期刊文献+
共找到1,498篇文章
< 1 2 75 >
每页显示 20 50 100
An Attack Modeling Based on Colored Petri Net
1
作者 周世杰 秦志光 +1 位作者 张峰 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期47-52,共6页
A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic feat... A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t. 展开更多
关键词 petri net color petri net (CPN) intrusion detection and response attack modeling
在线阅读 下载PDF
Study on Anti-ship Missile Saturation Attack Model 被引量:1
2
作者 王光辉 孙学锋 +1 位作者 严建钢 谢宇鹏 《Defence Technology(防务技术)》 SCIE EI CAS 2010年第1期10-15,共6页
Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. T... Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. This model containing the probability of acquiring anti-ship missile, threat estimation, firepower distribution, interception, effectiveness evaluation and firepower turning, can dynamically simulate the antagonism process of anti-ship missile attack stream and anti-air missile weapon system. The anti-ship missile's saturation attack stream for different ship-to-air missile systems can be calculated quantitatively. The simulated results reveal the relations among the anti-ship missile saturation attack and the attack intensity of anti-ship missile, interception mode and the main parameters of anti-air missile weapon system. It provides a theoretical basis for the effective operation of anti-ship missile. 展开更多
关键词 operational research system engineering anti-ship missile ship-to-air missile saturation attack antagonism model penetrate efficiency
在线阅读 下载PDF
Analysis of SVEIR worm attack model with saturated incidence and partial immunization 被引量:2
3
作者 WANG Fangwei HUANG Wenyan +1 位作者 SHEN Yulong WANG Changguang 《Journal of Communications and Information Networks》 2016年第4期105-115,共11页
Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization ... Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization becomes a significant matter for sustaining Internet infrastructure.This paper addresses this issue by presenting a novel worm susceptible-vaccinated-exposed-infectious-recovered model,named the SVEIR model.The SVEIR model extends the classical susceptible-exposed-infectious-recovered model(refer to SEIR model)through incorporating a saturated incidence rate and a partial immunization rate.The basic reproduction number in the SVEIR model is obtained.By virtue of the basic reproduction number,we prove the global stabilities of an infection-free equilibrium point and a unique endemic equilibrium point.Numerical methods are used to verify the proposed SVEIR model.Simulation results show that partial immunization is highly effective for eliminating worms,and the SVEIR model is viable for controlling and forecasting Internet worms. 展开更多
关键词 Internet worm attack model STABILITY saturated incidence partial immunization
