全弹性
在线阅读 下载PDF
面向扩散模型的时序成员推理攻击方法
10
作者 高志鹏 张祎 +3 位作者 尤玮婧 柴泽 杨杨 芮兰兰 《计算机研究与发展》 北大核心 2026年第1期243-254,共12页
扩散模型是一种用于描述信息传播或影响传递过程的数学模型,近年来被越来越多地应用在计算机视觉和自然语言处理等领域的生成式任务中,针对扩散模型的数据隐私攻击与保护也随之得到了广泛关注。成员推理攻击(membership inference attac... 扩散模型是一种用于描述信息传播或影响传递过程的数学模型,近年来被越来越多地应用在计算机视觉和自然语言处理等领域的生成式任务中,针对扩散模型的数据隐私攻击与保护也随之得到了广泛关注。成员推理攻击(membership inference attack,MIA)是一种针对机器学习模型的经典攻击,然而,现有的MIA方法实施的深度和广度不足,尤其是在短时攻击和长时攻击的效果平衡上存在挑战。提出了一种新的面向扩散模型的时序成员推理攻击方法(temporal membership inference attack method for diffusion models,TMIA-DM),通过噪声梯度信息保证短时攻击的攻击成功率(attack success rate,ASR),同时采用时序噪声信息来提高长时攻击效果。实验表明,提出的方法在常见扩散模型上短时攻击的ASR提升约5个百分点,长时攻击的ASR提高约1个百分点。 展开更多
关键词 成员推理攻击 扩散模型 梯度 隐私泄露 机器学习
在线阅读 下载PDF
Evaluating Privacy Leakage and Memorization Attacks on Large Language Models (LLMs) in Generative AI Applications 被引量:1
11
作者 Harshvardhan Aditya Siddansh Chawla +6 位作者 Gunika Dhingra Parijat Rai Saumil Sood Tanmay Singh Zeba Mohsin Wase Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期421-447,共27页
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor... The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks. 展开更多
关键词 Large Language models PII Leakage Privacy Memorization OVERFITTING Membership Inference attack (MIA)
在线阅读 下载PDF
联邦学习中的模型中毒攻击防御策略综述
12
作者 张磊 姜鸽 +1 位作者 蒲冰倩 常亮 《计算机科学与探索》 北大核心 2026年第4期943-964,共22页
模型中毒攻击是联邦学习中的一种严重威胁,在模型中毒攻击中,恶意攻击者通过在训练数据或模型更新中注入恶意信息,从而干扰全局模型的正常收敛,直至操控其预测结果。模型中毒攻击的隐蔽性和多样性使得防御极为困难,因此引起研究者的广... 模型中毒攻击是联邦学习中的一种严重威胁,在模型中毒攻击中,恶意攻击者通过在训练数据或模型更新中注入恶意信息,从而干扰全局模型的正常收敛,直至操控其预测结果。模型中毒攻击的隐蔽性和多样性使得防御极为困难,因此引起研究者的广泛关注。