期刊文献+
共找到618篇文章
< 1 2 31 >
每页显示 20 50 100
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:16
1
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
A CALCULATING METHOD OF THE KILL PROBABILITY ATTACK AREA FOR AAM 被引量:1
2
作者 Li Ting-jie, Liu Run-quan and Wang Chao-zhiBeijing University of Aeronautics and Astronautics Zhu Gu-xiang and Wang Li-zhen014 Center of Ministry of Aeronautics and Astronautics 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1991年第4期339-346,共8页
This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained... This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method. 展开更多
关键词 A CALCULATING method OF THE KILL PROBABILITY attack AREA FOR AAM area
在线阅读 下载PDF
Introduction of firefighting methods in U.S. underground mines 被引量:1
3
作者 ZHANG Xi-chen ZHANG Yu-tao Jerry C. Tien 《西安科技大学学报》 CAS 北大核心 2011年第6期672-678,697,共8页
Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and ex... Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and extinguishing fires in underground mine have long been studied and there have been significant improvements.In order to know clearly about the firefighting technology used,this paper summarizes most of the underground mine firefighting methods used in the United States the past 150 years.This paper describes not only the accepted firefighting theories,but also the technologies,both direct and indirect attacking,in accordance to regulations or codes,with special attention is given to the indirect attack method and its related technologies.Further research needed is also briefly discussed at the end of this paper. 展开更多
关键词 FIREFIGHTING extinguishing agent attack method remote sealing
在线阅读 下载PDF
拆分学习系统的隐私攻击和防御技术综述
4
作者 刘雅欣 王鹃 +5 位作者 杨梦达 李子昂 易文哲 徐枭洋 陈美会 韦韬 《计算机研究与发展》 北大核心 2026年第3期710-734,共25页
拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数... 拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数据隐私,同时缓解了模型端侧运行的计算负荷。随着拆分学习技术在多个领域的广泛应用,针对拆分学习系统的各种隐私攻击也层出不穷,攻击者能利用中间特征和分割层的梯度等中间信息重构出用户隐私数据或者推断出其隐私信息,严重危及数据的隐私性。目前,学术界尚缺乏针对拆分学习研究成果的系统性、全面性综述,部分研究将其与联邦学习技术混淆,或总结不够详尽具体。因此,为填补这一空白,需全面总结拆分学习的相关攻击与防御技术,为后续研究发展提供指导。首先介绍拆分学习技术的定义以及其训练和推理过程,并对其多种扩展架构进行概述。随后分析拆分学习系统的威胁模型,并针对拆分学习系统的重构攻击和属性推理、成员推理、标签推理等推理攻击的基本概念、实施阶段和现有方案进行总结归纳。接着总结相应的防御技术,包括异常检测、正则化防御、噪声混淆、对抗性表征学习、特征裁剪等方法。最后探讨拆分学习中隐私安全问题的研究挑战和未来研究方向。 展开更多
关键词 拆分学习 数据隐私 重构攻击 推理攻击 防御方法
在线阅读 下载PDF
Multiple attacks on virtualization-based security monitoring
5
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 VIRTUALIZATION VULNERABILITY attack method security threat virtual machine monitor
