With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows...With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows a multi-step process,beginning with the collection of datasets from different edge devices and network nodes.To verify its effectiveness,experiments were conducted using the CICDoS2017,NSL-KDD,and CICIDS benchmark datasets alongside other existing models.Recursive feature elimination(RFE)with random forest is used to select features from the CICDDoS2019 dataset,on which a BiLSTM model is trained on local nodes.Local models are trained until convergence or stability criteria are met while simultaneously sharing the updates globally for collaborative learning.A centralised server evaluates real-time traffic using the global BiLSTM model,which triggers alerts for potential DDoS attacks.Furthermore,blockchain technology is employed to secure model updates and to provide an immutable audit trail,thereby ensuring trust and accountability among network nodes.This research introduces a novel decentralized method called Federated Random Forest Bidirectional Long Short-Term Memory(FRF-BiLSTM)for detecting DDoS attacks,utilizing the advanced Bidirectional Long Short-Term Memory Networks(BiLSTMs)to analyze sequences in both forward and backward directions.The outcome shows the proposed model achieves a mean accuracy of 97.1%with an average training delay of 88.7 s and testing delay of 21.4 s.The model demonstrates scalability and the best detection performance in large-scale attack scenarios.展开更多
This paper investigates the distributed continuoustime aggregative optimization problem for second-order multiagent systems,where the local cost function is not only related to its own decision variables,but also to t...This paper investigates the distributed continuoustime aggregative optimization problem for second-order multiagent systems,where the local cost function is not only related to its own decision variables,but also to the aggregation of the decision variables of all the agents.By using the gradient descent method,the distributed average tracking(DAT)technique and the time-base generator(TBG)technique,a distributed continuous-time aggregative optimization algorithm is proposed.Subsequently,the optimality of the system's equilibrium point is analyzed,and the convergence of the closed-loop system is proved using the Lyapunov stability theory.Finally,the effectiveness of the proposed algorithm is validated through case studies on multirobot systems and power generation systems.展开更多
Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods...Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure.展开更多
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t...Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.展开更多
Objectives This study aimed to explore the lagged and cumulative effects of risk factors on disability in older adults using distributed lag non-linear models(DLNMs).Methods We utilized data from the China Health and ...Objectives This study aimed to explore the lagged and cumulative effects of risk factors on disability in older adults using distributed lag non-linear models(DLNMs).Methods We utilized data from the China Health and Retirement Longitudinal Study(CHARLS).After feature selection via Elastic Net Regularization,we applied DLNMs to evaluate the lagged effects of risk factors.Disability was defined as the presence of any difficulties in basic activities of daily living(BADL).The cumulative relative risk(CRR)was calculated by summing the lag-specific risk estimates,representing the cumulative disability risk over the specified lag period.Effect modifications and sensitivity analyses were also performed.Results This study included a total of 2,318 participants.Early-phase lag factors,such as the difficulty in stooping(CRR=3.58;95%CI:2.31-5.55;P<0.001)and walking(CRR=2.77;95%CI:1.39-5.55;P<0.001),exerted the strongest effects immediately upon occurrence.Mid-phase lag factors,such as arthritis(CRR=1.51;95%CI:1.10-2.06;P=0.001),showed a resurgence in disability risk within 2-3 years.Late-phase lag factors,including depressive symptoms(CRR=2.38;95%CI:1.30-4.35;P<0.001)and elevated systolic blood pressure(CRR=1.64;95%CI:1.06-2.79;P=0.02),exhibited significant long-term cumulative risks.Conversely,grip strength(CRR=0.80;95%CI:0.54-0.95;P=0.02)and social participation(CRR=0.89;95%CI:0.73-0.99;P=0.04)were significant protective factors.Conclusions The findings underscore the importance of tailored interventions that account for various lag characteristics of different factors to effectively mitigate disability risk.Future studies should explore the underlying biological and sociological mechanisms of these lagged effects,identify intervention strategies that target risk factors with different lagged patterns,and evaluate their effectiveness.展开更多
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr...With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.展开更多
