As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust acces...As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust access control mechanisms.The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control,which relies on trusted third parties and complex computations,resulting in intricate interactions,higher hardware costs,and processing delays.To address these issues,this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission.This method enhances data security and resource efficiency without imposing heavy computational and network burdens.In comparison to the best existing approach,it achieves a 7%improvement in accuracy,effectively addressing existing gaps in lightweight encryption and recognition performance.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of ...The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.展开更多
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as...Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region.展开更多
The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa ha...The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa has featured high return and high risk historically,and it remains clear that no single entity can properly solve current security challenges that Africa faces.The moment calls for international joint collaboration and concerted effort on the part of China,the US and African countries.展开更多
The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China ...The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.展开更多
The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between dev...The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between development and security;furthermore,we must achieve positive interplay between high-quality development and high-level security to effectively ensure China's long-term stability.Ensuring both development and security is a major principle underlying the CPC's governance.This principle has been gradually established and enriched in the CPC's struggle to promote socio-economic development and safeguard national security.It is an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,encapsulating the worldview and methodology of the CPC's innovative theories in the new era and realizing the dialectical unity of political security and economic security,a people-centered development philosophy and a people-oriented security philosophy,the fundamental approaches to development and the fundamental requirements of security,high-quality development and high-level security,and maintaining the initiative for development and enhancing security preparedness.Since the 18th CPC National Congress,the principle of ensuring both development and security has demonstrated great strength in guiding our thinking and promoting practical creativity,showing that the CPC's understanding of the dialectical relationship between development and security and its capacity to enhance security through development and ensure development through security have reached new heights.展开更多
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet...Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.展开更多
The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling off...The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling officers of Bushehrvessels. The results of Kolmogrov-Smirinov test suggest that the data are normal and T-test has been used for questionnaire analysis. The findings indicate that failure in technical and security certificates, failure of qualification certificate, failure of machinery and electrical appliances, structural safety defects, failure of telecommunication equipment, failure of security in under 500 tons motor boats and traditional and metal vessels [1]. As well, above 500 tons vessels traveling to Bushehr waters (state vessels) have suitable conditions.展开更多
China has always placed great importance on the relationship between development and security.Since the founding of the People’s Republic in 1949,China has been modifying its approach to security and development to k...China has always placed great importance on the relationship between development and security.Since the founding of the People’s Republic in 1949,China has been modifying its approach to security and development to keep pace with domestic and international changes.It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978,prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC),and gradually enhancing both these two imperatives after the 18th CPC National Congress.Currently,with the once-in-a-century global changes and the increase in traditional and non-traditional security threats,China is confronted with unprecedented external challenges.However,its capability to preserve national security still needs improvement.Based on a clear understanding of the situation,the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security,highlighting“ensuring both development and security”as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance.Thus,it provides guidance,both in theory and in practice,for pursuing the path of national security with Chinese characteristics.展开更多
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and...Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods.展开更多
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ...Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ...In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.展开更多
The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cyber...The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.展开更多
The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma...The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.展开更多
The identifiability of users as they interact in the digital world is fundamentally linked to privacy and security issues.Identifiability can be divided into two:subjective identifiability,which is based on psychologi...The identifiability of users as they interact in the digital world is fundamentally linked to privacy and security issues.Identifiability can be divided into two:subjective identifiability,which is based on psychological perceptions(i.e.,mental space),and objective identifiability,which is based on social media data(i.e.,information space).This study constructs a prediction model for social media data identifiability of users based on a supervised machine learning technique.The findings,based on data from Weibo,a Chinese social media platform,indicate that the top seven features and values for predicting social media identifiability include blog pictures(0.21),blog location(0.14),birthdate(0.12),location(0.10),blog interaction(0.10),school(0.08),and interests and hobbies(0.07).The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants.Based on the degree of deviation between the two,users can be divided into four categories—normal,conservative,active,and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure.This study provides insights into the development of privacy protection strategies based on social media data classification.展开更多
The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in C...The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in Citrus reticulate was 91.9%. The detection rate of banned pesticides was 1.6%. The detection rate of restricted pesticides was 9.5%. The detection rate of allowed pesticides was 68.3%. The detection rate of unregistered pesticides was 15.9%. The pesticide used in citrus was relatively common. Because of the banned and restricted pesticides were both in the control degree, on the whole, the quality and security of Citrus reticulata was safe.展开更多
Large LanguageModels(LLMs)are increasingly utilized for semantic understanding and reasoning,yet their use in sensitive settings is limited by privacy concerns.This paper presents In-Mig,a mobile-agent architecture th...Large LanguageModels(LLMs)are increasingly utilized for semantic understanding and reasoning,yet their use in sensitive settings is limited by privacy concerns.This paper presents In-Mig,a mobile-agent architecture that integrates LLM reasoning within agents that can migrate across organizational venues.Unlike centralized approaches,In-Mig performs reasoning in situ,ensuring that raw data remains within institutional boundaries while allowing for cross-venue synthesis.The architecture features a policy-scoped memory model,utility-driven route planning,and cryptographic trust enforcement.Aprototype using JADE for mobility and quantizedMistral-7B demonstrates practical feasibility.Evaluation across various scenarios shows that In-Mig achieves 92%similarity to centralized baselines,confirming its utility and strong privacy guarantees.These results suggest that migrating,privacy-preserving LLM agents can effectively support decentralized reasoning in trust-sensitive domains.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants(62250410365,62071084)the Youth Program of Humanities and Social Sciences of the MoE(23YJCZH291)+1 种基金the Key Laboratory of Computing Power Network and Information Security,Ministry of Education(2023ZD02)Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/15/46.