在线阅读 下载PDF
基于BiTCN的无人机指挥控制链路DoS攻击检测方法
6
作者 赵长啸 方玉麟 汪克念 《航空学报》 北大核心 2026年第1期249-265,共17页
无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)... 无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)的攻击检测方法,基于网络数据与物理数据的信息特征融合构建检测数据集,通过时间戳对齐与前向填充,解决网络与物理数据的异步问题;实验基于完整数据集和数据缺失率为5%、15%、30%、40%、50%的数据集展开,利用BiTCN模型通过双向机制捕捉数据的前后文信息,完成特征提取和分类,实现对DoS攻击的检测。将所提方法在真实无人机攻击数据集上进行验证,结果表明:与纯网络数据和纯物理数据检测模型相比,该方法准确率(97.8%)、召回率(95.9%)、F1分数(97.8%)和AUC(0.997)均优于单一维度数据检测模型;与传统FNN、1D-CNN、LSTM、GRU检测模型相比,即使在40%的数据缺失情况下,所提方法仍能保持较高检测精度。 展开更多
关键词 无人机C2链路 DOS攻击检测 双向时间卷积网络 网络数据与物理数据融合 攻击检测方法
原文传递
基于噪声能量检测音频对抗样本
7
作者 冯燕茹 李靖 《计算机应用与软件》 北大核心 2026年第1期210-215,共6页
针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型... 针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型Noise-Energy。实验表明,Noise-Energy模型对CW攻击的检测准确率达到99.5%,对其他多种攻击的准确率均超过98%,表现出较强的鲁棒性和良好的泛化性。 展开更多
关键词 对抗样本 自动语音识别 噪声能量 检测方法
在线阅读 下载PDF
吴勉华教授基于以毒攻毒法应用虫类药治疗慢性癌性疼痛经验
8
作者 朱恒舟 俞心河 +2 位作者 吴艳 杜婉莹 李文婷 《南京中医药大学学报》 北大核心 2026年第2期307-314,共8页
慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽... 慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽固性疼痛。本文从吴勉华教授基于癌毒理论对慢性癌性疼痛的认识出发,探讨以毒攻毒法的理论内涵、作用机制、慢性癌痛的病机特点及辨治原则,并依据癌毒伴随病理因素不同,根据癌性疼痛痰毒、郁毒、瘀毒、虚毒核心病机,选择相应的虫类药物进行治疗。通过系统总结以毒攻毒法运用虫类药的实践经验,进一步拓宽癌毒理论在癌性疼痛治疗中的应用范畴,为中医药干预癌性疼痛提供新的思路与方法。 展开更多
关键词 癌毒理论 以毒攻毒法 虫类药 慢性癌性疼痛 痛证 名医经验 吴勉华
暂未订购
云端存储数据未知密钥共享攻击忆阻神经网络检测方法
9
作者 徐小林 王轶群 李春辉 《微型电脑应用》 2026年第1期230-234,共5页
针对云端存储数据在访问与传输过程中面临的未知秘钥共享攻击威胁,提出一种忆阻神经网络检测方法。利用数据转化系统,将云端数据格式化为忆阻神经网络可处理的输入,并利用忆阻器的忆阻突触权值计算与尖峰时间依赖可塑性(STDP)学习规则... 针对云端存储数据在访问与传输过程中面临的未知秘钥共享攻击威胁,提出一种忆阻神经网络检测方法。利用数据转化系统,将云端数据格式化为忆阻神经网络可处理的输入,并利用忆阻器的忆阻突触权值计算与尖峰时间依赖可塑性(STDP)学习规则动态调整,模拟生物神经系统的复杂行为,精准捕捉数据受攻击时的特征模式。构建忆阻神经网络中的十字交叉阵列卷积结构,结合不断优化的突触权值更新卷积核,迭代强化检测能力。实验结果显示,所提出的方法在检测未知秘钥共享攻击时,实现了低遗漏率与低误报率(均小于5次),在待检测数据总数量最大为3000个时,所提出的方法的遗漏率为0.17%,误报率为0.10%。因此,所提出的方法有效降低了检测未知密钥共享攻击的遗漏率和误报率,并提高了检测精度,为云端存储数据的安全传输提供了强有力的技术保障。 展开更多
关键词 云端存储数据 未知密钥共享攻击 忆阻神经网络 攻击检测方法
在线阅读 下载PDF
基于声固耦合法的水翼结构模态特性研究
10
作者 王薇 敬若玺 +3 位作者 曾柯烨 刘铠华 夏翔 张尚弘 《农业机械学报》 北大核心 2026年第3期261-269,305,共10页
模态特性分析是进行水力机械设计的关键环节,当水力激励特性与结构的固有模态契合时,可能导致强烈共振,威胁电站的安全稳定运行。以叶轮的简化模型——水翼为研究对象,采用声固耦合法分析了水翼的干湿模态特性,探究了不同攻角和尾部修... 模态特性分析是进行水力机械设计的关键环节,当水力激励特性与结构的固有模态契合时,可能导致强烈共振,威胁电站的安全稳定运行。以叶轮的简化模型——水翼为研究对象,采用声固耦合法分析了水翼的干湿模态特性,探究了不同攻角和尾部修型下水翼的模态特性。研究发现,附加质量作用下水翼固有频率大幅度降低,湿模态振型也发生显著变化。攻角线性变化时,水翼固有频率呈现非线性变化趋势,2°攻角下频率最大。攻角增大到10°和15°,水翼固有频率会明显下降,15°时频率最小。攻角变化对水翼前4阶模态的展向模态位移和扭转模态的弦向模态位移影响较小,弯曲模态f_(s1)和f_(s3)的弦向模态位移差异性会增大。尾缘修型情况下,水翼固有频率会增加,30°修型对应的频率最大。尾缘修型对水翼尾缘的变形作用明显,抑制f_(s1)和f_(s3)的弯曲变形,模态位移变化范围明显减小。而且扭转模态f_(s2)、f_(s4)尾缘的弦向模态位移和f_(s3)展向模态位移出现小幅度减小。 展开更多