A multi-stage stress relaxation test was performed on a granodiorite sample to understand the deformation process prior to the macroscopic failure of brittle rocks,as well as the transient response during stress relax...A multi-stage stress relaxation test was performed on a granodiorite sample to understand the deformation process prior to the macroscopic failure of brittle rocks,as well as the transient response during stress relaxation.Distributed optical fiber sensing was used to measure strains across the sample surface by helically wrapping the single-mode fiber around the cylindrical sample.Close agreement was observed between the circumferential strains obtained from the optical fibers and the extensometer.The reconstructed full-field strain contours show strain heterogeneity from the crack closure phase,and the strains in the later deformation phase are dominantly localized within the former high-strain zone.The Gini coefficient was used to quantify the degree of strain localization and shows an initial increase during the crack closure phase,a decrease during the linear elastic phase,and a subsequent increase during the post-yielding phase.This behavior corresponds to a process of initial localization from an imperfect boundary condition,homogenization,and eventual relocalization prior to the macroscopic failure of the sample.The transient strain rate decay during the stress relaxation phase was quantified using the p-value in the“Omori-like"power law function.A higher initial stress at the onset of relaxation results in a lower p-value,indicating a slower strain rate decay.As the sample approaches macroscopic failure,the lowest p-value shifts from the most damaged zone to adjacent areas,suggesting stress redistribution or crack propagation in deformed crystalline rocks under stress relaxation conditions.展开更多
Nonlinear static procedures are widely adopted in structural engineering practice for seismic performance assessment due to their simplicity and computational efficiency.However,their reliability depends heavily on ho...Nonlinear static procedures are widely adopted in structural engineering practice for seismic performance assessment due to their simplicity and computational efficiency.However,their reliability depends heavily on how the nonlinear behaviour of structural components is represented.The recent earthquakes in Albania(2019)and Türkiye(2023)have underscored the need for accurate assessment techniques,particularly for older reinforced concrete buildings with poor detailing.This study quantifies the discrepancies between default and user-defined component modelling in pushover analysis of pre-modern reinforced concrete structures,analysing two representative low-and mid-rise reinforced concrete frame buildings.The lumped plasticity approach incorporates moment-rotation relationships derived from actual member properties and reinforcement configurations,while the distributed plasticity approach uses software-generated default properties based on modern codes.Results show that the distributed plasticity models systematically overestimate both the strength and the deformation capacity by up to 35%compared to lumped plasticity models,especially in buildings with poor detailing and low concrete strength.These findings demonstrate that default software procedures,widely used in practice but not validated for pre-modern structures,produce dangerously unconservative seismic performance estimates.The study provides quantitative evidence of the critical need for tailored modelling strategies that reflect the actual conditions of the existing building stock.展开更多
The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches of...The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.展开更多
This study examined non-uniform loading in goaf cantilever rock masses via testing,modeling,and mechanical analysis to solve instantaneous fracture and section buckling from mining abutment pressure.The study investig...This study examined non-uniform loading in goaf cantilever rock masses via testing,modeling,and mechanical analysis to solve instantaneous fracture and section buckling from mining abutment pressure.The study investigates the non-uniform load gradient effect on fracture characteristics,including load characteristics,fracture location,fracture distribution,and section roughness.A digital model for fracture interface buckling analysis was developed,elucidating the influence of non-uniform load gradients on Fracture Interface Curvature(FIC),Buckling Rate of Change(BRC),and Buckling Domain Field(BDF).The findings reveal that nonlinear tensile stress concentration and abrupt tensile-compressive-shear strain mutations under non-uniform loading are fundamental mechanisms driving fracture path buckling in cantilever rock mass structures.The buckling process of rock mass under non-uniform load can be divided into two stages:low load gradient and high gradient load.In the stage of low gradient load,the buckling behavior is mainly reflected in the compression-shear fracture of the edge.In the stage of high gradient load,a buckling band along the loading direction is gradually formed in the rock mass.These buckling principles establish a theoretical basis for accurately characterizing bearing fractures,fracture interface instability,and vibration sources within overlying cantilever rock masses in goaf.展开更多
