期刊文献+
共找到31,375篇文章
< 1 2 250 >
每页显示 20 50 100
基于PDA的物联网综合实验平台建设——从原理(P)、设计(D)到应用(A)的贯通式实验设计
1
作者 李宗辉 陈茜 +1 位作者 景丽萍 贾卓生 《实验科学与技术》 2026年第1期46-52,共7页
针对物联网实验教学中面临的实验平台集成度低、扩展性差,实验内容匮乏的问题,提出基于PDA实验板的物联网综合实验平台和实验教学方案,介绍物联网综合实验平台硬件和软件建设过程、实验任务、实施流程和建设成果。该平台实验操作清晰直... 针对物联网实验教学中面临的实验平台集成度低、扩展性差,实验内容匮乏的问题,提出基于PDA实验板的物联网综合实验平台和实验教学方案,介绍物联网综合实验平台硬件和软件建设过程、实验任务、实施流程和建设成果。该平台实验操作清晰直观,实验内容丰富,将理论知识与实践内容相结合,便于学生进行科学研究和实践训练。 展开更多
关键词 物联网 综合实验平台 pda实验板 实验教学
在线阅读 下载PDF
基于SiO_(2)@PDA-DGT原位检测水体中生物有效态Cr(Ⅵ)
2
作者 陈朴菁 施琪 +3 位作者 邹毅彬 田永强 吕东境 黄旭光 《生态与农村环境学报》 北大核心 2026年第2期292-300,共9页
为原位检测水体中生物有效态Cr(Ⅵ),开发聚多巴胺(polydopamine,PDA)包覆二氧化硅(SiO_(2))的复合材料(SiO_(2)@PDA),将其引入结合相的梯度扩散薄膜(SiO_(2)@PDA-DGT)装置,测试装置在不同水体中的适用条件并探索测定生物有效态Cr(Ⅵ)的... 为原位检测水体中生物有效态Cr(Ⅵ),开发聚多巴胺(polydopamine,PDA)包覆二氧化硅(SiO_(2))的复合材料(SiO_(2)@PDA),将其引入结合相的梯度扩散薄膜(SiO_(2)@PDA-DGT)装置,测试装置在不同水体中的适用条件并探索测定生物有效态Cr(Ⅵ)的可行性。结果表明,SiO_(2)@PDA-DGT装置对Cr(Ⅵ)具有较强的选择性吸附和积累能力;在含有高浓度Cr(Ⅲ)的水样〔C_(Cr(Ⅵ))∶C_(Cr(Ⅲ))=1∶10〕中,能实现对Cr(Ⅵ)的精准选择性测定(R=C_(DGT)/C_(soln)=1.03);在pH值为5.0~7.0、离子强度为0.1~800 mmol·L^(-1)范围内,能够准确测定水体中生物有效态Cr(Ⅵ);设定条件下,对Cr(Ⅵ)的最大有效吸附容量为100 mg·L^(-1),空白值为2.43μg·L^(-1),方法检出限为0.49μg·L^(-1),Cr(Ⅵ)的扩散系数D_(cell)为6.70×10^(-6) cm^(2)·s^(-1);综合比较已报道的同类装置,SiO_(2)@PDA-DGT装置具有原位检测优势,且在不同环境中均表现出较高的稳定性,具备广泛的应用潜力。 展开更多
关键词 Cr(Ⅵ) SiO_(2)@pda复合材料 薄膜扩散梯度技术(DGT) 原位检测 生物有效态
在线阅读 下载PDF
PLA/BTO@PDA压电复合膜的制备及性能研究
3
作者 李渝佳 田秀枝 +3 位作者 刘沛廷 侯恩凤 李明琴 蒋学 《材料导报》 北大核心 2026年第4期196-201,共6页
高压电系数钛酸钡(BTO)纳米粒子与聚乳酸(PLA)复合制备的静电纺丝纤维膜能够显著提升PLA膜的压电性能。然而,BTO在PLA基体中易聚集、引发相分离,进而影响PLA/BTO复合膜的压电与力学性能。本工作采用聚多巴胺(PDA)对BTO进行修饰(BTO@PDA... 高压电系数钛酸钡(BTO)纳米粒子与聚乳酸(PLA)复合制备的静电纺丝纤维膜能够显著提升PLA膜的压电性能。然而,BTO在PLA基体中易聚集、引发相分离,进而影响PLA/BTO复合膜的压电与力学性能。本工作采用聚多巴胺(PDA)对BTO进行修饰(BTO@PDA)并与PLA共混以制备PLA/BTO@PDA的静电纺丝复合纤维膜。研究表明,BTO@PDA在PLA基体中的分散性和与PLA基体的界面相容性均好于未用PDA修饰的BTO,明显提升了PLA/BTO@PDA复合膜的压电与力学性能。掺杂3%(质量分数,余同)的BTO@PDA时,PLA/BTO@PDA复合膜压电与力学性能达到最佳值,压电电流、电压输出分别是PLA/BTO复合膜的1.37倍、1.55倍,是纯PLA膜的8.59倍、7.63倍;外部负载电阻为30 MΩ时,输出功率达到最大值;拉伸断裂强度、拉伸断裂伸长率分别是PLA/BTO复合膜的1.42倍、1.18倍。PLA/BTO@PDA复合膜器件循环撞击-释放4000 s产生的脉冲交变电流不衰减,满足长期稳定工作的需求。作为传感器,PLA/BTO@PDA膜可附着在人体多个部位,实现手指按压/弯曲、走路/跑步等运动模式的灵敏识别和监测,还可使红色发光二极管(LED)发光,在运动可穿戴传感器领域拥有广泛潜力。 展开更多
关键词 聚多巴胺(pda) 钛酸钡(BTO) 聚乳酸(PLA) 静电纺丝 压电性能
在线阅读 下载PDF
Adaptive Simulation Backdoor Attack Based on Federated Learning
4
作者 SHI Xiujin XIA Kaixiong +3 位作者 YAN Guoying TAN Xuan SUN Yanxu ZHU Xiaolong 《Journal of Donghua University(English Edition)》 2026年第1期50-58,共9页
In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mec... In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mechanisms during aggregation,it is difficult to conduct effective backdoor attacks.In addition,existing backdoor attack methods are faced with challenges,such as low backdoor accuracy,poor ability to evade anomaly detection,and unstable model training.To address these challenges,a method called adaptive simulation backdoor attack(ASBA)is proposed.Specifically,ASBA improves the stability