期刊文献+
共找到26,554篇文章
< 1 2 250 >
每页显示 20 50 100
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
1
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
EMA建议欧盟扩大Uplizna适应证上市许可
2
作者 《首都食品与医药》 2026年第1期6-6,共1页
近日,欧洲药品管理局(EMA)向欧盟建议,将Uplizna的治疗适应证扩展至成人活动性免疫球蛋白G4相关性疾病(IgG4-RD)。此前,Uplizna已获批用于治疗视神经脊髓炎谱系疾病。IgG4-RD是一类罕见的慢性自身免疫病,该病多见于40-60岁人群,其发病... 近日,欧洲药品管理局(EMA)向欧盟建议,将Uplizna的治疗适应证扩展至成人活动性免疫球蛋白G4相关性疾病(IgG4-RD)。此前,Uplizna已获批用于治疗视神经脊髓炎谱系疾病。IgG4-RD是一类罕见的慢性自身免疫病,该病多见于40-60岁人群,其发病机制为人体自身防御系统攻击正常组织。 展开更多
关键词 ema IgG4-RD Uplizna 适应证 扩展 成人 视神经脊髓炎谱系疾病
暂未订购
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
3
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
4
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
基于动态EMA的半监督矿工不安全行为识别技术研究
5
作者 段玉英 董光源 《能源与节能》 2025年第12期80-83,87,共5页
针对煤矿生产中矿工不安全行为识别这一关键问题,提出了一种基于动态EMA(Exponential Moving Average,指数移动平均)的半监督学习方法。构建了教师-学生双模型架构,通过针对多源数据的采集系统获取矿工行为数据,设计了包含时空特征提取... 针对煤矿生产中矿工不安全行为识别这一关键问题,提出了一种基于动态EMA(Exponential Moving Average,指数移动平均)的半监督学习方法。构建了教师-学生双模型架构,通过针对多源数据的采集系统获取矿工行为数据,设计了包含时空特征提取、注意力机制和多任务学习框架的识别算法。实验结果表明,该方法在6类典型不安全行为识别中取得了91.2%~97.5%的准确率,平均检测时间不大于48 ms,具备良好的实时性。研究成果为煤矿安全生产智能监控提供了新的技术方案,对提升矿山安全管理水平具有重要意义。 展开更多
关键词 矿工不安全行为 动态ema 半监督学习 实时监控
在线阅读 下载PDF
基于IG-EMA-U2Net的黄铁矿浮选泡沫图像分割算法 被引量:2
6
作者 杜荣谦 刘琼 刘光举 《金属矿山》 北大核心 2025年第3期202-209,共8页
浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿... 浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿浮选泡沫为对象,提出了改进的IG-EMA-U2Net泡沫分割算法。该算法以U2Net为主干网络,首先在U2Net外部的下采样处引入EMA注意力机制,提升网络对泡沫的关注度,减少下采样和跳跃连接造成的空间信息损失;再将改进的InceptionV1+BN模块替换RSU7残差块的第一层卷积池化模块,得到IRU模块,增强对泡沫图像特征信息的提取能力;最后提出GRU模块,使用GhostConv替代RSU5、RSU4和RSU4F中的传统卷积,在分割精度不变的情况下,减小算法的计算成本和参数量。研究表明,IG-EMA-U2Net算法的Dice系数、召回率R和F1-score分别达93.98%、94.07%和94.00%,较常用分割算法UNet、DeepLabV3+和U2Net的分割精度更高、分割效果更好,有效减少了漏分割。 展开更多
关键词 泡沫浮选 图像分割 U2Net ema模块 GhostConv
在线阅读 下载PDF
Fresh Frozen Plasma for the Treatment of Hereditary Angioedema Acute Attacks 被引量:4
7
作者 Rui Tang Shi Chen Hong-yu Zhang 《Chinese Medical Sciences Journal》 CAS CSCD 2012年第2期92-95,共4页
Objective To determine the safety and efficacy of fresh frozen plasma (FFP) iniusion for the treat- ment of hereditary angioedema (FIAE). Methods The medical records of patients with HAE admitted to Peking Union ... Objective To determine the safety and efficacy of fresh frozen plasma (FFP) iniusion for the treat- ment of hereditary angioedema (FIAE). Methods The medical records of patients with HAE admitted to Peking Union Medical College Fiospital who had received FFP infusion during 2004 and 2010 were reviewed and PubMed database iFom 1966 to the present were searched using the following key words: hereditary angioedema and fresh frozen plasma. The patient's age, sex, body location of HAE attacks, the dose of FFP infusion, time of beginning to improvenaent, time to complete remission, complication, C 1 inhibitor activity, and outcome were analyzed. Results A total of 13 enrolled patients (7 male and 6 female) received 16 times of FFP infusion, in- cluding 2 patients undergoing FFP infusion in Peking Union Medical College Hospital and 11 patients re- ported in the literature. The mean dosage of FFP infusion was 586±337 mL. Two cases suffered from wors- ening abdominal pain and one case experienced skin rash. Only I patient had no improvement in symptom owing to transfusion related reaction. There was a definite improvement in symptom 49± 19 minutes after beginning FFP infusion. The remission time decreased from 61.7±27.0 hours to 3.3 (2.0, 12.0) hours after FFP infusion. FFP infusion was effective for both type I and type Ⅱ HAE. Conclusion FFP seems to be safe and effective for acute attacks of HAE. 展开更多
