期刊文献+
共找到26,332篇文章
< 1 2 250 >
每页显示 20 50 100
基于IG-EMA-U2Net的黄铁矿浮选泡沫图像分割算法 被引量:1
1
作者 杜荣谦 刘琼 刘光举 《金属矿山》 北大核心 2025年第3期202-209,共8页
浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿... 浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿浮选泡沫为对象,提出了改进的IG-EMA-U2Net泡沫分割算法。该算法以U2Net为主干网络,首先在U2Net外部的下采样处引入EMA注意力机制,提升网络对泡沫的关注度,减少下采样和跳跃连接造成的空间信息损失;再将改进的InceptionV1+BN模块替换RSU7残差块的第一层卷积池化模块,得到IRU模块,增强对泡沫图像特征信息的提取能力;最后提出GRU模块,使用GhostConv替代RSU5、RSU4和RSU4F中的传统卷积,在分割精度不变的情况下,减小算法的计算成本和参数量。研究表明,IG-EMA-U2Net算法的Dice系数、召回率R和F1-score分别达93.98%、94.07%和94.00%,较常用分割算法UNet、DeepLabV3+和U2Net的分割精度更高、分割效果更好,有效减少了漏分割。 展开更多
关键词 泡沫浮选 图像分割 U2Net ema模块 GhostConv
在线阅读 下载PDF
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
2
作者 Nisreen Innab Ahmed Abdelgader Fadol Osman +4 位作者 Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh 《Computers, Materials & Continua》 SCIE EI 2024年第7期1325-1345,共21页
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise ... Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise in phishing attacks.Moreover,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to identify.Hence,it is imperative to utilize sophisticated algorithms to address this issue.Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors.Machine learning(ML)approaches can identify common characteristics in most phishing assaults.In this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing datasets.After that,we used the normalization technique on the dataset to transform the range of all the features into the same range.The findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best results.While in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction process.Also,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate. 展开更多
关键词 Social engineering attacks phishing attacks machine learning SECURITY artificial intelligence
在线阅读 下载PDF
EMA“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”介绍及其启示
3
作者 萧惠来 《药物评价研究》 北大核心 2025年第1期1-10,共10页
EMA于2024年2月发布了“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”。TE是指受试制剂和参比制剂的疗效和安全性非常相似,从而可以可靠地排除产品之间的临床相关差异。该指导原则提出这类药... EMA于2024年2月发布了“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”。TE是指受试制剂和参比制剂的疗效和安全性非常相似,从而可以可靠地排除产品之间的临床相关差异。该指导原则提出这类药物的TE研究,应采用循序渐进的方法。如果能满足所有体外要求,则可在体外证明TE。如果尽管存在一些体外差异,但能证明全身暴露(作为安全性的替代指标)和肺吸收/沉积(作为疗效的替代指标)等效,则可通过药动学证明TE。通常不建议使用药效学或临床终点证明TE,因为这些终点不敏感。该指导原则还用大量篇幅对这类药物治疗等效性研究的许多具体问题提出了建议。详细介绍该指导原则,期望对我国这类药物的治疗等效性研究和审评有启示。 展开更多
关键词 欧洲药品管理局(ema) 哮喘 慢性阻塞性肺疾病 经口吸入制剂 治疗等效性 指导原则
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
4
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
5
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
EMA-8干法温拌高黏弹改性沥青超薄磨耗层路用性能评价研究 被引量:1
6
作者 刘飞 韩书龙 +4 位作者 孟伟坤 岳浩 武文鑫 林江涛 樊亮 《合成材料老化与应用》 2025年第1期29-31,共3页
为兼顾沥青路面超薄磨耗层经济成本及能耗,采用乳液型高黏改性剂进行EMA-8高黏弹改性沥青及其混合料的制备与评价,并进行工程验证。结果表明:EMA-8高黏弹改性沥青64℃车辙因子达到12kPa以上;LAS试验疲劳次数达到47389次,相对于市售SBS... 为兼顾沥青路面超薄磨耗层经济成本及能耗,采用乳液型高黏改性剂进行EMA-8高黏弹改性沥青及其混合料的制备与评价,并进行工程验证。结果表明:EMA-8高黏弹改性沥青64℃车辙因子达到12kPa以上;LAS试验疲劳次数达到47389次,相对于市售SBS改性沥青和高黏弹改性沥青,疲劳寿命分别增加了75.8%和20.7%;干法工艺下混合料具有温拌特性,相较于市售高黏弹改性沥青混合料降低施工温度近20℃;其混合料低温、水稳定性能与市售高黏弹改性沥青混合料相当,动稳定度超过市售高黏弹改性沥青混合料27.8%。工程实践表明,EMA-8高黏沥青混合料具有成本及性能优势。 展开更多
关键词 道路工程 ema-8 高黏弹改性沥青 超薄磨耗层 路用性能
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
7
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
8
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game Networked control systems Hybrid attacks DoS attack FDI attack
在线阅读 下载PDF
Differential-Linear Attacks on Ballet Block Cipher
9
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
Several Attacks on Attribute-Based Encryption Schemes
10
作者 Phi Thuong Le Huy Quoc Le Viet Cuong Trinh 《Computers, Materials & Continua》 2025年第6期4741-4756,共16页
Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digita... Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digital rightsmanagement.ABE schemes rely on hard cryptographic assumptions such as pairings and others(pairingfree)to ensure their security against external and internal attacks.Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent.One common internal attack is the attribute collusion attack,in which users with different attribute keys collaborate to decrypt data they could not individually access.This paper focuses on the ciphertext-policy ABE(CP-ABE),a type of ABE where ciphertexts are produced with access policies.Our firstwork is to carry out the attribute collusion attack against several existing pairingfree CP-ABE schemes.As a main contribution,we introduce a novel attack,termed the anonymous key-leakage attack,concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection.This kind of internal attack has not been defined or investigated in the literature.We then show that several prominent pairing-based CP-ABE schemes are vulnerable to this attack.We believe that this work will contribute to helping the community evaluate suitable CP-ABE schemes for secure deployment in real-life applications. 展开更多
关键词 Attribute-based encryption ciphertext-policy attribute collusion attack anonymous key-leakage attack
在线阅读 下载PDF
An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm
11
作者 Bing Liu Ting Nie +1 位作者 Yansong Liu Weibo Hu 《Computers, Materials & Continua》 2025年第9期4583-4599,共17页
Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,th... Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,the BIKE scheme based on QC-MDPC(Quasi Cyclic Medium Density Parity Check)codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate(DFR).This paper analyzes the BGF decoding algorithm of the BIKE scheme,revealing two deep factors that lead to DFR,and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors.The proposed method constructs a new weak key set,and experiment results eventually indicate that,considering BIKE’s parameter set targeting 128-bit security,the average decryption failure rate is lowerly bounded by.This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design.By addressing these weaknesses,the robustness of QC-MDPC code-based cryptographic systems can be enhanced,paving the way for more secure post-quantum cryptographic solutions. 展开更多
关键词 BIKE BGF decoding algorithm weak key attack GJS attack
在线阅读 下载PDF
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
12
作者 Yu-Ang Wang Zidong Wang +2 位作者 Lei Zou Bo Shen Hongli Dong 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期114-125,共12页
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) perfect stealthy attacks watermark-based strategy
在线阅读 下载PDF
Security and Privacy in Permissioned Blockchain Interoperability:A Systematic Review
13
作者 Alsoudi Dua TanFong Ang +5 位作者 Chin Soon Ku Okmi Mohammed Yu Luo Jiahui Chen Uzair Aslam Bhatti Lip Yee Por 《Computers, Materials & Continua》 2025年第11期2579-2624,共46页
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst... Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems. 展开更多
关键词 Blockchain security PRIVACY ATTACK THREAT INTEROPERABILITY cross-chain
在线阅读 下载PDF
SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs
14
作者 Mohammad Nowsin Amin Sheikh Muhammad Saibtain Raza +4 位作者 I-Shyan Hwang Md.Alamgir Hossain Ihsan Ullah Tahmid Hasan Mohammad Syuhaimi Ab-Rahman 《Computers, Materials & Continua》 2025年第11期4043-4066,共24页