To investigate the damage evolution caused by stress-driven and sub-critical crack propagation within the Beishan granite under multi-creep triaxial compressive conditions,the distributed optical fiber sensing and X-r...To investigate the damage evolution caused by stress-driven and sub-critical crack propagation within the Beishan granite under multi-creep triaxial compressive conditions,the distributed optical fiber sensing and X-ray computed tomography were combined to obtain the strain distribution over the sample surface and internal fractures of the samples.The Gini and skewness(G-S)coefficients were used to quantify strain localization during tests,where the Gini coefficient reflects the degree of clustering of elements with high strain values,i.e.,strain localization/delocalization.The strain localization-induced asymmetry of data distribution is quantified by the skewness coefficient.A precursor to granite failure is defined by the rapid and simultaneous increase of the G-S coefficients,which are calculated from strain increment,giving an earlier warning of failure by about 8%peak stress than those from absolute strain values.Moreover,the process of damage accumulation due to stress-driven crack propagation in Beishan granite is different at various confining pressures as the stress exceeds the crack initiation stress.Concretely,strain localization is continuous until brittle failure at higher confining pressure,while both strain localization and delocalization occur at lower confining pressure.Despite the different stress conditions,a similar statistical characteristic of strain localization during the creep stage is observed.The Gini coefficient increases,and the skewness coefficient decreases slightly as the creep stress is below 95%peak stress.When the accelerated strain localization begins,the Gini and skewness coefficients increase rapidly and simultaneously.展开更多
In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a meth...In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency.展开更多
物联网(Internet of Things,IoT)技术的发展给工业界和日常生活带来便利的同时,海量易受到各种攻击和破坏的IoT设备也降低了分布式拒绝服务(Distributed Denial of Service,DDoS)攻击发起的成本,使被攻击方无法响应正常用户访问.为了在...物联网(Internet of Things,IoT)技术的发展给工业界和日常生活带来便利的同时,海量易受到各种攻击和破坏的IoT设备也降低了分布式拒绝服务(Distributed Denial of Service,DDoS)攻击发起的成本,使被攻击方无法响应正常用户访问.为了在物联网边缘中快速、准确地完成DDoS攻击检测,弥补现有方法资源开销大、不精确的缺陷,本文提出了一种基于轻量化卷积神经网络(Lightweight Convolutional Neural Networks,LCNN)的DDoS检测方法.面向物联网流量特性,方法首先提取包级特征和经冗余分析筛选得到的流级特征.之后设计了低参数和运算量的卷积神经网络LCNN,最后基于变维后的特征,快速检测定位攻击.实验结果表明,方法检测准确率达99.4%.同时LCNN在FPGA中能够以较少的资源消耗,保证在1ms时间内完成对一条流的推理判断.展开更多
Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of ...Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model.展开更多
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati...The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.展开更多
基金supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea(NRF-2025S1A5A2A01005171)by the BK21 programat Chungbuk National University(2025).
文摘With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows a multi-step process,beginning with the collection of datasets from different edge devices and network nodes.To verify its effectiveness,experiments were conducted using the CICDoS2017,NSL-KDD,and CICIDS benchmark datasets alongside other existing models.Recursive feature elimination(RFE)with random forest is used to select features from the CICDDoS2019 dataset,on which a BiLSTM model is trained on local nodes.Local models are trained until convergence or stability criteria are met while simultaneously sharing the updates globally for collaborative learning.A centralised server evaluates real-time traffic using the global BiLSTM model,which triggers alerts for potential DDoS attacks.Furthermore,blockchain technology is employed to secure model updates and to provide an immutable audit trail,thereby ensuring trust and accountability among network nodes.This research introduces a novel decentralized method called Federated Random Forest Bidirectional Long Short-Term Memory(FRF-BiLSTM)for detecting DDoS attacks,utilizing the advanced Bidirectional Long Short-Term Memory Networks(BiLSTMs)to analyze sequences in both forward and backward directions.The outcome shows the proposed model achieves a mean accuracy of 97.1%with an average training delay of 88.7 s and testing delay of 21.4 s.The model demonstrates scalability and the best detection performance in large-scale attack scenarios.
基金supported by the National Key Research and Development Program of China(2025YFE0213100)the National Natural Science Foundation of China(62422315,62573348)+1 种基金the Natural Science Basic Research Program of Shaanxi(2025JC-YBMS-667)the“Shuang Yi Liu”Construction Foundation(25GH02010366)。
文摘This paper investigates the distributed continuoustime aggregative optimization problem for second-order multiagent systems,where the local cost function is not only related to its own decision variables,but also to the aggregation of the decision variables of all the agents.By using the gradient descent method,the distributed average tracking(DAT)technique and the time-base generator(TBG)technique,a distributed continuous-time aggregative optimization algorithm is proposed.Subsequently,the optimality of the system's equilibrium point is analyzed,and the convergence of the closed-loop system is proved using the Lyapunov stability theory.Finally,the effectiveness of the proposed algorithm is validated through case studies on multirobot systems and power generation systems.
基金supported by the Extral High Voltage Power Transmission Company,China Southern Power Grid Co.,Ltd.
文摘Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure.
文摘Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.
基金supported by ScientificResearch Fund of National Health Commission of the People’s Republic of China-Major Science and Technology Program for Medicine and Health in Zhejiang Province(WKJ-ZJ-2406).