关键词 hereditary angioedema acute attacks fresh frozen plasma TREATMENT
在线阅读 下载PDF
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
8
作者 Nisreen Innab Ahmed Abdelgader Fadol Osman +4 位作者 Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh 《Computers, Materials & Continua》 SCIE EI 2024年第7期1325-1345,共21页
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise ... Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise in phishing attacks.Moreover,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to identify.Hence,it is imperative to utilize sophisticated algorithms to address this issue.Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors.Machine learning(ML)approaches can identify common characteristics in most phishing assaults.In this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing datasets.After that,we used the normalization technique on the dataset to transform the range of all the features into the same range.The findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best results.While in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction process.Also,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate. 展开更多
关键词 Social engineering attacks phishing attacks machine learning SECURITY artificial intelligence
在线阅读 下载PDF
EMA“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”介绍及其启示 被引量:1
9
作者 萧惠来 《药物评价研究》 北大核心 2025年第1期1-10,共10页
EMA于2024年2月发布了“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”。TE是指受试制剂和参比制剂的疗效和安全性非常相似,从而可以可靠地排除产品之间的临床相关差异。该指导原则提出这类药... EMA于2024年2月发布了“证明用于哮喘和慢性阻塞性肺疾病(COPD)的经口吸入制剂(OIP)治疗等效性(TE)要求指导原则”。TE是指受试制剂和参比制剂的疗效和安全性非常相似,从而可以可靠地排除产品之间的临床相关差异。该指导原则提出这类药物的TE研究,应采用循序渐进的方法。如果能满足所有体外要求,则可在体外证明TE。如果尽管存在一些体外差异,但能证明全身暴露(作为安全性的替代指标)和肺吸收/沉积(作为疗效的替代指标)等效,则可通过药动学证明TE。通常不建议使用药效学或临床终点证明TE,因为这些终点不敏感。该指导原则还用大量篇幅对这类药物治疗等效性研究的许多具体问题提出了建议。详细介绍该指导原则,期望对我国这类药物的治疗等效性研究和审评有启示。 展开更多
关键词 欧洲药品管理局(ema) 哮喘 慢性阻塞性肺疾病 经口吸入制剂 治疗等效性 指导原则
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
10
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
11
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
EMA-8干法温拌高黏弹改性沥青超薄磨耗层路用性能评价研究 被引量:3
12
作者 刘飞 韩书龙 +4 位作者 孟伟坤 岳浩 武文鑫 林江涛 樊亮 《合成材料老化与应用》 2025年第1期29-31,共3页
为兼顾沥青路面超薄磨耗层经济成本及能耗,采用乳液型高黏改性剂进行EMA-8高黏弹改性沥青及其混合料的制备与评价,并进行工程验证。结果表明:EMA-8高黏弹改性沥青64℃车辙因子达到12kPa以上;LAS试验疲劳次数达到47389次,相对于市售SBS... 为兼顾沥青路面超薄磨耗层经济成本及能耗,采用乳液型高黏改性剂进行EMA-8高黏弹改性沥青及其混合料的制备与评价,并进行工程验证。结果表明:EMA-8高黏弹改性沥青64℃车辙因子达到12kPa以上;LAS试验疲劳次数达到47389次,相对于市售SBS改性沥青和高黏弹改性沥青,疲劳寿命分别增加了75.8%和20.7%;干法工艺下混合料具有温拌特性,相较于市售高黏弹改性沥青混合料降低施工温度近20℃;其混合料低温、水稳定性能与市售高黏弹改性沥青混合料相当,动稳定度超过市售高黏弹改性沥青混合料27.8%。工程实践表明,EMA-8高黏沥青混合料具有成本及性能优势。 展开更多
关键词 道路工程 ema-8 高黏弹改性沥青 超薄磨耗层 路用性能
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
13
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
14
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game Networked control systems Hybrid attacks DoS attack FDI attack
在线阅读 下载PDF
Differential-Linear Attacks on Ballet Block Cipher
15
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
Several Attacks on Attribute-Based Encryption Schemes
16
作者 Phi Thuong Le Huy Quoc Le Viet Cuong Trinh 《Computers, Materials & Continua》 2025年第6期4741-4756,共16页
Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digita... Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digital rightsmanagement.ABE schemes rely on hard cryptographic assumptions such as pairings and others(pairingfree)to ensure their security against external and internal attacks.Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent.One common internal attack is the attribute collusion attack,in which users with different attribute keys collaborate to decrypt data they could not individually access.This paper focuses on the ciphertext-policy ABE(CP-ABE),a type of ABE where ciphertexts are produced with access policies.Our firstwork is to carry out the attribute collusion attack against several existing pairingfree CP-ABE schemes.As a main contribution,we introduce a novel attack,termed the anonymous key-leakage attack,concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection.This kind of internal attack has not been defined or investigated in the literature.We then show that several prominent pairing-based CP-ABE schemes are vulnerable to this attack.We believe that this work will contribute to helping the community evaluate suitable CP-ABE schemes for secure deployment in real-life applications. 展开更多
关键词 Attribute-based encryption ciphertext-policy attribute collusion attack anonymous key-leakage attack
在线阅读 下载PDF
An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm
17
作者 Bing Liu Ting Nie +1 位作者 Yansong Liu Weibo Hu 《Computers, Materials & Continua》 2025年第9期4583-4599,共17页
Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,th... Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,the BIKE scheme based on QC-MDPC(Quasi Cyclic Medium Density Parity Check)codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate(DFR).This paper analyzes the BGF decoding algorithm of the BIKE scheme,revealing two deep factors that lead to DFR,and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors.The proposed method constructs a new weak key set,and experiment results eventually indicate that,considering BIKE’s parameter set targeting 128-bit security,the average decryption failure rate is lowerly bounded by.This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design.By addressing these weaknesses,the robustness of QC-MDPC code-based cryptographic systems can be enhanced,paving the way for more secure post-quantum cryptographic solutions. 展开更多
关键词 BIKE BGF decoding algorithm weak key attack GJS attack
在线阅读 下载PDF
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
18
作者 Yu-Ang Wang Zidong Wang +2 位作者 Lei Zou Bo Shen Hongli Dong 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期114-125,共12页
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) perfect stealthy attacks watermark-based strategy
在线阅读 下载PDF
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
19
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
Security and Privacy in Permissioned Blockchain Interoperability:A Systematic Review
20
作者 Alsoudi Dua TanFong Ang +5 位作者 Chin Soon Ku Okmi Mohammed Yu Luo Jiahui Chen Uzair Aslam Bhatti Lip Yee Por 《Computers, Materials & Continua》 2025年第11期2579-2624,共46页
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst... Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems. 展开更多
关键词 Blockchain security PRIVACY ATTACK THREAT INTEROPERABILITY cross-chain
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部