期刊文献+
共找到26,967篇文章
< 1 2 250 >
每页显示 20 50 100
基于EMA3D的民用飞机复合材料雷击电流分析
1
作者 胡昊 冯蕴雯 陈俊宇 《航空工程进展》 2026年第1期182-191,210,共11页
复合材料具有各向异性低电导率的特性,现阶段大多数飞机雷击电流仿真侧重于对金属材料的研究,致使复合材料飞机雷击后整机表面电流密度分布和瞬态电流传导无法得到有效表征。为保障民用飞机复合材料雷电防护设计和分析的有效性,将铺层... 复合材料具有各向异性低电导率的特性,现阶段大多数飞机雷击电流仿真侧重于对金属材料的研究,致使复合材料飞机雷击后整机表面电流密度分布和瞬态电流传导无法得到有效表征。为保障民用飞机复合材料雷电防护设计和分析的有效性,将铺层及纤维含量等影响下的各向异性电导率矩阵引入三维时域有限差分法,分析复合材料雷击电流传导原理,并基于EMA3D仿真软件开展雷击电流分析;以某型等效复合材料蒙皮的民用飞机为对象进行多注入路径下的仿真验证,无防护措施下的结果表明:在击入点的局部区域以及机翼前后缘等尖锐部位的电流密度较大,并出现电流集中现象;自机鼻击入时电流优先沿着机身轴线方向传导,自机翼击入时电流优先沿着机翼前后缘的展向方向传导;复合材料飞机的瞬态电流较金属材料飞机存在传导滞后性。 展开更多
关键词 ema3D 复合材料 民用飞机 雷击电流
在线阅读 下载PDF
EMA集中上市许可申请审评工作流程及复审程序简介
2
作者 张帆 邸云瑞 +1 位作者 杨昊 许真玉 《中国医药工业杂志》 2026年第2期243-248,共6页
为保证药品技术审评工作的公平规范,各国药品监管部门探索并建立了相应的药品审评工作程序。在药品技术审评过程中,药品监管部门和申请人出于不同的立场、角度,可能会对技术审评结论产生争议,因此各国药品监管部门建立了争议解决机制。... 为保证药品技术审评工作的公平规范,各国药品监管部门探索并建立了相应的药品审评工作程序。在药品技术审评过程中,药品监管部门和申请人出于不同的立场、角度,可能会对技术审评结论产生争议,因此各国药品监管部门建立了争议解决机制。文章介绍了EMA集中上市许可申请审评工作流程及复审程序,梳理了EMA药品审评的各环节具体工作内容,同时明确了复审程序在EMA审评流程中所处的位置和具体工作内容,为不断推动优化我国药品审评争议解决程序提供借鉴和参考。 展开更多
关键词 ema 审评流程 复审程序 政策法规
原文传递
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
3
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
Single-Dimensional Encryption Against Stealthy Attacks on Stochastic Event-Based Estimation
4
作者 Jun Shang Di Zhao +1 位作者 Hanwen Zhang Dawei Shi 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期233-235,共3页
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond... Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks. 展开更多
关键词 enhance system securitywe securing singular data element single dimensional encryption stochastic event based estimation stealthiness condition security mitigation attack framework stealthy attacks
在线阅读 下载PDF
EMA建议欧盟扩大Uplizna适应证上市许可
5
作者 《首都食品与医药》 2026年第1期6-6,共1页
近日,欧洲药品管理局(EMA)向欧盟建议,将Uplizna的治疗适应证扩展至成人活动性免疫球蛋白G4相关性疾病(IgG4-RD)。此前,Uplizna已获批用于治疗视神经脊髓炎谱系疾病。IgG4-RD是一类罕见的慢性自身免疫病,该病多见于40-60岁人群,其发病... 近日,欧洲药品管理局(EMA)向欧盟建议,将Uplizna的治疗适应证扩展至成人活动性免疫球蛋白G4相关性疾病(IgG4-RD)。此前,Uplizna已获批用于治疗视神经脊髓炎谱系疾病。IgG4-RD是一类罕见的慢性自身免疫病,该病多见于40-60岁人群,其发病机制为人体自身防御系统攻击正常组织。 展开更多
关键词 ema IgG4-RD Uplizna 适应证 扩展 成人 视神经脊髓炎谱系疾病
暂未订购
AdvYOLO:An Improved Cross-Conv-Block Feature Fusion-Based YOLO Network for Transferable Adversarial Attacks on ORSIs Object Detection
6
作者 Leyu Dai Jindong Wang +2 位作者 Ming Zhou Song Guo Hengwei Zhang 《Computers, Materials & Continua》 2026年第4期767-792,共26页
In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free... In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions. 展开更多
关键词 Remote sensing object detection transferable adversarial attack feature fusion cross-conv-block
在线阅读 下载PDF
EMA建议欧盟授予Rezurock有条件上市许可
7
作者 本刊(译) 《首都食品与医药》 2026年第8期6-6,共1页
近日,欧洲药品管理局(EMA)建议欧盟授予Rezurock有条件上市许可,用于治疗12岁及以上、体重≥40kg的儿童及成人慢性移植物抗宿主病。慢性移植物抗宿主病是一种严重的远期致命性疾病,多发生在骨髓或干细胞移植后,由供者来源的细胞攻击受... 近日,欧洲药品管理局(EMA)建议欧盟授予Rezurock有条件上市许可,用于治疗12岁及以上、体重≥40kg的儿童及成人慢性移植物抗宿主病。慢性移植物抗宿主病是一种严重的远期致命性疾病,多发生在骨髓或干细胞移植后,由供者来源的细胞攻击受者机体引发。该疾病可累及人体多个器官,诱发皮肤纤维化、关节活动度下降、肺损伤等并发症,严重损害患者的身体功能和整体生活质量。在因血液系统肿瘤、免疫缺陷综合征等疾病接受干细胞移植的患者中,成人慢性移植物抗宿主病的发病率为30%-70%,儿童发病率为6%-33%。 展开更多
关键词 慢性移植物抗宿主病 ema Rezurock 有条件上市许可
暂未订购
Prompt Injection Attacks on Large Language Models:A Survey of Attack Methods,Root Causes,and Defense Strategies
8
作者 Tongcheng Geng Zhiyuan Xu +1 位作者 Yubin Qu W.Eric Wong 《Computers, Materials & Continua》 2026年第4期134-185,共52页
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man... Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs. 展开更多
关键词 Prompt injection attacks large language models defense mechanisms security evaluation
在线阅读 下载PDF
Recent Advances in Deep-Learning Side-Channel Attacks on AES Implementations
9
作者 Junnian Wang Xiaoxia Wang +3 位作者 Zexin Luo Qixiang Ouyang Chao Zhou Huanyu Wang 《Computers, Materials & Continua》 2026年第4期95-133,共39页
Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attracti... Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attractive victims for themalicious actions of adversaries.Within the spectrumof existing threats,Side-ChannelAttacks(SCAs)have established themselves as an effective way to compromise cryptographic implementations.These attacks exploit unintended,unintended physical leakage that occurs during the cryptographic execution of devices,bypassing the theoretical strength of the crypto design.In recent times,the advancement of deep learning has provided SCAs with a powerful ally.Well-trained deep-learningmodels demonstrate an exceptional capacity to identify correlations between side-channel measurements and sensitive data,thereby significantly enhancing such attacks.To further understand the security threats posed by deep-learning SCAs and to aid in formulating robust countermeasures in the future,this paper undertakes an exhaustive investigation of leading-edge SCAs targeting Advanced Encryption Standard(AES)implementations.The study specifically focuses on attacks that exploit power consumption and electromagnetic(EM)emissions as primary leakage sources,systematically evaluating the extent to which diverse deep learning techniques enhance SCAs acrossmultiple critical dimensions.These dimensions include:(i)the characteristics of publicly available datasets derived from various hardware and software platforms;(ii)the formalization of leakage models tailored to different attack scenarios;(iii)the architectural suitability and performance of state-of-the-art deep learning models.Furthermore,the survey provides a systematic synthesis of current research findings,identifies significant unresolved issues in the existing literature and suggests promising directions for future work,including cross-device attack transferability and the impact of quantum-classical hybrid computing on side-channel security. 展开更多
关键词 Side-channel attacks deep learning advanced encryption standard power analysis EM analysis
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
10
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Coding-based distributed filtering for cyber–physical systems under denial of service attacks
11
作者 Shuang Feng Damián Marelli +2 位作者 Chen Wang Minyue Fu Tianju Sui 《Journal of Automation and Intelligence》 2026年第1期13-23,共11页
This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems.A particular feature of our work is that we consider systems in which the state is constrained... This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems.A particular feature of our work is that we consider systems in which the state is constrained by saturation.Measurements are transmitted to nodes of a sensor network over unreliable wireless channels.We propose a linear coding mechanism,together with a distributed method for obtaining a state estimate at each node.These designs aim to minimize the state estimation error covariance.In addition,we derive a bound on this covariance,and accommodate the design parameters to minimize this bound.The resulting design depends on the packet loss probabilities of the wireless channels.This permits applying the proposed scheme to systems in which communications suffer from denial-of-service attacks,as such attacks typically affect those probabilities.Finally,we present a numerical example illustrating this application. 展开更多
关键词 Cyber–physical system Sensor network Denial-of-service attack Linear coding State saturation
在线阅读 下载PDF
Attack-Resilient Distributed Nash Equilibrium Seeking for Networked Games Under Unbounded FDI Attacks:Theory and Experiment
12
作者 Zhi Feng Zhexin Shi +2 位作者 Xiwang Dong Guoqiang Hu Jinhu Lv 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期98-109,共12页