关键词 水翼 模态特性 攻角 尾缘修型 声固耦合法
在线阅读 下载PDF
基于非定常涡格-涡粒子的开式转子气动噪声预测方法研究
11
作者 陈南树 刘汉儒 +2 位作者 朱磊 贺象 王掩刚 《推进技术》 北大核心 2026年第1期98-115,共18页
开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三... 开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三维普朗特-葛劳渥法则,进行可压缩性修正。针对NASA(National Aeronautics and Space Administration)SR-7A单排开式转子的起飞工况进行了验证计算,气动结果与NASA试验值和商业软件计算值的误差均小于1%,主要单音噪声与总声压级指向性结果预测误差可低至1 dB以内。在同等研究对象和硬件条件下,本文方法计算所需CPU核时低于通用URANS(Unsteady Reynolds-Averaged Navier-Stokes)计算所需的1%。考虑起飞迎角下的周向不均匀来流畸变,系统研究了SR-7A单排转子在0°~20°来流迎角下的气动参数和噪声特性。结果表明,随着来流迎角的增大,转子的时均推力、功率、效率呈现指数增长趋势,转子桨盘内载荷时均值呈现线性增长趋势。转子各项载荷的非定常波动幅值随着迎角的增大而增加。单个叶片的载荷波动峰谷值与运动相位相比存在17°~56°的相位滞后现象,这与噪声周向指向性结果中的偏转非常相关。在0°~20°迎角内,转子上方总声压级从107 dB降低至99 dB,转子下方位置总声压级从107 dB升高至114 dB。此外,来流迎角与桨盘的相互作用会额外导致最高达73 dB的轴频率单音噪声。针对单排转子的噪声源项解耦分析表明,来流迎角对非定常载荷噪声的增益作用非常显著。本文开发的方法可以用较低成本得到开式转子的非定常气动及噪声特性,并且具备多角度的噪声源解耦能力,为未来低噪声开式转子设计提供了有力工具。 展开更多
关键词 开式转子 非定常涡格法 涡粒子法 气动噪声 起飞迎角
原文传递
虚假数据注入攻击下直流微电网分布式弹性控制
12
作者 邰源政 孟范伟 张煜 《东北大学学报(自然科学版)》 北大核心 2026年第1期67-74,81,共9页
针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过... 针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过Lyapunov稳定理论证明了直流微电网在受到任意常值虚假数据注入攻击时均能保证正常稳定运行,实现电压调控和电流分配2个控制目标.利用MATLAB/Simulink搭建了仿真模型,验证了该控制方法的有效性. 展开更多
关键词 直流微电网 虚假数据注入攻击 分布式二次控制 弹性控制方法 电压调控 电流分配
在线阅读 下载PDF
Access Control Attacks on PLC Vulnerabilities
13
作者 Yong Wang Jinyong Liu +3 位作者 Can Yang Lin Zhou Shuangfei Li Zhaoyan Xu 《Journal of Computer and Communications》 2018年第11期311-325,共15页
In Industrial Control Systems (ICS), security issues are getting more and more attention. The number of hacking attacks per year is endless, and the attacks on industrial control systems are numerous. Programmable Log... In Industrial Control Systems (ICS), security issues are getting more and more attention. The number of hacking attacks per year is endless, and the attacks on industrial control systems are numerous. Programmable Logic Controller (PLC) is one of the main controllers of industrial processes. Since the industrial control system network is isolated from the external network, many people think that PLC is a safety device. However, virus attacks in recent years, such as Stuxnet, have confirmed the erroneousness of this idea. In this paper, we use the vulnerability of Siemens PLC to carry out a series of attacks, such as S7-200, S7-300, S7-400, S7-1200 and so on. We read the data from the PLC output and then rewrite the data and write it to the PLC. We tamper with the writing of data