对模型中毒攻击的原理加以分析,重点剖析攻击者如何通过篡改本地训练数据或伪造模型参数来破坏全局模型性能的内在机制,在此基础上,系统性地将现有防御策略划分为三类:基于恶意模型分析的防御策略,这类方法主要通过模型更新相似性比较和质量评估来有效识别潜在的恶意行为;基于模型更新鲁棒聚合的防御策略,其核心在于采用移除极值或自动加权创新的聚合方式来显著降低攻击造成的影响;基于模型更新加密聚合的防御策略,这类策略创造性地结合了差分隐私和同态加密前沿技术,在确保数据隐私安全的同时大幅提升了模型的鲁棒性,并对其优缺点以及应用场景加以分析说明,最后对模型中毒攻击的隐私保护问题和具体的解决方案详细分析,并从攻击和防御两个角度提出未来的发展方向。 展开更多
关键词 联邦学习 模型中毒攻击 鲁棒聚合 差分隐私 同态加密 模型更新
在线阅读 下载PDF
生成式大模型越狱攻击安全性研究综述
13
作者 李燕 王钢 王浩 《计算机工程与应用》 北大核心 2026年第6期27-50,共24页
近年来,生成式大模型广泛应用于文本生成、对话交互、内容创作等多个关键场景。然而,越狱攻击正成为生成式大模型的新威胁,越狱攻击能够绕过生成式大模型内置的安全机制,诱使经过其产生有害输出,带来伦理风险、隐私泄露以及模型滥用等... 近年来,生成式大模型广泛应用于文本生成、对话交互、内容创作等多个关键场景。然而,越狱攻击正成为生成式大模型的新威胁,越狱攻击能够绕过生成式大模型内置的安全机制,诱使经过其产生有害输出,带来伦理风险、隐私泄露以及模型滥用等安全挑战。针对这一威胁,全面综述了近年来大语言模型与多模态大模型这两类主流的生成式大模型的越狱攻击研究进展。从越狱攻击类型、防御策略、安全评估框架三个方面,详细总结了当前越狱攻击方法的基本原理、实施方法与研究结论,为后续的研究提供了有效参考。基于上述研究,进一步总结了当前两类主流生成式模型在越狱攻击安全性研究方面存在的不足,并提出了未来生成式大模型安全性研究所面临的主要挑战与发展机遇,为研究人员在生成式大模型的复杂应用和安全性研究领域提供指导建议。 展开更多
关键词 生成式大模型(GLMs) 越狱攻击 安全挑战 防御策略 安全性研究
在线阅读 下载PDF
工业网络通信链路传输安全态势感知方法研究
14
作者 程阔 李震 《成都工业学院学报》 2026年第1期38-43,共6页
工业网络通信链路数据交互频繁,易受到来自企业内部违规操作、恶意软件渗透以及外部网络攻击、恶意竞争行为等多种安全威胁,影响工业网络的稳定性和数据安全性。为此,提出工业网络通信链路传输安全态势感知方法。通过采集工业网络通信... 工业网络通信链路数据交互频繁,易受到来自企业内部违规操作、恶意软件渗透以及外部网络攻击、恶意竞争行为等多种安全威胁,影响工业网络的稳定性和数据安全性。为此,提出工业网络通信链路传输安全态势感知方法。通过采集工业网络通信链路的异常数据,并对其进行离散化处理,计算离散数据的不确定性和增益,提取具有较大信息增益的数据作为安全态势感知要素。挖掘攻击数据集强关联关系,得到关联矩阵,结合编码输出,确定攻击程度等级。构建网络通信链路自适应学习感知模型,以攻击程度等级量化值作为模型输入,输出攻击活跃指数,结合攻击行为的特征参数,计算传输安全态势感知度量值,并依据度量值阈值,确定网络通信链路传输的安全水平。实验结果表明,所提方法得到的拟合优度决定系数高于0.8,输出的安全态势感知度量值与实际值更为接近,感知准确度较高。 展开更多
关键词 工业网络 通信链路 安全态势感知 感知模型 攻击等级
在线阅读 下载PDF
基于频域的抗压缩隐蔽后门攻击
15
作者 闫雷鸣 翟强众 陈先意 《计算机工程与应用》 北大核心 2026年第7期291-301,共11页
