This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates senso...This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates sensor and actuator disturbances within the dynamics of follower robots.Each follower robot has unknown dynamics and control inputs,which expose it to the risks of both sensor and actuator attacks.The leader robot,described by a secondorder,time-varying nonlinear model,transmits its position,velocity,and acceleration information to follower robots through a wireless connection.To handle the complex setup and communication among robots in the network,we design a robust hybrid distributed adaptive control strategy combining the effect of sensor and actuator attack,which ensures asymptotic consensus,extending beyond conventional bounded consensus results.The proposed framework employs fuzzy logic systems(FLSs)as proactive controllers to estimate unknown nonlinear behaviors,while also effectively managing sensor and actuator attacks,ensuring stable consensus among all agents.To counter the impact of the combined signal attack on follower dynamics,a specialized robust control mechanism is designed,sustaining system stability and performance under adversarial conditions.The efficiency of this control strategy is demonstrated through simulations conducted across two different directed communication topologies,underscoring the protocol’s adaptability,resilience,and effectiveness in maintaining global consensus under complex attack scenarios.展开更多
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter...The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC.展开更多
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner...Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.展开更多
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug...Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.展开更多
Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary freque...Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary frequency regulation(PFR),this paper proposes a novel hybrid energy storage system(HESS)control strategy based on Newton-Raphson optimization algorithm(NRBO)-VMD and a fuzzy neural network(FNN)for PFR.In the primary power allocation stage,the high inertia and slow response of thermal power units prevent them from promptly responding to the high-frequency components of PFR signals,leading to increased mechanical stress.To address the distinct response characteristics of thermal units and HESS,an NRBO-VMD based decomposition method for PFR signals is proposed,enabling a flexible system response to grid frequency deviations.Within the HESS,an adaptive coordinated control strategy and a State of Charge(SOC)self-recovery strategy are introduced.These strategies autonomously adjust the virtual inertia and droop coefficients based on the depth of frequency regulation and the real-time SOC.Furthermore,a FNN is constructed to perform secondary refinement of the internal power distribution within the HESS.Finally,simulations under various operational conditions demonstrate that the proposed strategy effectively mitigates frequent power adjustments of the thermal unit during PFR,adaptively achieves optimal power decomposition and distribution,maintains the flywheel energy storage’s SOC within an optimal range,and ensures the long-term stable operation of the HESS.展开更多
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an...The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security.展开更多
Mobile Ad-hoc Networks(MANET)usage across the globe is increas-ing by the day.Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes...Mobile Ad-hoc Networks(MANET)usage across the globe is increas-ing by the day.Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes.The trust values are estimated based on the reputation values of each node in the network by using different mechanisms.However,these mechanisms have various challenging issues which degrade the network performance.Hence,a novel Quality of Service(QoS)Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work.Initially,the QoS-based trust estimation is proposed by using a Fuzzy logic scheme.The trust value of each node is estimated by using each node’s reputation values which are deter-mined based on the fuzzy membership function values and utilizing QoS para-meters such as residual energy,bandwidth,node mobility,and reliability.This mechanism prevents only the black hole attack in the network during transmis-sion.But,the gray hole attacks are not identified which in turn increases the pack-et drop rate significantly.Hence,the gray hole attack is also detected based on the Kullback-Leibler(KL)divergence method used for estimating the statistical mea-sures.Additional QoS metrics are considered to prevent the gray hole attack,such as packet loss,packet delivery ratio,and delay for each node.Thus,the proposed mechanism prevents both black hole and gray hole attacks simultaneously.Final-ly,the simulation results show that the effectiveness of the proposed mechanism compared with the other trust-aware routing protocols in MANET.展开更多
Multi-view clustering is a critical research area in computer science aimed at effectively extracting meaningful patterns from complex,high-dimensional data that single-view methods cannot capture.Traditional fuzzy cl...Multi-view clustering is a critical research area in computer science aimed at effectively extracting meaningful patterns from complex,high-dimensional data that single-view methods cannot capture.Traditional fuzzy clustering techniques,such as Fuzzy C-Means(FCM),face significant challenges in handling uncertainty and the dependencies between different views.To overcome these limitations,we introduce a new multi-view fuzzy clustering approach that integrates picture fuzzy sets with a dual-anchor graph method for multi-view data,aiming to enhance clustering accuracy and robustness,termed Multi-view Picture Fuzzy Clustering(MPFC).In particular,the picture fuzzy set theory extends the capability to represent uncertainty by modeling three membership levels:membership degrees,neutral degrees,and refusal degrees.This allows for a more flexible representation of uncertain and conflicting data than traditional fuzzy models.Meanwhile,dual-anchor graphs exploit the similarity relationships between data points and integrate information across views.This combination improves stability,scalability,and robustness when handling noisy and heterogeneous data.Experimental results on several benchmark datasets demonstrate significant improvements in clustering accuracy and efficiency,outperforming traditional methods.Specifically,the MPFC algorithm demonstrates outstanding clustering performance on a variety of datasets,attaining a Purity(PUR)score of 0.6440 and an Accuracy(ACC)score of 0.6213 for the 3 Sources dataset,underscoring its robustness and efficiency.The proposed approach significantly contributes to fields such as pattern recognition,multi-view relational data analysis,and large-scale clustering problems.Future work will focus on extending the method for semi-supervised multi-view clustering,aiming to enhance adaptability,scalability,and performance in real-world applications.展开更多
文摘This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates sensor and actuator disturbances within the dynamics of follower robots.Each follower robot has unknown dynamics and control inputs,which expose it to the risks of both sensor and actuator attacks.The leader robot,described by a secondorder,time-varying nonlinear model,transmits its position,velocity,and acceleration information to follower robots through a wireless connection.To handle the complex setup and communication among robots in the network,we design a robust hybrid distributed adaptive control strategy combining the effect of sensor and actuator attack,which ensures asymptotic consensus,extending beyond conventional bounded consensus results.The proposed framework employs fuzzy logic systems(FLSs)as proactive controllers to estimate unknown nonlinear behaviors,while also effectively managing sensor and actuator attacks,ensuring stable consensus among all agents.To counter the impact of the combined signal attack on follower dynamics,a specialized robust control mechanism is designed,sustaining system stability and performance under adversarial conditions.The efficiency of this control strategy is demonstrated through simulations conducted across two different directed communication topologies,underscoring the protocol’s adaptability,resilience,and effectiveness in maintaining global consensus under complex attack scenarios.