文摘Objectives This study aimed to explore the lagged and cumulative effects of risk factors on disability in older adults using distributed lag non-linear models(DLNMs).Methods We utilized data from the China Health and Retirement Longitudinal Study(CHARLS).After feature selection via Elastic Net Regularization,we applied DLNMs to evaluate the lagged effects of risk factors.Disability was defined as the presence of any difficulties in basic activities of daily living(BADL).The cumulative relative risk(CRR)was calculated by summing the lag-specific risk estimates,representing the cumulative disability risk over the specified lag period.Effect modifications and sensitivity analyses were also performed.Results This study included a total of 2,318 participants.Early-phase lag factors,such as the difficulty in stooping(CRR=3.58;95%CI:2.31-5.55;P<0.001)and walking(CRR=2.77;95%CI:1.39-5.55;P<0.001),exerted the strongest effects immediately upon occurrence.Mid-phase lag factors,such as arthritis(CRR=1.51;95%CI:1.10-2.06;P=0.001),showed a resurgence in disability risk within 2-3 years.Late-phase lag factors,including depressive symptoms(CRR=2.38;95%CI:1.30-4.35;P<0.001)and elevated systolic blood pressure(CRR=1.64;95%CI:1.06-2.79;P=0.02),exhibited significant long-term cumulative risks.Conversely,grip strength(CRR=0.80;95%CI:0.54-0.95;P=0.02)and social participation(CRR=0.89;95%CI:0.73-0.99;P=0.04)were significant protective factors.Conclusions The findings underscore the importance of tailored interventions that account for various lag characteristics of different factors to effectively mitigate disability risk.Future studies should explore the underlying biological and sociological mechanisms of these lagged effects,identify intervention strategies that target risk factors with different lagged patterns,and evaluate their effectiveness.
基金supported by the Research year project of the KongjuNational University in 2025 and the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2024-00444170,Research and International Collaboration on Trust Model-Based Intelligent Incident Response Technologies in 6G Open Network Environment).
文摘With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.
基金support of her postdoctoral research at the GFZ Helmholtz Centre for Geosciences.P.Pan acknowledges the financial support of the National Natural Science Foundation of China(Grant No.52339001)H.Hofmann and Y.Ji acknowledge the financial support of the Helmholtz Association's Initiative and Networking Fund for the Helmholtz Young Investigator Group ARES(contract number VH-NG-1516).
文摘A multi-stage stress relaxation test was performed on a granodiorite sample to understand the deformation process prior to the macroscopic failure of brittle rocks,as well as the transient response during stress relaxation.Distributed optical fiber sensing was used to measure strains across the sample surface by helically wrapping the single-mode fiber around the cylindrical sample.Close agreement was observed between the circumferential strains obtained from the optical fibers and the extensometer.The reconstructed full-field strain contours show strain heterogeneity from the crack closure phase,and the strains in the later deformation phase are dominantly localized within the former high-strain zone.The Gini coefficient was used to quantify the degree of strain localization and shows an initial increase during the crack closure phase,a decrease during the linear elastic phase,and a subsequent increase during the post-yielding phase.This behavior corresponds to a process of initial localization from an imperfect boundary condition,homogenization,and eventual relocalization prior to the macroscopic failure of the sample.The transient strain rate decay during the stress relaxation phase was quantified using the p-value in the“Omori-like"power law function.A higher initial stress at the onset of relaxation results in a lower p-value,indicating a slower strain rate decay.As the sample approaches macroscopic failure,the lowest p-value shifts from the most damaged zone to adjacent areas,suggesting stress redistribution or crack propagation in deformed crystalline rocks under stress relaxation conditions.
文摘Nonlinear static procedures are widely adopted in structural engineering practice for seismic performance assessment due to their simplicity and computational efficiency.However,their reliability depends heavily on how the nonlinear behaviour of structural components is represented.The recent earthquakes in Albania(2019)and Türkiye(2023)have underscored the need for accurate assessment techniques,particularly for older reinforced concrete buildings with poor detailing.This study quantifies the discrepancies between default and user-defined component modelling in pushover analysis of pre-modern reinforced concrete structures,analysing two representative low-and mid-rise reinforced concrete frame buildings.The lumped plasticity approach incorporates moment-rotation relationships derived from actual member properties and reinforcement configurations,while the distributed plasticity approach uses software-generated default properties based on modern codes.Results show that the distributed plasticity models systematically overestimate both the strength and the deformation capacity by up to 35%compared to lumped plasticity models,especially in buildings with poor detailing and low concrete strength.These findings demonstrate that default software procedures,widely used in practice but not validated for pre-modern structures,produce dangerously unconservative seismic performance estimates.The study provides quantitative evidence of the critical need for tailored modelling strategies that reflect the actual conditions of the existing building stock.