An attack-resilient distributed Nash equilibrium(NE) seeking problem is addressed for noncooperative games of networked systems under malicious cyber-attacks,i.e.,false data injection(FDI) attacks.Different from many ... An attack-resilient distributed Nash equilibrium(NE) seeking problem is addressed for noncooperative games of networked systems under malicious cyber-attacks,i.e.,false data injection(FDI) attacks.Different from many existing distributed NE seeking works,it is practical and challenging to get resilient adaptively distributed NE seeking under unknown and unbounded FDI attacks.An attack-resilient NE seeking algorithm that is distributed(i.e.,independent of global information on the graph's algebraic connectivity,Lipschitz and monotone constants of pseudo-gradients,or number of players),is presented by means of incorporating the consensus-based gradient play with a distributed attack identifier so as to achieve simultaneous NE seeking and attack identification asymptotically.Another key characteristic is that FDI attacks are allowed to be unknown and unbounded.By exploiting nonsmooth analysis and stability theory,the global asymptotic convergence of the developed algorithm to the NE is ensured.Moreover,we extend this design to further consider the attack-resilient NE seeking of double-integrator players.Lastly,numerical simulation and practical experiment results are presented to validate the developed algorithms' effectiveness. 展开更多
关键词 Adaptively distributed NE seeking attack-resilient mechanism noncooperative game unknown FDI attack
在线阅读 下载PDF
Reachability Analysis for the Impact of Cyber Attacks on Wide-area Control System Considering Wind Power Uncertainty Based on Kron Reduction and Zonotopes
13
作者 Wen Gao Huayu Huang +3 位作者 Kaishun Xiahou Yang Liu Zhaoxi Liu Q.H.Wu 《CSEE Journal of Power and Energy Systems》 2026年第1期244-257,共14页
The wide-area damping controllers(WADCs),which are essential for mitigating regional low-frequency oscillations,face cyber-physical security threats due to the vulnerability of wide-area measurement system to cyber at... The wide-area damping controllers(WADCs),which are essential for mitigating regional low-frequency oscillations,face cyber-physical security threats due to the vulnerability of wide-area measurement system to cyber attacks and wind power uncertainties.This paper introduces reachability analysis method to quantify the impact of varying-amplitude attacks and uncertain wind fluctuations on the performance of WADC.Firstly,considering wind farm integration and attack injection,a nonlinear power system model with multiple buses is constructed based on Kron reduction method to improve computational efficiency and mitigate the constraints imposed by algebraic constraints.Then,a zonotope-based polytope construction method is employed to effectively model the range of attack amplitudes and wind uncertainties.By conducting reachability analysis,the reachable set preserving the nonlinear characteristics of studied system is computed,which enables the quantification of the maximum fluctuation range of regional oscillations under the dual disturbances.Case studies are undertaken on two multi-machine power systems with wind farm integration.The obtained results emphasize the efficacy of designed method,providing valuable insights into the magnitude of the impact that attacks exert on the operational characteristics of power system under various uncertain factors. 展开更多
关键词 Cyber attack quantitative assessment reachability analysis Wide-area damping controller wind power fluctuations
原文传递
Mitigating Sidelobe-Driven Attacks in OFDM-Based Cognitive Radio Networks
14