智能模型的后门攻击可通过在训练数据中嵌入触发器的方式来毒化数据集,使模型在训练过程中被植入后门。然而,图像压缩算法的广泛应用显著削弱了数据投毒后门攻击的有效性。压缩处理会严重破坏中毒图像中触发器的特征,导致后门攻击的成... 智能模型的后门攻击可通过在训练数据中嵌入触发器的方式来毒化数据集,使模型在训练过程中被植入后门。然而,图像压缩算法的广泛应用显著削弱了数据投毒后门攻击的有效性。压缩处理会严重破坏中毒图像中触发器的特征,导致后门攻击的成功率急剧下降。针对这一问题,提出了一种基于频域的抗压缩隐蔽后门攻击方法。利用图像低频成分对压缩的天然抗性以及压缩中的亮度保真性,选择在Y通道的深层低频信息中嵌入后门触发器,以增强触发器的抗压缩能力。为进一步提升触发器的隐蔽性,设计了基于累积能量的分割机制,将触发器嵌入深层低频信息的低能量域中。在CIFAR-10、GTSRB和CIFAR-100数据集上,结合JPEG、JPEG2000和WEBP三种常用图像压缩算法进行了实验验证。结果表明,所提方法在抗压缩攻击中表现出较高的有效性、隐蔽性和鲁棒性。平均抗压缩攻击成功率分别达到95.71%、98.57%和95.02%,并且能有效抵抗主流防御技术的检测。 展开更多
关键词 后门攻击 模型安全 图像压缩
在线阅读 下载PDF
动态信誉驱动的联邦学习恶意攻击检测与隐私保护协同优化方法
16
作者 顾皓然 陈媛媛 +1 位作者 杨祎程 吴晨阳 《现代电子技术》 北大核心 2026年第7期69-73,共5页
联邦学习的开放部署面临恶意攻击和隐私泄露的多重挑战,传统方法常孤立优化单一指标,导致恶意攻击检测与隐私保护失衡,难以应对复合攻击的威胁。因此,文中提出一种动态信誉驱动的联邦学习恶意攻击检测与隐私保护协同优化方法。基于动态... 联邦学习的开放部署面临恶意攻击和隐私泄露的多重挑战,传统方法常孤立优化单一指标,导致恶意攻击检测与隐私保护失衡,难以应对复合攻击的威胁。因此,文中提出一种动态信誉驱动的联邦学习恶意攻击检测与隐私保护协同优化方法。基于动态信誉评估模块设计,突破分治式防御的性能瓶颈。设计融合多维动态指标的信誉评估机制,综合计算客户端的实时训练损失偏离度、训练时延异常性以及历史行为可信度,动态迭代更新其信誉评分。对于信誉值因多次恶意行为惩罚而持续低于预设阈值的客户端,系统将执行隔离机制。分层差分隐私机制依据客户端的实时信誉等级,实现差异化隐私预算分配和隐私保护强度的自适应调整,在有效抑制恶意梯度影响的同时,平衡正常数据的模型贡献与隐私安全。实验结果表明,相比传统检测算法,所提方法在恶意检测精准性与隐私保护方面展现出显著优势,是一种可靠的方法。 展开更多
关键词 联邦学习 动态信誉 自适应差分隐私 数据投毒攻击 模型投毒攻击 协同优化
在线阅读 下载PDF
基于知识迁移和冻结的模型反演防御方法
17
作者 易文哲 徐枭洋 +2 位作者 石磊 庄泳 王鹃 《信息网络安全》 北大核心 2026年第4期566-578,共13页
随着深度学习技术的快速发展和广泛应用,其所引发的隐私安全问题也日益受到关注。其中,模型反演攻击能够仅凭模型参数还原用户的人脸图像,对用户隐私构成严重威胁。尽管现有研究已提出多种防御方案,但仍存在模型性能与防御效果难以权衡... 随着深度学习技术的快速发展和广泛应用,其所引发的隐私安全问题也日益受到关注。其中,模型反演攻击能够仅凭模型参数还原用户的人脸图像,对用户隐私构成严重威胁。尽管现有研究已提出多种防御方案,但仍存在模型性能与防御效果难以权衡、对新型攻击防御能力不足等问题。针对上述问题,文章提出一种基于知识迁移和冻结的模型反演防御方法。该方法通过冻结与分类相关的全连接层,有效防止隐私信息被提取,同时迁移紧邻全连接层的参数,以进一步增强防御能力。实验结果表明,与现有防御方法相比,该方法在多个模型和数据集上均展现出更优的防御性能与稳定性。 展开更多