原文传递
HB-2 high-velocity correlation model at high angles of attack in supersonic wind tunnel tests 被引量:3
4
作者 Djordje VUKOVI? Dijana DAMLJANOVI? 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第7期1565-1576,共12页
Responding to a need for experimental data on a standard wind tunnel model at high angles of attack in the supersonic speed range, and in the absence of suitable reference data, a series of tests of two HB-2 standard ... Responding to a need for experimental data on a standard wind tunnel model at high angles of attack in the supersonic speed range, and in the absence of suitable reference data, a series of tests of two HB-2 standard models of different sizes was performed in the T-38 trisonic wind tunnel of Vojnotehnickˇi Institut(VTI), in the Mach number range 1.5–4.0, at angles of attack up to+30°. Tests were performed at relatively high Reynolds numbers of 2.2 millions to 4.5 millions(based on model forebody diameter). Results were compared with available low angle of attack data from other facilities, and, as a good agreement was found, it was assumed that, by implication, the obtained high angle of attack results were valid as well. Therefore, the results can be used as a reference database for the HB-2 model at high angles of attack in the supersonic speed range, which was not available before. The results are presented in comparison with available reference data, but also contain data for some Mach numbers not given in other publications. 展开更多
关键词 Base pressure Experimental AERODYNAMICS High angle of attack Standard model WIND TUNNEL
原文传递
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation 被引量:1
5
作者 Lingtao Qi Haiping Huang +2 位作者 Feng Li Reza Malekian Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第10期112-132,共21页
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGenl) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGenl, a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD,SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM. 展开更多
关键词 shilling attack detection model collaborative filtering recommender systems gravitation-based detection model particle filter algorithm
在线阅读 下载PDF
Unsteady aerodynamic modeling at high angles of attack using support vector machines 被引量:28
6
作者 Wang Qing Qian Weiqi He Kaifeng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期659-668,共10页
Abstract Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determ... Abstract Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determination and parameter estimation due to little understanding of the flow mechanism. Support vector machines (SVMs) based on statistical learning theory provide a novel tool for nonlinear system modeling. The work presented here examines the feasibility of applying SVMs to high angle.