文摘As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust access control mechanisms.The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control,which relies on trusted third parties and complex computations,resulting in intricate interactions,higher hardware costs,and processing delays.To address these issues,this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission.This method enhances data security and resource efficiency without imposing heavy computational and network burdens.In comparison to the best existing approach,it achieves a 7%improvement in accuracy,effectively addressing existing gaps in lightweight encryption and recognition performance.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.
文摘Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region.
文摘The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa has featured high return and high risk historically,and it remains clear that no single entity can properly solve current security challenges that Africa faces.The moment calls for international joint collaboration and concerted effort on the part of China,the US and African countries.
文摘The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.
文摘The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between development and security;furthermore,we must achieve positive interplay between high-quality development and high-level security to effectively ensure China's long-term stability.Ensuring both development and security is a major principle underlying the CPC's governance.This principle has been gradually established and enriched in the CPC's struggle to promote socio-economic development and safeguard national security.It is an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,encapsulating the worldview and methodology of the CPC's innovative theories in the new era and realizing the dialectical unity of political security and economic security,a people-centered development philosophy and a people-oriented security philosophy,the fundamental approaches to development and the fundamental requirements of security,high-quality development and high-level security,and maintaining the initiative for development and enhancing security preparedness.Since the 18th CPC National Congress,the principle of ensuring both development and security has demonstrated great strength in guiding our thinking and promoting practical creativity,showing that the CPC's understanding of the dialectical relationship between development and security and its capacity to enhance security through development and ensure development through security have reached new heights.
文摘Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.
文摘The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling officers of Bushehrvessels. The results of Kolmogrov-Smirinov test suggest that the data are normal and T-test has been used for questionnaire analysis. The findings indicate that failure in technical and security certificates, failure of qualification certificate, failure of machinery and electrical appliances, structural safety defects, failure of telecommunication equipment, failure of security in under 500 tons motor boats and traditional and metal vessels [1]. As well, above 500 tons vessels traveling to Bushehr waters (state vessels) have suitable conditions.
文摘China has always placed great importance on the relationship between development and security.Since the founding of the People’s Republic in 1949,China has been modifying its approach to security and development to keep pace with domestic and international changes.It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978,prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC),and gradually enhancing both these two imperatives after the 18th CPC National Congress.Currently,with the once-in-a-century global changes and the increase in traditional and non-traditional security threats,China is confronted with unprecedented external challenges.However,its capability to preserve national security still needs improvement.Based on a clear understanding of the situation,the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security,highlighting“ensuring both development and security”as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance.Thus,it provides guidance,both in theory and in practice,for pursuing the path of national security with Chinese characteristics.
基金supported in part by the National Science Foundation of China(NSFC)under Grant No.62371131in part by the National Key R&D Program of China under Grant No.2024YFE0200700in part by the program of Zhishan Young Scholar of Southeast University under Grant No.2242024RCB0030。
文摘Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods.
基金Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
基金supported in part by the National Science Foundation(NSF)of the USA(2146497,2416872,2315596 and 2244219).
文摘In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.
文摘The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.
文摘The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.
基金supported by the National Social Science Funds of China(Grant No.21BSH050)Major Project of National Social Science Funds of China(Grant No.20&ZD013).
文摘The identifiability of users as they interact in the digital world is fundamentally linked to privacy and security issues.Identifiability can be divided into two:subjective identifiability,which is based on psychological perceptions(i.e.,mental space),and objective identifiability,which is based on social media data(i.e.,information space).This study constructs a prediction model for social media data identifiability of users based on a supervised machine learning technique.The findings,based on data from Weibo,a Chinese social media platform,indicate that the top seven features and values for predicting social media identifiability include blog pictures(0.21),blog location(0.14),birthdate(0.12),location(0.10),blog interaction(0.10),school(0.08),and interests and hobbies(0.07).The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants.Based on the degree of deviation between the two,users can be divided into four categories—normal,conservative,active,and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure.This study provides insights into the development of privacy protection strategies based on social media data classification.
基金Supported by Special Funds of National Agricultural product Quality and Safety Risk Assessment(GJFP201600402)Youth Foundation of Hubei Academy of Agricultural Sciences(2015NKYJJ36)~~
文摘The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in Citrus reticulate was 91.9%. The detection rate of banned pesticides was 1.6%. The detection rate of restricted pesticides was 9.5%. The detection rate of allowed pesticides was 68.3%. The detection rate of unregistered pesticides was 15.9%. The pesticide used in citrus was relatively common. Because of the banned and restricted pesticides were both in the control degree, on the whole, the quality and security of Citrus reticulata was safe.
文摘Large LanguageModels(LLMs)are increasingly utilized for semantic understanding and reasoning,yet their use in sensitive settings is limited by privacy concerns.This paper presents In-Mig,a mobile-agent architecture that integrates LLM reasoning within agents that can migrate across organizational venues.Unlike centralized approaches,In-Mig performs reasoning in situ,ensuring that raw data remains within institutional boundaries while allowing for cross-venue synthesis.The architecture features a policy-scoped memory model,utility-driven route planning,and cryptographic trust enforcement.Aprototype using JADE for mobility and quantizedMistral-7B demonstrates practical feasibility.Evaluation across various scenarios shows that In-Mig achieves 92%similarity to centralized baselines,confirming its utility and strong privacy guarantees.These results suggest that migrating,privacy-preserving LLM agents can effectively support decentralized reasoning in trust-sensitive domains.