of model training by manipulating the local training process and using an adaptive mechanism,the ability of the malicious model to evade anomaly detection by combing large simulation training and clipping,and the backdoor accuracy by introducing a stimulus model to amplify the impact of the backdoor in the global model.Extensive comparative experiments under five advanced defense scenarios show that ASBA can effectively evade anomaly detection and achieve high backdoor accuracy in the global model.Furthermore,it exhibits excellent stability and effectiveness after multiple rounds of attacks,outperforming state-of-the-art backdoor attack methods. 展开更多
关键词 federated learning backdoor attack PRIVACY adaptive attack SIMULATION
在线阅读 下载PDF
CASBA:Capability-Adaptive Shadow Backdoor Attack against Federated Learning
5
作者 Hongwei Wu Guojian Li +2 位作者 Hanyun Zhang Zi Ye Chao Ma 《Computers, Materials & Continua》 2026年第3期1139-1163,共25页
Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global... Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global model through compromised updates,posing significant threats to model integrity and becoming a key focus in FL security.Existing backdoor attack methods typically embed triggers directly into original images and consider only data heterogeneity,resulting in limited stealth and adaptability.To address the heterogeneity of malicious client devices,this paper proposes a novel backdoor attack method named Capability-Adaptive Shadow Backdoor Attack(CASBA).By incorporating measurements of clients’computational and communication capabilities,CASBA employs a dynamic hierarchical attack strategy that adaptively aligns attack intensity with available resources.Furthermore,an improved deep convolutional generative adversarial network(DCGAN)is integrated into the attack pipeline to embed triggers without modifying original data,significantly enhancing stealthiness.Comparative experiments with Shadow Backdoor Attack(SBA)across multiple scenarios demonstrate that CASBA dynamically adjusts resource consumption based on device capabilities,reducing average memory usage per iteration by 5.8%.CASBA improves resource efficiency while keeping the drop in attack success rate within 3%.Additionally,the effectiveness of CASBA against three robust FL algorithms is also validated. 展开更多
关键词 Federated learning backdoor attack generative adversarial network adaptive attack strategy distributed machine learning
在线阅读 下载PDF
PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs
6
作者 Abeer Alhuzali Qamar Al-Qahtani +2 位作者 Asmaa Niyazi Lama Alshehri Fatemah Alharbi 《Computers, Materials & Continua》 2026年第1期2194-2212,共19页
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra... The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies. 展开更多