-of-attack unsteady aerodynamic modeling field. Mainly, after a review of SVMs, several issues associated with unsteady aerodynamic modeling by use of SVMs are discussed in detail, such as sele, ction of input variables, selection of output variables and determination of SVM parameters. The least squares SVM (LS-SVM) models are set up from certain dynamic wind tunnel test data of a delta wing and an aircraft configuration, and then used to predict the aerodynamic responses in other tests. The predictions are in good agreement with the test data, which indicates the satisfving learning and generalization performance of LS-SVMs. 展开更多
关键词 Aerodynamic modeling High angle of attack Support vector machines(SVMs) Unsteady aerodynamics Wind tunnel test
原文传递
Algebraic Attack on Filter-Combiner Model Keystream Generators
7
作者 WUZhi-ping YEDing-feng MAWei-ju 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. 展开更多
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
8
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
N-Model:多深度学习模型动态组合的智能系统安全弹性增强
9
作者 程泽凯 刘高天 +3 位作者 蒋建春 庞志伟 滕若阑 梅瑞 《计算机系统应用》 2025年第9期57-68,共12页
基于深度学习智能系统面临对抗攻击、供应链攻击等安全威胁问题日益突出,而传统智能系统采用单一模型,其防御机制是静态的、确定的模式,模型的功能存在单点脆弱性,导致智能系统缺乏安全弹性.本文提出了一种多个深度学习模型动态组合的方... 基于深度学习智能系统面临对抗攻击、供应链攻击等安全威胁问题日益突出,而传统智能系统采用单一模型,其防御机制是静态的、确定的模式,模型的功能存在单点脆弱性,导致智能系统缺乏安全弹性.本文提出了一种多个深度学习模型动态组合的方法(N-Model),实现模型的多样性和随机性,通过模型的动态变化增加智能攻击对象及攻击途径的不确定性,结合多模型的表决机制,增强智能系统的安全弹性.理论安全分析表明,N-Model组合模型在攻击情景下相比单一模型具有较高的期望准确率.实验结果进一步证实,在CIFAR-10数据集下,N-Model组合模型可抵御多种对抗攻击,其攻击成功率低于单一模型,表现出良好的综合安全性能. 展开更多
关键词 人工智能安全 深度学习防御 随机模型调度 多模型表决 攻击容忍性 系统安全弹性
在线阅读 下载PDF
面向扩散模型的时序成员推理攻击方法
10
作者 高志鹏 张祎 +3 位作者 尤玮婧 柴泽 杨杨 芮兰兰 《计算机研究与发展》 北大核心 2026年第1期243-254,共12页
扩散模型是一种用于描述信息传播或影响传递过程的数学模型,近年来被越来越多地应用在计算机视觉和自然语言处理等领域的生成式任务中,针对扩散模型的数据隐私攻击与保护也随之得到了广泛关注。成员推理攻击(membership inference attac... 扩散模型是一种用于描述信息传播或影响传递过程的数学模型,近年来被越来越多地应用在计算机视觉和自然语言处理等领域的生成式任务中,针对扩散模型的数据隐私攻击与保护也随之得到了广泛关注。成员推理攻击(membership inference attack,MIA)是一种针对机器学习模型的经典攻击,然而,现有的MIA方法实施的深度和广度不足,尤其是在短时攻击和长时攻击的效果平衡上存在挑战。提出了一种新的面向扩散模型的时序成员推理攻击方法(temporal membership inference attack method for diffusion models,TMIA-DM),通过噪声梯度信息保证短时攻击的攻击成功率(attack success rate,ASR),同时采用时序噪声信息来提高长时攻击效果。实验表明,提出的方法在常见扩散模型上短时攻击的ASR提升约5个百分点,长时攻击的ASR提高约1个百分点。 展开更多
关键词 成员推理攻击 扩散模型 梯度 隐私泄露 机器学习
在线阅读 下载PDF
Evaluating Privacy Leakage and Memorization Attacks on Large Language Models (LLMs) in Generative AI Applications 被引量:1
11
作者 Harshvardhan Aditya Siddansh Chawla +6 位作者 Gunika Dhingra Parijat Rai Saumil Sood Tanmay Singh Zeba Mohsin Wase Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期421-447,共27页
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor... The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks. 展开更多
关键词 Large Language models PII Leakage Privacy Memorization OVERFITTING Membership Inference attack (MIA)
在线阅读 下载PDF