to achieve communication chaos. When we attack the primary station, all slave devices connected to the primary station will be in a state of communication confusion. The attack methods of us can cause delay or even loss of data in the communications from the Phasor Data Concentrator (PMU) to the data concentrator. The most important thing is that our attack method generates small traffic and short attack time, which is difficult to be identified by traditional detection methods. 展开更多
关键词 ICS PLC PMU Data Tampering Delay attack methods
暂未订购
COMPUTATION OF FIELD STRUCTURE AND AERODYNAMIC CHARACTERISTICS OF DELTA WINGS AT HIGH ANGLES OF ATTACK
14
作者 杨立芝 高正红 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2005年第6期797-806,共10页
A numerical investigation of the structure of the vortical flowfield over delta wings at high angles of attack in longitudinal and with small sideslip angle is presented. Three-dimensional Navier-Stokes numerical simu... A numerical investigation of the structure of the vortical flowfield over delta wings at high angles of attack in longitudinal and with small sideslip angle is presented. Three-dimensional Navier-Stokes numerical simulations were carried out to predict the complex leeward-side flowfield characteristics that are dominated by the effect of the breakdown of the leading-edge vortices. The methods that analyze the flowfield structure quantitatively were given by using flowfield data from the computational results. In the region before the vortex breakdown, the vortex axes are approximated as being straight line. As the angle of attack increases, the vortex axes are closer to the root chord, and farther away from the wing surface. Along the vortex axes, as the adverse pressure gradients occur, the axial velocity decreases, that is, A is negativee, so the vortex is unstable, and it is possible to breakdown. The occurrence of the breakdown results in the instability of lateral motion for a delta wing, and the lateral moment diverges after a small perturbation occurs at high angles of attack. However, after a critical angle of attack is reached the vortices breakdown completely at the wing apex, and the instability resulting from the vortex breakdown disappears. 展开更多
关键词 computational method high angle of attack vortex flow
在线阅读 下载PDF
Improvements in a Puzzle Authentication Method
15
作者 Yutaka Hirakawa Ayaka Shimoda +1 位作者 Isao Sasano Kazuo Ohzeki 《Journal of Computer and Communications》 2018年第1期12-20,共9页