关键词 Smishing attack detection phishing attacks ensemble learning CYBERSECURITY deep learning transformer-based models large language models
在线阅读 下载PDF
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
7
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
A Novel Unsupervised Structural Attack and Defense for Graph Classification
8
作者 Yadong Wang Zhiwei Zhang +2 位作者 Pengpeng Qiao Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第1期1761-1782,共22页
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev... Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations. 展开更多
关键词 Graph classification graph neural networks adversarial attack
在线阅读 下载PDF
AdvYOLO:An Improved Cross-Conv-Block Feature Fusion-Based YOLO Network for Transferable Adversarial Attacks on ORSIs Object Detection
9
作者 Leyu Dai Jindong Wang +2 位作者 Ming Zhou Song Guo Hengwei Zhang 《Computers, Materials & Continua》 2026年第4期767-792,共26页
In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free... In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions. 展开更多
关键词 Remote sensing object detection transferable adversarial attack feature fusion cross-conv-block
在线阅读 下载PDF
Prompt Injection Attacks on Large Language Models:A Survey of Attack Methods,Root Causes,and Defense Strategies
10
作者 Tongcheng Geng Zhiyuan Xu +1 位作者 Yubin Qu W.Eric Wong 《Computers, Materials & Continua》 2026年第4期134-185,共52页
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man... Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs. 展开更多
关键词 Prompt injection attacks large language models defense mechanisms security evaluation
在线阅读 下载PDF
Recent Advances in Deep-Learning Side-Channel Attacks on AES Implementations
11
作者 Junnian Wang Xiaoxia Wang +3 位作者 Zexin Luo Qixiang Ouyang Chao Zhou Huanyu Wang 《Computers, Materials & Continua》 2026年第4期95-133,共39页
Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attracti... Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attractive victims for themalicious actions of adversaries.Within the spectrumof existing threats,Side-ChannelAttacks(SCAs)have established themselves as an effective way to compromise cryptographic implementations.These attacks exploit unintended,unintended physical leakage that occurs during the cryptographic execution of devices,bypassing the theoretical strength of the crypto design.In recent times,the advancement of deep learning has provided SCAs with a powerful ally.Well-trained deep-learningmodels demonstrate an exceptional capacity to identify correlations between side-channel measurements and sensitive data,thereby significantly enhancing such attacks.To further understand the security threats posed by deep-learning SCAs and to aid in formulating robust countermeasures in the future,this paper undertakes an exhaustive investigation of leading-edge SCAs targeting Advanced Encryption Standard(AES)implementations.The study specifically focuses on