基金supported by the National Natural Science Foundation of China (Grant No.62173009)the National Key Research and Development Program of China (Grant No.2021ZD0112302)。
文摘The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.
基金support provided by the National Natural Science Foundation of China(No.52274077)the Natural Science Foundation of Henan(No.242300421072)+2 种基金the Youth Elite Teachers Cultivation Program for Higher Education Institutions in Henan Province(No.2024GGJS036)the Funds for Distinguished Young Scholars of Henan Polytechnic University(No.J2023-3)the Young Core Teacher Funding Scheme of Henan Polytechnic University(No.2023XQG-09).
文摘This study examined non-uniform loading in goaf cantilever rock masses via testing,modeling,and mechanical analysis to solve instantaneous fracture and section buckling from mining abutment pressure.The study investigates the non-uniform load gradient effect on fracture characteristics,including load characteristics,fracture location,fracture distribution,and section roughness.A digital model for fracture interface buckling analysis was developed,elucidating the influence of non-uniform load gradients on Fracture Interface Curvature(FIC),Buckling Rate of Change(BRC),and Buckling Domain Field(BDF).The findings reveal that nonlinear tensile stress concentration and abrupt tensile-compressive-shear strain mutations under non-uniform loading are fundamental mechanisms driving fracture path buckling in cantilever rock mass structures.The buckling process of rock mass under non-uniform load can be divided into two stages:low load gradient and high gradient load.In the stage of low gradient load,the buckling behavior is mainly reflected in the compression-shear fracture of the edge.In the stage of high gradient load,a buckling band along the loading direction is gradually formed in the rock mass.These buckling principles establish a theoretical basis for accurately characterizing bearing fractures,fracture interface instability,and vibration sources within overlying cantilever rock masses in goaf.
基金supported by the National Natural Science Foundation of China(Grant No.52339001).
文摘To investigate the damage evolution caused by stress-driven and sub-critical crack propagation within the Beishan granite under multi-creep triaxial compressive conditions,the distributed optical fiber sensing and X-ray computed tomography were combined to obtain the strain distribution over the sample surface and internal fractures of the samples.The Gini and skewness(G-S)coefficients were used to quantify strain localization during tests,where the Gini coefficient reflects the degree of clustering of elements with high strain values,i.e.,strain localization/delocalization.The strain localization-induced asymmetry of data distribution is quantified by the skewness coefficient.A precursor to granite failure is defined by the rapid and simultaneous increase of the G-S coefficients,which are calculated from strain increment,giving an earlier warning of failure by about 8%peak stress than those from absolute strain values.Moreover,the process of damage accumulation due to stress-driven crack propagation in Beishan granite is different at various confining pressures as the stress exceeds the crack initiation stress.Concretely,strain localization is continuous until brittle failure at higher confining pressure,while both strain localization and delocalization occur at lower confining pressure.Despite the different stress conditions,a similar statistical characteristic of strain localization during the creep stage is observed.The Gini coefficient increases,and the skewness coefficient decreases slightly as the creep stress is below 95%peak stress.When the accelerated strain localization begins,the Gini and skewness coefficients increase rapidly and simultaneously.
文摘In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency.
文摘物联网(Internet of Things,IoT)技术的发展给工业界和日常生活带来便利的同时,海量易受到各种攻击和破坏的IoT设备也降低了分布式拒绝服务(Distributed Denial of Service,DDoS)攻击发起的成本,使被攻击方无法响应正常用户访问.为了在物联网边缘中快速、准确地完成DDoS攻击检测,弥补现有方法资源开销大、不精确的缺陷,本文提出了一种基于轻量化卷积神经网络(Lightweight Convolutional Neural Networks,LCNN)的DDoS检测方法.面向物联网流量特性,方法首先提取包级特征和经冗余分析筛选得到的流级特征.之后设计了低参数和运算量的卷积神经网络LCNN,最后基于变维后的特征,快速检测定位攻击.实验结果表明,方法检测准确率达99.4%.同时LCNN在FPGA中能够以较少的资源消耗,保证在1ms时间内完成对一条流的推理判断.
文摘Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model.
文摘The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.