工业网络通信链路传输安全态势感知方法研究
12
作者 程阔 李震 《成都工业学院学报》 2026年第1期38-43,共6页
工业网络通信链路数据交互频繁,易受到来自企业内部违规操作、恶意软件渗透以及外部网络攻击、恶意竞争行为等多种安全威胁,影响工业网络的稳定性和数据安全性。为此,提出工业网络通信链路传输安全态势感知方法。通过采集工业网络通信... 工业网络通信链路数据交互频繁,易受到来自企业内部违规操作、恶意软件渗透以及外部网络攻击、恶意竞争行为等多种安全威胁,影响工业网络的稳定性和数据安全性。为此,提出工业网络通信链路传输安全态势感知方法。通过采集工业网络通信链路的异常数据,并对其进行离散化处理,计算离散数据的不确定性和增益,提取具有较大信息增益的数据作为安全态势感知要素。挖掘攻击数据集强关联关系,得到关联矩阵,结合编码输出,确定攻击程度等级。构建网络通信链路自适应学习感知模型,以攻击程度等级量化值作为模型输入,输出攻击活跃指数,结合攻击行为的特征参数,计算传输安全态势感知度量值,并依据度量值阈值,确定网络通信链路传输的安全水平。实验结果表明,所提方法得到的拟合优度决定系数高于0.8,输出的安全态势感知度量值与实际值更为接近,感知准确度较高。 展开更多
关键词 工业网络 通信链路 安全态势感知 感知模型 攻击等级
在线阅读 下载PDF
基于BERT和GRU的Web攻击检测模型研究
13
作者 谭攀 王海珍 成雨玫 《齐齐哈尔大学学报(自然科学版)》 2026年第1期30-37,共8页
目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进... 目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进行上下文语义编码、全连接层处理,将获得的数据与原始文本数据拼接,输入GRU网络提取序列特征,输出通过Softmax计算,最终实现多分类。在CSIC 2010数据集和FWAF数据集上的实验结果表明,BERT_GRU模型在准确率、召回率、F1值等评价指标以及训练时间方面均优于对比模型。 展开更多
关键词 Web攻击检测 BERT模型 GRU
在线阅读 下载PDF
Attacks and Countermeasures in Social Network Data Publishing
14
作者 YANG Mengmeng ZHU Tianqing +1 位作者 ZHOU Wanlei XIANG Yang 《ZTE Communications》 2016年第B06期2-9,共8页
With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For exa... With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area. 展开更多
关键词 social network data publishing attack model privacy preserving
在线阅读 下载PDF
基于中文逻辑词的模型劫持攻击方法
15
作者 钟一 陈珍珠 +1 位作者 付安民 高艳松 《计算机研究与发展》 北大核心 2026年第2期525-538,共14页
模型劫持攻击是一种新型攻击方式,通过植入特定词语,能够隐蔽地控制模型执行与原始任务截然不同的劫持任务,使模型拥有者的训练算力成本增加的同时面临潜在的法律风险。目前,已有研究针对德-英文语言翻译模型探索了这一攻击方式,但在中... 模型劫持攻击是一种新型攻击方式,通过植入特定词语,能够隐蔽地控制模型执行与原始任务截然不同的劫持任务,使模型拥有者的训练算力成本增加的同时面临潜在的法律风险。目前,已有研究针对德-英文语言翻译模型探索了这一攻击方式,但在中文自然语言处理(natural language processing,NLP)领域尚属空白。中文语言的独特性使得其面临不同于其他语言环境的安全挑战,因此亟需开发针对中文模型的攻击评估方法。基于上述事实,提出了一种基于中文逻辑词的模型劫持攻击方法Cheater,用于评估中文模型的安全性。Cheater针对中-英文NLP任务,首先使用公共模型对劫持数据进行伪装生成过渡数据,再通过在过渡样本中嵌入中文逻辑词的方式对其进行改造生成毒性数据,最后利用毒性数据完成对目标模型的劫持。实验表明,对于Bart[large]模型,Cheater在0.5%的数据投毒率下攻击成功率可以达到90.2%。 展开更多
关键词 劫持攻击 人工智能安全 中文模型 自然语言处理 逻辑词
在线阅读 下载PDF
基于特征调控与颜色分离的净标签多后门攻击方法
16
作者 唐迎春 黄荣 +1 位作者 周树波 蒋学芹 《计算机应用》 北大核心 2026年第1期124-134,共11页
针对传统的后门攻击缺乏隐蔽性与灵活性的问题,提出一种基于特征调控与颜色分离的净标签多后门攻击方法,以信息隐藏框架为基础,训练中毒网络嵌入触发器。首先,以图像边缘作为触发器,设计特征调控策略,结合对抗扰动与代理模型辅助训练中... 针对传统的后门攻击缺乏隐蔽性与灵活性的问题,提出一种基于特征调控与颜色分离的净标签多后门攻击方法,以信息隐藏框架为基础,训练中毒网络嵌入触发器。首先,以图像边缘作为触发器,设计特征调控策略,结合对抗扰动与代理模型辅助训练中毒网络,增强触发器特征的显著性;其次,提出颜色分离策略对触发器进行着色,赋予触发器可区分的RGB空间颜色并设置与颜色相对应的one-hot目标置信度引导训练,从而保证触发器特征的可区分性。为了验证所提方法的有效性,分别在3个数据集(CIFAR-10、ImageNet-10和GTSRB)上以及5种模型上进行实验。结果表明,在单后门场景下,所提方法的攻击成功率(ASR)在3个数据集上均超过98%,分别超过次优方法7.94、1.70和8.61个百分点;在多后门场景下,所提方法在ImageNet-10数据集上的ASR达到90%以上,平均ASR超过次优方法36.63个百分点。而消融实验的结果也验证了特征调控与颜色分离策略的合理性及对抗扰动与代理模型的贡献,多后门实验的结果展示了所提攻击方法的灵活性。 展开更多
关键词 后门攻击 净标签 特征调控 颜色分离 代理模型
在线阅读 下载PDF
网络攻击下的综合能源信息物理系统的熵态建模与状态分析
17
作者 刘佳委 王丹 +4 位作者 李宜哲 贾宏杰 周天烁 张帅 程颢 《电网技术》 北大核心 2026年第1期28-38,I0010-I0023,共25页