作者 Bakhtawar Gul Atif Elahi +3 位作者 Tahir Saleem Noor Gul Fahad Algarni Insaf Ullah 《Computers, Materials & Continua》 2026年第5期1986-2004,共19页
Orthogonal Frequency Division Multiplexing(OFDM)enables efficient Dynamic Spectrum Access(DSA)but suffers from high sidelobe that causes excessive out-of-band(OOB)emissions and expose the system to spectrum-layer cybe... Orthogonal Frequency Division Multiplexing(OFDM)enables efficient Dynamic Spectrum Access(DSA)but suffers from high sidelobe that causes excessive out-of-band(OOB)emissions and expose the system to spectrum-layer cyberattacks such as man-in-the-middle(MITM),eavesdropping,and primary user emulation(PUE)attacks.To address both spectral leakage and its security implications,this paper introduces a secure and intelligent hybrid optimization strategy that combinesan Eigenspace-based Generalized Sidelobe Canceller(ES-GSC)with a Genetic Algorithm(GA),to derive optimally weighted cancellation carriers.The proposed method jointly suppresses sidelobes and reinforces resistance to leakage-based attacks.MATLAB Simulation demonstrate considerable reductions in OOB emissions and higher resilience against spectrum-layer threats compared with existing techniques. 展开更多
关键词 CYBERSECURITY cognitive radios network generalized sidelobe canceler orthogonal frequency division multiplexing primary user emulation attack sidelobe suppression
在线阅读 下载PDF
Switching-Like Sliding Mode Security Control Against DoS Attacks:A Novel Attack-Related Adaptive Event-Triggered Scheme
15
作者 Jiancun Wu Zhiru Cao +1 位作者 Engang Tian Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期137-148,共12页
In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication r... In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication resources more effectively,a novel adaptive event-triggered(AET) mechanism is introduced,whose triggering coefficient can be adaptively adjusted according to the evolution trend of system states.Differing from existing event-triggered(ET) mechanisms,the proposed one demonstrates exceptional relevance and flexibility.It is closely related to attack probability,and its triggering coefficient dynamically adjusts depending on the presence or absence of an attack.To leverage attacker information more effectively,a switching-like sliding mode security controller is designed,which can autonomously select different controller gains based on the sliding function representing the attack situation.Sufficient conditions for the existence of the switching-like sliding mode secure controller are presented to ensure the stochastic stability of the system and the reachability of the sliding surface.Compared with existing time-invariant control strategies within the triggered interval,more resilient defense performance can be expected since the correlation with attack information is established in both the proposed AET scheme and the control strategy.Finally,a simulation example is conducted to verify the effectiveness and feasibility of the proposed security control method. 展开更多
关键词 Adaptive event-triggered(AET)mechanism denial of service(DoS)attacks networked control systems(NCSs) sliding mode control(SMC)
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
16
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
Leader-Follower Formation Control of Quadrotor UAVs With Stochastic Impulsive Deception Attacks
17
作者 Wenhao Song Chang Liu +1 位作者 Xiuping Han Xiaodi Li 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期483-485,共3页