attacks that exploit power consumption and electromagnetic(EM)emissions as primary leakage sources,systematically evaluating the extent to which diverse deep learning techniques enhance SCAs acrossmultiple critical dimensions.These dimensions include:(i)the characteristics of publicly available datasets derived from various hardware and software platforms;(ii)the formalization of leakage models tailored to different attack scenarios;(iii)the architectural suitability and performance of state-of-the-art deep learning models.Furthermore,the survey provides a systematic synthesis of current research findings,identifies significant unresolved issues in the existing literature and suggests promising directions for future work,including cross-device attack transferability and the impact of quantum-classical hybrid computing on side-channel security. 展开更多
关键词 Side-channel attacks deep learning advanced encryption standard power analysis EM analysis
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
12
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
13
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Analysis and Defense of Attack Risks under High Penetration of Distributed Energy
14
作者 Boda Zhang Fuhua Luo +3 位作者 Yunhao Yu Chameiling Di Ruibin Wen Fei Chen 《Energy Engineering》 2026年第2期206-228,共23页
The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems(CPDS).While enabling advanced functionalities,the tight interdependence between cyber and phy... The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems(CPDS).While enabling advanced functionalities,the tight interdependence between cyber and physical layers introduces significant security challenges and amplifies operational risks.To address these critical issues,this paper proposes a comprehensive risk assessment framework that explicitly incorporates the physical dependence of information systems.A Bayesian attack graph is employed to quantitatively evaluate the likelihood of successful cyber attacks.By analyzing the critical scenario of fault current path misjudgment,we define novel system-level and node-level risk coupling indices to preciselymeasure the cascading impacts across cyber and physical domains.Furthermore,an attack-responsive power recovery optimization model is established,integrating DistFlowbased physical constraints and sophisticated modeling of information-dependent interference.To enhance resilience against varying attack scenarios,a defense resource allocation model is constructed,where the complex Mixed-Integer Nonlinear Programming(MINLP)problem is efficiently linearized into a Mixed-Integer Linear Programming(MILP)formulation.Finally,to mitigate the impact of targeted attacks,the optimal deployment of terminal defense resources is determined using a Stackelberg game-theoretic approach,aiming to minimize overall system risk.The robustness and effectiveness of the proposed integrated framework are rigorously validated through extensive simulations under diverse attack intensities and defense resource constraints. 展开更多