The rapid advancement of the Internet ofThings(IoT)has heightened the importance of security,with a notable increase in Distributed Denial-of-Service(DDoS)attacks targeting IoT devices.Network security specialists fac... The rapid advancement of the Internet ofThings(IoT)has heightened the importance of security,with a notable increase in Distributed Denial-of-Service(DDoS)attacks targeting IoT devices.Network security specialists face the challenge of producing systems to identify and offset these attacks.This researchmanages IoT security through the emerging Software-Defined Networking(SDN)standard by developing a unified framework(RNN-RYU).We thoroughly assess multiple deep learning frameworks,including Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),Feed-Forward Convolutional Neural Network(FFCNN),and Recurrent Neural Network(RNN),and present the novel usage of Synthetic Minority Over-Sampling Technique(SMOTE)tailored for IoT-SDN contexts to manage class imbalance during training and enhance performance metrics.Our research has significant practical implications as we authenticate the approache using both the self-generated SD_IoT_Smart_City dataset and the publicly available CICIoT23 dataset.The system utilizes only eleven features to identify DDoS attacks efficiently.Results indicate that the RNN can reliably and precisely differentiate between DDoS traffic and benign traffic by easily identifying temporal relationships and sequences in the data. 展开更多
关键词 DDoS attack detection IoT-SDN SD_IoT_Smart_City RNNs
在线阅读 下载PDF
Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition
15
作者 Donghyeok Park Sumin Yeon +2 位作者 Hyeon Seo Seok-Jun Buu Suwon Lee 《Computer Modeling in Engineering & Sciences》 2025年第3期2725-2737,共13页
Recent research on adversarial attacks has primarily focused on white-box attack techniques,with limited exploration of black-box attack methods.Furthermore,in many black-box research scenarios,it is assumed that the ... Recent research on adversarial attacks has primarily focused on white-box attack techniques,with limited exploration of black-box attack methods.Furthermore,in many black-box research scenarios,it is assumed that the output label and probability distribution can be observed without imposing any constraints on the number of attack attempts.Unfortunately,this disregard for the real-world practicality of attacks,particularly their potential for human detectability,has left a gap in the research landscape.Considering these limitations,our study focuses on using a similar color attack method,assuming access only to the output label,limiting the number of attack attempts to 100,and subjecting the attacks to human perceptibility testing.Through this approach,we demonstrated the effectiveness of black box attack techniques in deceiving models and achieved a success rate of 82.68%in deceiving humans.This study emphasizes the significance of research that addresses the challenge of deceiving both humans and models,highlighting the importance of real-world applicability. 展开更多
关键词 Adversarial attacks image recognition information security
在线阅读 下载PDF
K-Corruption Intermittent Attacks for Violating the Codiagnosability
16
作者 Ruotian Liu Yihui Hu +1 位作者 Agostino Marcello Mangini Maria Pia Fanti 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期159-172,共14页
In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of site... In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of sites, in which each site possesses its own set of sensors, without requiring communication among sites or to any coordinators. A net is said to be codiagnosable with respect to a fault if at least one site could deduce the occurrence of this fault within finite steps. In this context, we focus on a type of malicious attack that is called stealthy intermittent replacement attack. The stealthiness demands that the corrupted observations should be consistent with the system's normal behavior, while the intermittent replacement setting entails that the replaced transition labels must be recovered within a bounded of consecutive corrupted observations(called as K-corruption intermittent attack). Particularly, there exists a coordination between attackers that are separately effected on different sites, which