This article discusses improvements in a puzzle authentication method that adopts the interface of the Puzzle and Dragons game [1] and is tolerant against video-recording attacks. A problem that the conventional puzzl... This article discusses improvements in a puzzle authentication method that adopts the interface of the Puzzle and Dragons game [1] and is tolerant against video-recording attacks. A problem that the conventional puzzle authentication methods face is that they are time consuming and have low success rate in authentication. We evaluated improvements of the interface to verify the usability of the improved system. The results suggested that the usability in terms of operation time and authentication success rate attained a level that was comparable with other leading methods in the field. 展开更多
关键词 AUTHENTICATION method Vibration Video-Recording attack
暂未订购
初始损伤喷射混凝土复合盐侵蚀性能及机理 被引量:1
16
作者 潘慧敏 张昊 +2 位作者 王占峰 王帅 赵庆新 《应用基础与工程科学学报》 北大核心 2025年第2期572-584,共13页
为了探究含初始损伤缺陷的喷射混凝土受复合盐侵蚀性能,采用半浸泡和全浸泡两种方式对初始损伤喷射混凝土进行长期自然侵蚀试验,系统研究了初始损伤、浸泡方式和侵蚀盐种类对喷射混凝土自由氯离子浓度、宏观性能和微观结构的影响,分析... 为了探究含初始损伤缺陷的喷射混凝土受复合盐侵蚀性能,采用半浸泡和全浸泡两种方式对初始损伤喷射混凝土进行长期自然侵蚀试验,系统研究了初始损伤、浸泡方式和侵蚀盐种类对喷射混凝土自由氯离子浓度、宏观性能和微观结构的影响,分析了影响机理,并建立了初始损伤喷射混凝土侵蚀损伤演化模型.研究结果表明:初始损伤对喷射混凝土受盐侵蚀劣化过程产生了不同程度的影响.初始损伤度越大,试件同一测试深度处的自由氯离子浓度越高,受侵蚀过程中质量和相对动弹模量变化越明显,试件腐蚀程度越严重.低于0.14的初始损伤对喷射混凝土侵蚀损伤劣化过程影响较小,超过0.21的初始损伤则使喷射混凝土侵蚀劣化速度显著加快.经历180d单一盐和复合盐半浸泡侵蚀后,初始损伤为0.30的试件质量分别降低4.55%和3.82%,相对动弹模量分别降至0.39和0.53,试件表面产生了明显损伤开裂,边角出现成块脱落.初始损伤程度相同时,半浸泡作用、单一硫酸盐侵蚀对喷射混凝土的破坏程度要高于全浸泡、复合盐侵蚀.将侵蚀损伤因子表示为侵蚀龄期的指数函数,所得到的喷射混凝土损伤模型曲线与试验值吻合度较高,拟合相关系数超过0.97.SEM-EDS和XRD分析显示,受盐侵蚀后初始损伤试件内部钙矾石晶体分布更加密集,晶体衍射峰高度明显高于基准组,初始损伤的存在增加了盐溶液的侵入通道.受复合盐侵蚀的喷射混凝土XRD图谱中出现了Friedel盐晶体衍射峰,且钙矾石晶体衍射峰明显低于单一硫酸盐侵蚀组,复合盐溶液中Cl^(-)的存在减缓了SO_(4)^(2-)的扩散速度. 展开更多
关键词 喷射混凝土 初始损伤 复合盐侵蚀 自由氯离子 浸泡方式 劣化机理 损伤演化模型
原文传递
智能网联汽车自动驾驶安全:威胁、攻击与防护 被引量:7
17
作者 郗来乐 林声浩 +4 位作者 王震 谢天鸽 孙玉砚 朱红松 孙利民 《软件学报》 北大核心 2025年第4期1859-1880,共22页
智能网联汽车在国家发展战略中占有重要地位,是关系汽车产业革新、大国核心竞争力的关键技术,自动驾驶是智能网联汽车发展的最终目标,智能网联汽车自动驾驶(以下称“自动驾驶汽车”)的安全问题直接影响人民生命财产安全、国家公共安全,... 智能网联汽车在国家发展战略中占有重要地位,是关系汽车产业革新、大国核心竞争力的关键技术,自动驾驶是智能网联汽车发展的最终目标,智能网联汽车自动驾驶(以下称“自动驾驶汽车”)的安全问题直接影响人民生命财产安全、国家公共安全,但目前还缺少对其的系统性研究.深度剖析自动驾驶面临的安全威胁能对其安全防护和保障提供指导,促进其大规模应用.通过整理学术界与工业界对自动驾驶安全的相关研究工作,分析和总结自动驾驶所面临的安全问题.首先介绍自动驾驶汽车架构、安全的特殊性,其次从模型视角出发,全过程地梳理自动驾驶的物理域输入、信息域输入和驾驶模型这3个方面可能存在的9个攻击作用点及其攻击方式与安全防护手段,最后通过对近7年相关研究论文数据的统计分析,总结自动驾驶安全研究的现状,讨论未来的研究方向. 展开更多
关键词 智能网联汽车 自动驾驶 安全威胁 攻击方式 安全防护
在线阅读 下载PDF
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
18
作者 Anja Housden-Brooks 《Journal of Computer and Communications》 2024年第12期246-265,共20页