关键词 CPDS cyber-physical interdependence Bayesian attack graph Stackelberg game risk assessment framework power recovery resource allocation
在线阅读 下载PDF
An Overall Optimization Model Using Metaheuristic Algorithms for the CNN-Based IoT Attack Detection Problem
15
作者 Le Thi Hong Van Le Duc Thuan +1 位作者 Pham Van Huong Nguyen Hieu Minh 《Computers, Materials & Continua》 2026年第4期1934-1964,共31页
Optimizing convolutional neural networks(CNNs)for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy.This study proposes a unified... Optimizing convolutional neural networks(CNNs)for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy.This study proposes a unified and flexible optimization framework that leverages metaheuristic algorithms to automatically optimize CNN configurations for IoT attack detection.Unlike conventional single-objective approaches,the proposed method formulates a global multi-objective fitness function that integrates accuracy,precision,recall,and model size(speed/model complexity penalty)with adjustable weights.This design enables both single-objective and weightedsum multi-objective optimization,allowing adaptive selection of optimal CNN configurations for diverse deployment requirements.Two representativemetaheuristic algorithms,GeneticAlgorithm(GA)and Particle Swarm Optimization(PSO),are employed to optimize CNNhyperparameters and structure.At each generation/iteration,the best configuration is selected as themost balanced solution across optimization objectives,i.e.,the one achieving themaximum value of the global objective function.Experimental validation on two benchmark datasets,Edge-IIoT and CIC-IoT2023,demonstrates that the proposed GA-and PSO-based models significantly enhance detection accuracy(94.8%–98.3%)and generalization compared with manually tuned CNN configurations,while maintaining compact architectures.The results confirm that the multi-objective framework effectively balances predictive performance and computational efficiency.This work establishes a generalizable and adaptive optimization strategy for deep learning-based IoT attack detection and provides a foundation for future hybrid metaheuristic extensions in broader IoT security applications. 展开更多
关键词 Genetic algorithm(GA) particle swarm optimization(PSO) multi-objective optimization convolutional neural network—CNN IoT attack detection metaheuristic optimization CNN configuration
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
16
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
UPLC-PDA法同时测定舒肝平胃丸中8种成分的含量
17
作者 陈帅 李舒曼 +1 位作者 张吉波 王慧竹 《中成药》 北大核心 2025年第10期3196-3199,共4页