holds the same corrupted observation for each common transition under attacks. From an attacker viewpoint, this work aims to design Kcorruption intermittent attacks for violating the codiagnosability of systems. For this purpose, we propose an attack automaton to analyze K-corruption intermittent attack for each site, and build a new structure called complete attack graph that is used to analyze all the potential attacked paths. Finally, an algorithm is inferred to obtain the K-corruption intermittent attacks, and examples are given to show the proposed attack strategy. 展开更多
关键词 Codiagnosability decentralized structure discrete event system intermittent attack Petri net
在线阅读 下载PDF
Defending against Backdoor Attacks in Federated Learning by Using Differential Privacy and OOD Data Attributes
17
作者 Qingyu Tan Yan Li Byeong-Seok Shin 《Computer Modeling in Engineering & Sciences》 2025年第5期2417-2428,共12页
Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving dat... Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving data privacy and avoiding direct data sharing.Despite its privacy-preserving advantages,FL remains vulnerable to backdoor attacks,where malicious participants introduce backdoors into local models that are then propagated to the global model through the aggregation process.While existing differential privacy defenses have demonstrated effectiveness against backdoor attacks in FL,they often incur a significant degradation in the performance of the aggregated models on benign tasks.To address this limitation,we propose a novel backdoor defense mechanism based on differential privacy.Our approach first utilizes the inherent out-of-distribution characteristics of backdoor samples to identify and exclude malicious model updates that significantly deviate from benign models.By filtering out models that are clearly backdoor-infected before applying differential privacy,our method reduces the required noise level for differential privacy,thereby enhancing model robustness while preserving performance.Experimental evaluations on the CIFAR10 and FEMNIST datasets demonstrate that our method effectively limits the backdoor accuracy to below 15%across various backdoor scenarios while maintaining high main task accuracy. 展开更多
关键词 Federated learning backdoor attacks differential privacy out-of-distribution data
在线阅读 下载PDF
EMA建议欧盟有条件批准Rezdiffra治疗非肝硬化代谢功能障碍相关脂肪性肝炎
18
作者 本刊(译) 《首都食品与医药》 2025年第18期6-6,共1页
近日,欧洲药品管理局(EMA)建议在欧盟授予Rezdiffra有条件上市许可,用于治疗非肝硬化代谢功能障碍相关脂肪性肝炎(MASH)伴中重度肝纤维化成人患者。MASH是一种因肝脏脂肪堆积引发炎症的严重疾病,常伴随心血管及代谢性疾病,若未及时干预... 近日,欧洲药品管理局(EMA)建议在欧盟授予Rezdiffra有条件上市许可,用于治疗非肝硬化代谢功能障碍相关脂肪性肝炎(MASH)伴中重度肝纤维化成人患者。MASH是一种因肝脏脂肪堆积引发炎症的严重疾病,常伴随心血管及代谢性疾病,若未及时干预,则可能进展为肝硬化甚至肝癌。目前欧盟尚无获批的MASH治疗药物。 展开更多
关键词 ema 代谢功能障碍 有条件批准 非肝硬化
暂未订购
EMA建议欧盟有条件批准Zemcelpro用于治疗成人血癌患者
19
作者 本刊(译) 《首都食品与医药》 2025年第19期6-6,共1页
欧洲药品管理局(EMA)近日建议欧盟授予Zemcelpro有条件上市许可,用于治疗成人血液系统恶性肿瘤。该药适用于接受清髓性预处理(化疗和/或放疗)后需同种异体造血干细胞移植(allo-HSCT),且无其他合适供体细胞的患者。血液系统恶性肿瘤包括... 欧洲药品管理局(EMA)近日建议欧盟授予Zemcelpro有条件上市许可,用于治疗成人血液系统恶性肿瘤。该药适用于接受清髓性预处理(化疗和/或放疗)后需同种异体造血干细胞移植(allo-HSCT),且无其他合适供体细胞的患者。血液系统恶性肿瘤包括白血病、淋巴瘤、骨髓增生异常综合征等,此类肿瘤严重威胁患者生命,同种异体造血干细胞移植是部分类型血液系统恶性肿瘤的潜在治愈手段,但需依赖供体配型。 展开更多
关键词 有条件上市许可 ema 成人血液系统恶性肿瘤 Zemcelpro
暂未订购
基于YOLOv10n+EMA注意力机制的车辆车牌检测
20
作者 赵晓晓 《电脑知识与技术》 2025年第13期8-11,共4页
随着车辆检测及车牌检测技术的发展,针对目前车辆检测和车牌检测因其在整幅图像中所占比例较小而影响检测精度的问题,提出了一种基于YOLOv10n+EMA注意力机制的算法用于车辆检测和车牌检测。首先,将检测类别设定为两个,并设置算法所用的... 随着车辆检测及车牌检测技术的发展,针对目前车辆检测和车牌检测因其在整幅图像中所占比例较小而影响检测精度的问题,提出了一种基于YOLOv10n+EMA注意力机制的算法用于车辆检测和车牌检测。首先,将检测类别设定为两个,并设置算法所用的数据集文件和模型参数文件;其次,设计EMA注意力机制模块,并将EMA注意力机制添加到YOLOv10n算法的主干网络(backbone)中;最后,根据EMA注意力在YOLOv10n中的位置设计算法所用的模型结构文件,并训练算法模型。在公开数据集上的实验结果表明,所提方法在车辆和车牌检测任务中,Box(P)(准确率)、Box(R)(召回率)、m AP50(平均精度均值50)、mAP50-95(平均精度均值50-95)等四个指标均优于仅采用YOLOv10n检测的结果。 展开更多
关键词 YOLOv10n ema注意力 注意力机制 车辆检测 车牌检测
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部