The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or... The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or service with a flood of malicious traffic, pose significant threats to online systems. Traditional methods of detection and mitigation often struggle to keep pace with the evolving nature of these attacks. Machine learning, with its ability to analyze vast amounts of data and recognize patterns, offers a robust solution to this challenge. The aim of the paper is to demonstrate the application of ensemble ML algorithms, namely the K-Means and the KNN, for a dual clustering mechanism when used with PySpark to collect 99% accurate data. The algorithms, when used together, identify distinctive features of DDoS attacks that prove a very accurate reflection of reality, so they are a good combination for this aim. Impressively, having preprocessed the data, both algorithms with the PySpark foundation enabled the achievement of 99% accuracy when tuned on the features of a DDoS big dataset. The semi-supervised dataset tabulates traffic anomalies in terms of packet size distribution in correlation to Flow Duration. By training the K-Means Clustering and then applying the KNN to the dataset, the algorithms learn to evaluate the character of activity to a greater degree by displaying density with ease. The study evaluates the effectiveness of the K-Means Clustering with the KNN as ensemble algorithms that adapt very well in detecting complex patterns. Ultimately, cross-reaching environmental results indicate that ML-based approaches significantly improve detection rates compared to traditional methods. Furthermore, ensemble learning methods, which combine two plus multiple models to improve prediction accuracy, show greatness in handling the complexity and variability of big data sets especially when implemented by PySpark. The findings suggest that the enhancement of accuracy derives from newer software that’s designed to reflect reality. However, challenges remain in the deployment of these systems, including the need for large, high-quality datasets and the potential for adversarial attacks that attempt to deceive the ML models. Future research should continue to improve the robustness and efficiency of combining algorithms, as well as integrate them with existing security frameworks to provide comprehensive protection against DDoS attacks and other areas. The dataset was originally created by the University of New Brunswick to analyze DDoS data. The dataset itself was based