综合能源信息物理系统在现代能源网络中扮演着至关重要的角色,增强其抵御网络攻击的能力对保障能源供应的可靠性和安全性至关重要。文章针对综合能源信息物理系统在网络攻击下的具体特性变化,基于物理学熵增定律提出了一种信息物理系统... 综合能源信息物理系统在现代能源网络中扮演着至关重要的角色,增强其抵御网络攻击的能力对保障能源供应的可靠性和安全性至关重要。文章针对综合能源信息物理系统在网络攻击下的具体特性变化,基于物理学熵增定律提出了一种信息物理系统在受到网络攻击下的熵态建模方法。首先建立了综合能源信息物理系统的物理-信息流耦合计算模型;然后,构建了信息攻击以及系统受网络攻击扰动的信息等效热力学熵增计算模型,并针对网络攻击对系统的物理影响,提出了基于潮流熵的网络攻击物理影响评估指标;最后,通过算例分析了不同种类信息及物理攻击方式对综合能源信息物理系统熵态分布的影响,为量化系统受到攻击后能量的不可用性提供了工具,丰富了传统综合能源系统的熵态理论,同时为未来综合能源信息物理系统的安全防护提供了新的视角和方法。 展开更多
关键词 综合能源信息物理系统 熵态模型 热力学熵 信息熵 网络攻击
原文传递
联合视觉-文本特征的复合型触发器后门攻击
18
作者 黄荣 唐迎春 +1 位作者 周树波 蒋学芹 《计算机科学》 北大核心 2026年第1期382-394,共13页
后门攻击指攻击者通过毒化数据集,隐蔽地诱导受害模型关联中毒数据和目标标签,对人工智能技术的可信和安全产生威胁。现有后门攻击方法普遍存在着有效性和隐蔽性之间顾此失彼的矛盾,有效性强的触发器隐蔽性差,反之,隐蔽性好的触发器有... 后门攻击指攻击者通过毒化数据集,隐蔽地诱导受害模型关联中毒数据和目标标签,对人工智能技术的可信和安全产生威胁。现有后门攻击方法普遍存在着有效性和隐蔽性之间顾此失彼的矛盾,有效性强的触发器隐蔽性差,反之,隐蔽性好的触发器有效性弱。针对该问题,提出一种联合视觉-文本特征的复合型触发器净标签后门攻击。复合型触发器由通用型和个性化两部分可学习的触发器叠加而成。复合型触发器的设计和优化均以块内像素值的同余为约束,旨在诱导受害模型捕捉同余规律,建立起触发器和目标标签的关联,形成后门。通用型触发器使得中毒图像的块内像素值对位权2同余,其信号形态对于所有的中毒图像单一固定;个性化触发器使得中毒图像的边缘像素值对LoSB(Lower Significant Bit)的位权同余,其信号特定于图像的边缘位置。两部分触发器相叠加,有利于兼顾有效性和隐蔽性。在此基础上,引入CLIP(Contrastive Language-Image Pre-training)模型,联合视觉和文本特征构建驱动复合型触发器训练的监督信号。预训练的CLIP模型具有较强的泛化能力,能够引导复合型触发器吸收异类的文本特征,起到弱化图像内容特征的作用,进一步增强触发器的有效性。在CIFAR-10,ImageNet,GTSRB这3个数据集上开展了实验。结果表明,所提方法能够抵御后门防御技术的侦测,在攻击成功率指标上平均超越次优方法2.48个百分点;在峰值信噪比、结构相似性度量、梯度幅度相似性偏差和学习感知图像块相似度4项指标上分别平均超越次优方法10.61%,0.31%,68.44%和46.38%。消融实验的结果验证了联合视觉和本文特征引导复合型触发器训练的优势,还验证了通用型和个性化两部分触发器对后门攻击的有效性和隐蔽性。 展开更多
关键词 后门攻击 复合型触发器 同余规律 CLIP模型
在线阅读 下载PDF
基于奇异值空间对抗优化的动态后门攻击
19
作者 彭子铭 丁建伟 +1 位作者 姚佳旺 田华伟 《计算机科学与探索》 北大核心 2026年第2期510-521,共12页
深度学习模型凭借其卓越的性能已在众多领域得到广泛应用,但研究表明其对后门攻击也具有显著的脆弱性。后门攻击可通过隐蔽的触发机制破坏模型的可靠性,当预设的触发器激活隐藏后门时,模型将执行恶意行为。目前后门攻击主要依赖于空间... 深度学习模型凭借其卓越的性能已在众多领域得到广泛应用,但研究表明其对后门攻击也具有显著的脆弱性。后门攻击可通过隐蔽的触发机制破坏模型的可靠性,当预设的触发器激活隐藏后门时,模型将执行恶意行为。目前后门攻击主要依赖于空间域或频域的扰动触发模式,且多采用样本无关的静态触发器设置,使得防御系统能够相对容易地检测并消除威胁。为了解决现有攻击隐蔽性不足和鲁棒性较弱的问题,提出一种基于奇异值空间进行阶段性对抗优化的动态后门攻击方法。通过生成器生成具有样本特异性的触发器,利用奇异值分解(SVD)提取干净图像和触发器的主/次特征,将触发信息嵌入干净图像次特征中,保留主特征以维持后门隐蔽性。提出阶段性训练框架:第一阶段联合优化触发生成器与分类器,确保最大化后门攻击的有效性;第二阶段则用最优触发生成器继续训练后门模型。为了验证方法的隐蔽性与有效性,在多个经典数据集上测试了攻击方法。实验结果表明,该方法在四个数据集上都实现了比现有攻击方法更高的攻击成功率,且在良性样本上几乎没有导致准确率下降,并绕过了四种先进的后门防御方法。同时,实验还验证了深度模型对奇异值扰动的敏感性可被恶意利用,而现有的防御机制难以识别此类攻击,为AI模型揭示了新的安全隐患。 展开更多
关键词 后门攻击 阶段性对抗优化 奇异值分解 样本特异性 模型安全
在线阅读 下载PDF
脉冲神经网络对抗样本攻击与防御综述
20
作者 王晓璐 岳鹏飞 +3 位作者 张家琪 姬婕 董航 孔德懿 《计算机工程与应用》 北大核心 2026年第2期54-72,共19页
随着脉冲神经网络的广泛部署应用,其安全性问题也愈发明显,尤其是来自对抗样本攻击的威胁。因此,展开对脉冲神经网络中的对抗样本攻击方法与防御措施的调查。就对抗样本攻击方法展开研究,软件层方面从梯度攻击、迁移学习攻击、编码扰动... 随着脉冲神经网络的广泛部署应用,其安全性问题也愈发明显,尤其是来自对抗样本攻击的威胁。因此,展开对脉冲神经网络中的对抗样本攻击方法与防御措施的调查。就对抗样本攻击方法展开研究,软件层方面从梯度攻击、迁移学习攻击、编码扰动攻击和传感器攻击着手整理;硬件层方面从电源注入攻击、侧信道攻击和特洛伊木马攻击开展整理。就对抗样本防御措施开展研究,软件层的防御措施从对抗训练、输入过滤、改进编码、特征网络分析和模型融合入手整理;硬件层的防御措施从电路优化和安全框架的两部分切入开展论述。探讨对抗样本在模型安全研究以及验证码反识别中的应用。最后,提出当下的挑战与未来展望并总结全文。 展开更多
关键词 脉冲神经网络(SNN) 对抗样本攻击 对抗样本防御 人工智能模型安全
在线阅读 下载PDF
上一页 1 2 75 下一页 到第
使用帮助 返回顶部