文摘The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC.
文摘Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.
基金supported by Key Laboratory of Cyberspace Security,Ministry of Education,China。
文摘Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.
基金supported by the Lanzhou Science and Technology Plan Project(XM1753694781389).
文摘Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary frequency regulation(PFR),this paper proposes a novel hybrid energy storage system(HESS)control strategy based on Newton-Raphson optimization algorithm(NRBO)-VMD and a fuzzy neural network(FNN)for PFR.In the primary power allocation stage,the high inertia and slow response of thermal power units prevent them from promptly responding to the high-frequency components of PFR signals,leading to increased mechanical stress.To address the distinct response characteristics of thermal units and HESS,an NRBO-VMD based decomposition method for PFR signals is proposed,enabling a flexible system response to grid frequency deviations.Within the HESS,an adaptive coordinated control strategy and a State of Charge(SOC)self-recovery strategy are introduced.These strategies autonomously adjust the virtual inertia and droop coefficients based on the depth of frequency regulation and the real-time SOC.Furthermore,a FNN is constructed to perform secondary refinement of the internal power distribution within the HESS.Finally,simulations under various operational conditions demonstrate that the proposed strategy effectively mitigates frequent power adjustments of the thermal unit during PFR,adaptively achieves optimal power decomposition and distribution,maintains the flywheel energy storage’s SOC within an optimal range,and ensures the long-term stable operation of the HESS.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2025R97)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security.
文摘Mobile Ad-hoc Networks(MANET)usage across the globe is increas-ing by the day.Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes.The trust values are estimated based on the reputation values of each node in the network by using different mechanisms.However,these mechanisms have various challenging issues which degrade the network performance.Hence,a novel Quality of Service(QoS)Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work.Initially,the QoS-based trust estimation is proposed by using a Fuzzy logic scheme.The trust value of each node is estimated by using each node’s reputation values which are deter-mined based on the fuzzy membership function values and utilizing QoS para-meters such as residual energy,bandwidth,node mobility,and reliability.This mechanism prevents only the black hole attack in the network during transmis-sion.But,the gray hole attacks are not identified which in turn increases the pack-et drop rate significantly.Hence,the gray hole attack is also detected based on the Kullback-Leibler(KL)divergence method used for estimating the statistical mea-sures.Additional QoS metrics are considered to prevent the gray hole attack,such as packet loss,packet delivery ratio,and delay for each node.Thus,the proposed mechanism prevents both black hole and gray hole attacks simultaneously.Final-ly,the simulation results show that the effectiveness of the proposed mechanism compared with the other trust-aware routing protocols in MANET.
基金funded by the Research Project:THTETN.05/24-25,VietnamAcademy of Science and Technology.
文摘Multi-view clustering is a critical research area in computer science aimed at effectively extracting meaningful patterns from complex,high-dimensional data that single-view methods cannot capture.Traditional fuzzy clustering techniques,such as Fuzzy C-Means(FCM),face significant challenges in handling uncertainty and the dependencies between different views.To overcome these limitations,we introduce a new multi-view fuzzy clustering approach that integrates picture fuzzy sets with a dual-anchor graph method for multi-view data,aiming to enhance clustering accuracy and robustness,termed Multi-view Picture Fuzzy Clustering(MPFC).In particular,the picture fuzzy set theory extends the capability to represent uncertainty by modeling three membership levels:membership degrees,neutral degrees,and refusal degrees.This allows for a more flexible representation of uncertain and conflicting data than traditional fuzzy models.Meanwhile,dual-anchor graphs exploit the similarity relationships between data points and integrate information across views.This combination improves stability,scalability,and robustness when handling noisy and heterogeneous data.Experimental results on several benchmark datasets demonstrate significant improvements in clustering accuracy and efficiency,outperforming traditional methods.Specifically,the MPFC algorithm demonstrates outstanding clustering performance on a variety of datasets,attaining a Purity(PUR)score of 0.6440 and an Accuracy(ACC)score of 0.6213 for the 3 Sources dataset,underscoring its robustness and efficiency.The proposed approach significantly contributes to fields such as pattern recognition,multi-view relational data analysis,and large-scale clustering problems.Future work will focus on extending the method for semi-supervised multi-view clustering,aiming to enhance adaptability,scalability,and performance in real-world applications.