目的建立UPLC-PDA法同时测定舒肝平胃丸中甘草苷、异甘草苷、甘草素、异甘草素、柚皮苷、橙皮苷、新橙皮苷、和厚朴酚的含量。方法分析采用ACQUITY UPLC HSS T3色谱柱(2.1 mm×100 mm,1.8μm);流动相乙腈-0.2%甲酸,梯度洗脱;体积流... 目的建立UPLC-PDA法同时测定舒肝平胃丸中甘草苷、异甘草苷、甘草素、异甘草素、柚皮苷、橙皮苷、新橙皮苷、和厚朴酚的含量。方法分析采用ACQUITY UPLC HSS T3色谱柱(2.1 mm×100 mm,1.8μm);流动相乙腈-0.2%甲酸,梯度洗脱;体积流量0.4 mL/min;柱温38℃;检测波长276、283、294、361、371 nm。结果8种成分在各自范围内线性关系良好(r>0.9990),平均加样回收率96.87%~108.46%,RSD 1.06%~1.79%。结论该方法专属性强,准确度高,重复性好,可用于舒肝平胃丸的质量控制。 展开更多
关键词 舒肝平胃丸 化学成分 含量测定 UPLC-pda
暂未订购
医疗失效模式和效应分析对提高临床护理人员用药过程中PDA扫码率的效果
18
作者 李红 孟小转 +2 位作者 郑晓红 王爱华 李红 《医疗装备》 2025年第9期54-56,共3页
目的分析医疗失效模式和效应分析(HFMEA)对提高临床护理人员用药过程中个人数字助理(PDA)扫码率的效果。方法选取2023年1月至3月医院实施HFMEA前PDA扫码率作为对照组,2023年4月至11月实施HFMEA后PDA扫码率为观察组,采用HFMEA对护士用药... 目的分析医疗失效模式和效应分析(HFMEA)对提高临床护理人员用药过程中个人数字助理(PDA)扫码率的效果。方法选取2023年1月至3月医院实施HFMEA前PDA扫码率作为对照组,2023年4月至11月实施HFMEA后PDA扫码率为观察组,采用HFMEA对护士用药过程中PDA扫码流程存在的失效模式进行风险评估,对失效模式进行有效的分析和整改,比较两组PDA扫码率及用药错误不良事件情况。结果观察组每月PDA扫码率均高于对照组,用药错误不良事件发生率低于对照组(P<0.05)。结论HFMEA模式可有效提高护士用药PDA扫码率,规范护士用药PDA扫码流程,避免用药差错,确保患者用药安全。 展开更多
关键词 失效模式与效应分析 临床护理人员 临床用药 pda扫码率
暂未订购
甘油法、砂土法及PDA斜面法保藏虫生真菌效果比较 被引量:1
19
作者 何凤婷 区翠仪 +3 位作者 何广位 张珂 胡琼波 翁群芳 《广东农业科学》 2025年第1期81-94,共14页
【目的】虫生真菌在传代过程中易发生菌种退化和活性降低等现象,选择适宜的菌种保藏方法是减少实验室菌种传代的重要措施。【方法】采用PDA斜面法、砂土法和甘油法3种不同的保藏方法,对13种共18株虫生真菌菌株进行为期3、6、12个月的保... 【目的】虫生真菌在传代过程中易发生菌种退化和活性降低等现象,选择适宜的菌种保藏方法是减少实验室菌种传代的重要措施。【方法】采用PDA斜面法、砂土法和甘油法3种不同的保藏方法,对13种共18株虫生真菌菌株进行为期3、6、12个月的保藏,通过观察菌株复活效果,检测菌丝生长速率、脱氢酶活性及菌株产孢量,比较3种不同保藏方法的保藏效果。【结果】保藏期为3个月时,除砂土保藏的个别菌株外,3种方法的保藏效果均良好,其中PDA斜面法保藏表现更佳,所有保藏的菌株菌丝长势良好、色泽正常,有15个菌株的菌丝生长速率、脱氢酶活性和12个菌株的产孢量高于其他保藏方法。保藏期为6个月时,甘油法的保藏效果更佳,14个菌株的菌丝生长速率、15个菌株的产孢量和18个菌株的菌丝长势优于其他保藏方法;除斜面法中6个菌株色泽发生变化外,其余菌株色泽无变化;在脱氢酶活性方面,有9个菌株在砂土保藏法中呈现的效果最好。保藏期为12个月时,甘油法的保藏效果最好,其菌落色泽、菌丝生长速率及产孢量等指标均与保藏3个月时变化不大;砂土法的保藏效果次之,但对罗伯茨绿僵菌(Metarhizium robertsii)MrGX0603、球孢白僵菌(Beauveria bassiana)BbGX7303、淡紫紫孢菌(Purpureocillium lilacinum)PiGX0201、环链虫草(Cordyceps cateniannulata)CcGX32S01及玫烟色虫草(C.fumosorosea)CfGX4206表现出较好的保藏效果,其菌丝脱氢酶活性较高,OD490分别为1.18、1.17、1.13、1.12、1.27,产孢量也较好,分别为53.50×10^(6)、52.23×10^(6)、62.00×10^(6)、54.21×10^(6)、53.79×10^(6)孢子/cm^(2),且菌株的菌丝生长速率、脱氢酶活性、产孢量下降的幅度较小;PDA斜面法的保藏效果最差,保藏的18株菌种活力指标下降明显。【结论】当保藏方法与保藏时间相同时,不同菌种的保藏效果表现出明显差异。可根据菌种特性和保藏期限选择不同的保藏方法,PDA斜面法最适用于3个月左右的短期保藏;甘油在保藏期为1年时保藏效果最好;而砂土法更适合保藏产孢量大于50×10^(6)孢子/cm^(2)的菌株。 展开更多
关键词 虫生真菌 菌种保藏 保藏时间 pda斜面 甘油 砂土
在线阅读 下载PDF
生物医用MgZn合金表面PDA/HA复合涂层制备及性能 被引量:1
20
作者 于迎雪 张倩倩 《特种铸造及有色合金》 北大核心 2025年第2期252-256,共5页
采用水热法在Mg-2Zn-0.5Nd-1Y-0.5Zr镁合金表面制备羟基磷灰石涂层(HA),然后,利用水浴加热法在其表面制备聚多巴胺(PDA)/HA复合涂层。水热处理后获得的HA单膜层组织,表面涂层较稀松,涂层间存在较大的空隙,经PDA涂层预处理得到的PDA/HA... 采用水热法在Mg-2Zn-0.5Nd-1Y-0.5Zr镁合金表面制备羟基磷灰石涂层(HA),然后,利用水浴加热法在其表面制备聚多巴胺(PDA)/HA复合涂层。水热处理后获得的HA单膜层组织,表面涂层较稀松,涂层间存在较大的空隙,经PDA涂层预处理得到的PDA/HA复合涂层,表面为均匀的交叉密布的细小片状结构,显示出完整致密的结构。通过浸泡试验计算腐蚀速率,采用OM分析合金的微观组织,探究含涂层稀土镁合金的腐蚀行为和机理,并评价涂层的保护效率。结果表明,PDA/HA复合涂层较单一HA涂层合金展现出了更好的耐腐蚀性,起到了较好的保护作用。在100℃、4 h下制备的PDA/HA复合涂层的试样综合性能最佳,腐蚀电压为0.06382 V,腐蚀电流密度为8.166×10^(−7)A/cm^(2)。 展开更多
关键词 镁合金 pda/HA复合涂层 耐腐蚀性能
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部