on logs of the university’s servers, which found various DoS attacks throughout the publicly available period to totally generate 80 attributes with a 6.40GB size. In this dataset, the label and binary column become a very important portion of the final classification. In the last column, this means the normal traffic would be differentiated by the attack traffic. Further analysis is then ripe for investigation. Finally, malicious traffic alert software, as an example, should be trained on packet influx to Flow Duration dependence, which creates a mathematical scope for averages to enact. In achieving such high accuracy, the project acts as an illustration (referenced in the form of excerpts from my Google Colab account) of many attempts to tune. Cybersecurity advocates for more work on the character of brute-force attack traffic and normal traffic features overall since most of our investments as humans are digitally based in work, recreational, and social environments. 展开更多
关键词 K-Means Clustering The KNN Algorithm PySpark Ensemble Learning methods DDoS attacks Veracity Malicious Traffic Alert Systems
在线阅读 下载PDF
RCEP国家农产品贸易网络韧性测算研究
19
作者 王佳楠 吴明霞 陈森凯 《世界农业》 2025年第11期118-130,共13页
在国际贸易不确定性上升和国内农产品供需不平衡加剧的双重背景下,分析《区域全面经济伙伴关系协定》(RCEP)国家农产品贸易网络结构及网络局部和整体韧性,对探索中国对外贸易新窗口,保障农产品供给稳定具有重要意义。本文使用社会网络... 在国际贸易不确定性上升和国内农产品供需不平衡加剧的双重背景下,分析《区域全面经济伙伴关系协定》(RCEP)国家农产品贸易网络结构及网络局部和整体韧性,对探索中国对外贸易新窗口,保障农产品供给稳定具有重要意义。本文使用社会网络分析法和网络韧性动静态测度方法,揭示贸易网络结构和网络韧性演化规律并测度网络韧性。结论表明:2010-2023年,RCEP国家农产品贸易网络紧密程度明显加强,在传统的亚洲贸易格局基础上,形成了亚洲澳新市场对接的新的贸易网络格局;贸易网络全局韧性在连通性、抗毁性和恢复性三个维度均有提升;局部韧性较高的国家出现在澳大利亚、新西兰、泰国等中等规模经济体,表现出农产品贸易合作关系正从传统资源输出模式向深度产业链分工合作转型;贸易网络抗冲击能力日益依赖中国、澳大利亚、泰国等网络枢纽核心国家,突显了其农产品区域集散和中转功能。对此,中国应深化与亚太地区的区域经济合作关系,进一步拓展多元合作空间;提升农产品的国际竞争力、创新贸易治理机制,拓宽贸易合作路径;增强农产品专业化程度,深度参与全球农产品价值链重构。 展开更多
关键词 RCEP国家 农产品贸易网络 网络韧性测度 社会网络分析法 模拟攻击法
在线阅读 下载PDF
基于微元-分层法的受硫酸盐侵蚀隧道衬砌有效强度预测模型 被引量:1
20
作者 刘新荣 庄炀 +2 位作者 周小涵 梁宁慧 陈海 《材料导报》 北大核心 2025年第13期165-173,共9页
隧道衬砌受硫酸盐侵蚀后的有效强度是评价运营隧道安全性的重要依据,但现有硫酸盐侵蚀试验为缩短试验周期而提高了侵蚀溶液中硫酸盐浓度,导致试验结果无法预测实际运营时间下受硫酸盐侵蚀隧道衬砌的有效强度。针对隧道衬砌的单面腐蚀特... 隧道衬砌受硫酸盐侵蚀后的有效强度是评价运营隧道安全性的重要依据,但现有硫酸盐侵蚀试验为缩短试验周期而提高了侵蚀溶液中硫酸盐浓度,导致试验结果无法预测实际运营时间下受硫酸盐侵蚀隧道衬砌的有效强度。针对隧道衬砌的单面腐蚀特点,本工作提出微元-分层法,并以此建立了考虑时间效应的隧道衬砌有效强度预测模型。选取重庆某受硫酸盐侵蚀隧道进行了工程案例分析,通过420 d的室内侵蚀试验和数值模拟,对有效强度预测模型的关键参数进行了求解,并与试验结果进行对比验证。进一步研究了该隧道在整体腐蚀和拱脚局部腐蚀情况下衬砌有效强度的变化规律。研究结果表明:提出的有效强度预测模型能够避免尺寸效应计算腐蚀衬砌的有效强度,其计算结果与试验结果吻合良好;在隧道衬砌有效强度损失阶段,损失速度随运营时间呈先慢后快的特点;在相同情况下,拱脚局部腐蚀时隧道衬砌的有效强度损失小于整体腐蚀。 展开更多
关键词 隧道工程 有效强度预测 微元-分层法 腐蚀衬砌 硫酸盐单面侵蚀
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部