关键词 模型反演攻击 迁移学习 隐私保护
在线阅读 下载PDF
基于BERT和GRU的Web攻击检测模型研究
18
作者 谭攀 王海珍 成雨玫 《齐齐哈尔大学学报(自然科学版)》 2026年第1期30-37,共8页
目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进... 目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进行上下文语义编码、全连接层处理,将获得的数据与原始文本数据拼接,输入GRU网络提取序列特征,输出通过Softmax计算,最终实现多分类。在CSIC 2010数据集和FWAF数据集上的实验结果表明,BERT_GRU模型在准确率、召回率、F1值等评价指标以及训练时间方面均优于对比模型。 展开更多
关键词 Web攻击检测 BERT模型 GRU
在线阅读 下载PDF
基于扩散模型的无人机遥感目标检测物理对抗攻击方法研究
19
作者 夏筱彦 张宇 +1 位作者 胡锡坤 钟平 《空天防御》 2026年第1期52-62,共11页
深度神经网络虽然在各类视觉任务中取得了显著进展,但易受到对抗样本的攻击;相较于数字域对抗攻击,物理域对抗攻击更具挑战;针对无人机遥感图像目标检测的对抗攻击需在多视角、距离变化及光照差异等复杂条件下保持稳定的有效性,攻击方... 深度神经网络虽然在各类视觉任务中取得了显著进展,但易受到对抗样本的攻击;相较于数字域对抗攻击,物理域对抗攻击更具挑战;针对无人机遥感图像目标检测的对抗攻击需在多视角、距离变化及光照差异等复杂条件下保持稳定的有效性,攻击方法的优化过程需充分考虑真实物理成像环境的动态性与多样性。现有物理域对抗攻击方法虽能降低目标检测模型性能,但这些方法通常仅依赖像素级的局部纹理优化,导致生成的对抗纹理模式单一、适应性有限。为解决上述问题,本文提出一种基于扩散模型的物理对抗攻击方法。该方法以预训练扩散模型作为生成器,结合图像与文本先验特征引导对抗纹理的生成,基于全覆盖的物理对抗攻击框架实现无人机遥感目标检测任务下的车辆伪装。实验结果表明:本文方法在多个目标检测模型上均表现出较高的攻击成功率与良好的跨模型迁移能力,且在纹理多样性和稳定性方面均优于对比方法。 展开更多
关键词 无人机遥感图像 深度神经网络 物理对抗攻击 扩散模型 目标检测
在线阅读 下载PDF
大语言模型提示词注入攻击与防御综述
20
作者 袁明 邹其霖 +1 位作者 袁文骐 王群 《信息网络安全》 北大核心 2026年第3期341-354,共14页
随着大语言模型及其驱动的AI Agent在多个领域被广泛应用,大语言模型安全问题日益突出。提示词注入攻击作为一种新兴的安全威胁,给大语言模型带来巨大安全隐患,它利用大语言模型无法区分用户指令与注入指令的缺陷,诱导模型偏离目标任务... 随着大语言模型及其驱动的AI Agent在多个领域被广泛应用,大语言模型安全问题日益突出。提示词注入攻击作为一种新兴的安全威胁,给大语言模型带来巨大安全隐患,它利用大语言模型无法区分用户指令与注入指令的缺陷,诱导模型偏离目标任务,执行攻击者任务,造成数据泄露、系统入侵等问题。文章系统梳理了提示词注入攻击的研究现状,包括早期注入攻击和基于角色注入攻击、载荷拆分注入攻击、基于混淆注入攻击以及基于优化注入攻击等。在防御方面,根据防御手段将现有方法归纳为基于检测的防御和基于预防的防御。 展开更多
关键词 大语言模型 提示词注入攻击 AI智能体 AI安全
在线阅读 下载PDF
上一页 1 2 76 下一页 到第
使用帮助 返回顶部