Dear Editor,This letter presents some control strategies for quadrotor unmanned aerial vehicle(UAV)leader-follower formation model,where the stochastic impulsive deception attacks are fully considered.Based on Lyapuno... Dear Editor,This letter presents some control strategies for quadrotor unmanned aerial vehicle(UAV)leader-follower formation model,where the stochastic impulsive deception attacks are fully considered.Based on Lyapunov method,the outer loop and the inner loop controllers of quadrotor UAV are designed,respectively.Moreover,a relationship between continuous control laws,stochastic impulsive sequences,and impulsive intensity is established in this letter. 展开更多
关键词 quadrotor uav quadrotor unmanned aerial vehicle uav leader follower stochastic impulsive deception attacks continuous control lawsstochastic impulsive sequencesand leader follower formation lyapunov methodthe outer loop control strategies
在线阅读 下载PDF
基于动态EMA的半监督矿工不安全行为识别技术研究
18
作者 段玉英 董光源 《能源与节能》 2025年第12期80-83,87,共5页
针对煤矿生产中矿工不安全行为识别这一关键问题,提出了一种基于动态EMA(Exponential Moving Average,指数移动平均)的半监督学习方法。构建了教师-学生双模型架构,通过针对多源数据的采集系统获取矿工行为数据,设计了包含时空特征提取... 针对煤矿生产中矿工不安全行为识别这一关键问题,提出了一种基于动态EMA(Exponential Moving Average,指数移动平均)的半监督学习方法。构建了教师-学生双模型架构,通过针对多源数据的采集系统获取矿工行为数据,设计了包含时空特征提取、注意力机制和多任务学习框架的识别算法。实验结果表明,该方法在6类典型不安全行为识别中取得了91.2%~97.5%的准确率,平均检测时间不大于48 ms,具备良好的实时性。研究成果为煤矿安全生产智能监控提供了新的技术方案,对提升矿山安全管理水平具有重要意义。 展开更多
关键词 矿工不安全行为 动态ema 半监督学习 实时监控
在线阅读 下载PDF
基于IG-EMA-U2Net的黄铁矿浮选泡沫图像分割算法 被引量:3
19
作者 杜荣谦 刘琼 刘光举 《金属矿山》 北大核心 2025年第3期202-209,共8页
浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿... 浮选泡沫的表面视觉特征是浮选工况和相关工艺指标的指示器,传统的浮选泡沫图像分割方法存在特征提取能力弱、边缘分割不准确、容易造成漏分割等问题。为解决这一现实问题,以便更科学、客观地实现对浮选作业的智能化控制,研究以黄铁矿浮选泡沫为对象,提出了改进的IG-EMA-U2Net泡沫分割算法。该算法以U2Net为主干网络,首先在U2Net外部的下采样处引入EMA注意力机制,提升网络对泡沫的关注度,减少下采样和跳跃连接造成的空间信息损失;再将改进的InceptionV1+BN模块替换RSU7残差块的第一层卷积池化模块,得到IRU模块,增强对泡沫图像特征信息的提取能力;最后提出GRU模块,使用GhostConv替代RSU5、RSU4和RSU4F中的传统卷积,在分割精度不变的情况下,减小算法的计算成本和参数量。研究表明,IG-EMA-U2Net算法的Dice系数、召回率R和F1-score分别达93.98%、94.07%和94.00%,较常用分割算法UNet、DeepLabV3+和U2Net的分割精度更高、分割效果更好,有效减少了漏分割。 展开更多
关键词 泡沫浮选 图像分割 U2Net ema模块 GhostConv
在线阅读 下载PDF
Fresh Frozen Plasma for the Treatment of Hereditary Angioedema Acute Attacks 被引量:4
20
作者 Rui Tang Shi Chen Hong-yu Zhang 《Chinese Medical Sciences Journal》 CAS CSCD 2012年第2期92-95,共4页
Objective To determine the safety and efficacy of fresh frozen plasma (FFP) iniusion for the treat- ment of hereditary angioedema (FIAE). Methods The medical records of patients with HAE admitted to Peking Union ... Objective To determine the safety and efficacy of fresh frozen plasma (FFP) iniusion for the treat- ment of hereditary angioedema (FIAE). Methods The medical records of patients with HAE admitted to Peking Union Medical College Fiospital who had received FFP infusion during 2004 and 2010 were reviewed and PubMed database iFom 1966 to the present were searched using the following key words: hereditary angioedema and fresh frozen plasma. The patient's age, sex, body location of HAE attacks, the dose of FFP infusion, time of beginning to improvenaent, time to complete remission, complication, C 1 inhibitor activity, and outcome were analyzed. Results A total of 13 enrolled patients (7 male and 6 female) received 16 times of FFP infusion, in- cluding 2 patients undergoing FFP infusion in Peking Union Medical College Hospital and 11 patients re- ported in the literature. The mean dosage of FFP infusion was 586±337 mL. Two cases suffered from wors- ening abdominal pain and one case experienced skin rash. Only I patient had no improvement in symptom owing to transfusion related reaction. There was a definite improvement in symptom 49± 19 minutes after beginning FFP infusion. The remission time decreased from 61.7±27.0 hours to 3.3 (2.0, 12.0) hours after FFP infusion. FFP infusion was effective for both type I and type Ⅱ HAE. Conclusion FFP seems to be safe and effective for acute attacks of HAE. 展开更多
关键词 hereditary angioedema acute attacks fresh frozen plasma TREATMENT
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部