期刊文献+
共找到64篇文章
< 1 2 4 >
每页显示 20 50 100
Deceptive jamming suppression in multistatic radar based on coherent clustering 被引量:14
1
作者 ABDALLA Ahmed AHMED Mohaned Giess Shokrallah +2 位作者 ZHAO Yuan XIONG Ying TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期269-277,共9页
This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi... This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method. 展开更多
关键词 multistatic radar clustering analysis electronic counter-countermeasure(ECCM) deceptive jamming
在线阅读 下载PDF
Parameters Design of Pull-off Deceptive Jamming to Terminal Guidance Radar 被引量:3
2
作者 李云杰 张延彬 高梅国 《Journal of Beijing Institute of Technology》 EI CAS 2010年第3期362-366,共5页
A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in ... A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in range dimension,the velocity of the range gate pull-off,and the number of the decoy targets in velocity dimension and the velocity of the Doppler frequency pull-off.Also,the steps to design these parameters are brought out.The rules and design procedure discussed in this paper have important meaning for the choice of the reasonable jamming parameters in the practical applications,which can help to obtain good jamming effect. 展开更多
关键词 terminal guidance radar deceptive jamming range gate pull-off velocity Doppler frequency pulloff velocity
在线阅读 下载PDF
Pattern recognitionbased method for radar antideceptive jamming 被引量:2
3
作者 Ma Xiaoyan Qin Jiangmin Li Jianxun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期802-805,共4页
In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extractin... In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations. 展开更多
关键词 angle deceptive jamming ANTI-JAMMING pattern recognition feature extraction neural network.
在线阅读 下载PDF
Recognition and interfere deceptive behavior based on inverse reinforcement learning and game theory 被引量:2
4
作者 ZENG Yunxiu XU Kai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第2期270-288,共19页
In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s decep... In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s deceptive behavior into account which often occurs in RTS game scenarios,resulting in poor recognition results.In order to solve this problem,this paper proposes goal recognition for deceptive agent,which is an extended goal recognition method applying the deductive reason method(from general to special)to model the deceptive agent’s behavioral strategy.First of all,the general deceptive behavior model is proposed to abstract features of deception,and then these features are applied to construct a behavior strategy that best matches the deceiver’s historical behavior data by the inverse reinforcement learning(IRL)method.Final,to interfere with the deceptive behavior implementation,we construct a game model to describe the confrontation scenario and the most effective interference measures. 展开更多
关键词 deceptive path planning inverse reinforcement learning(IRL) game theory goal recognition
在线阅读 下载PDF
Vickrey-Clark-Groves-based Method for Eradicating Deceptive Behaviors in Demand Response Transactions 被引量:2
5
作者 Yingjun Wu Chengjun Liu +3 位作者 Zhiwei Lin Zhaorui Chen Runrun Chen Yuyang Chen 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第4期1260-1271,共12页
Demand response transactions between electric consumers,load aggregators,and the distribution network manager based on the"combination of price and incentive"are feasible and efficient.However,the incentive ... Demand response transactions between electric consumers,load aggregators,and the distribution network manager based on the"combination of price and incentive"are feasible and efficient.However,the incentive payment of demand re-sponse is quantified based on private information,which gives the electric consumers and load aggregators the possibility of defrauding illegitimate interests by declaring false information.This paper proposes a method based on Vickrey-Clark-Groves(VCG)theory to prevent electric consumers and load aggregators from taking illegitimate interests through deceptive behaviors in the demand response transactions.Firstly,a demand response transaction framework with the price-and-incentive com-bined mode is established to illustrate the deceptive behaviors in the demand response transactions.Then,the idea for eradi-cating deceptive behaviors based on VCG theory is given,and a detailed VCG-based mathematical model is constructed follow-ing the demand response transaction framework.Further,the proofs of incentive compatibility,individual rationality,cost minimization,and budget balance of the proposed VCG-based method are given.Finally,a modified IEEE 33-node system and a modified IEEE 123-node system are used to illustrate and validate the proposed method. 展开更多
关键词 Demand response TRANSACTION incentive mode cost-sharing false information deceptive behavior
原文传递
The schema deceptiveness and deceptive problems of genetic algorithms 被引量:1
6
作者 李敏强 寇纪淞 《Science in China(Series F)》 2001年第5期342-350,共9页
Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simpl... Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simple genetic operators. The past two decades saw a lot of successful industrial cases of GA application, and also revealed the urgency of practical theoretic guidance. This paper sets focus on the evolution dynamics of GA based on schema theorem and building block hypothesis (Schema Theory), which we thought would form the basis of profound theory of GA. The deceptive-ness of GA in solving multi-modal optimization problems encoded on {0,1} was probed in detail. First, a series of new concepts are defined mathematically as the schemata containment, schemata compe-tence. Then, we defined the schema deceptiveness and GA deceptive problems based on primary schemata competence, including fully deceptive problem, consistently deceptive problem, chronically deceptive problem, and fundamentally deceptive problem. Meanwhile, some novel propositions are formed on the basis of primary schemata competence. Finally, we use the trap function, a kind of bit unitation function, and a NiH function (needle-in-a-haystack) newly designed by the authors, to dis-play the affections of schema deceptiveness on the searching behavior of GA. 展开更多
关键词 genetic algorithms schema competition schema deceptiveness GA deceptive problems.
原文传递
Deceptive jamming discrimination based on range-angle localization of a frequency diverse array 被引量:4
7
作者 Zhao-jian ZHANG Jun-wei XIE +1 位作者 Chuan SHENG Zhun TANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1437-1446,共10页
We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency inc... We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency increment across elements. Due to the coupling between the angle and range, a mismatch between the test angle and physical angle occurs when the slant range on which the beam focuses is not equal to the slant range of the real target. In addition, the range of the target can be extracted by sum-difference beam except for time-delay testing, because the beam provides a range resolution in the FDA that cannot be deceived by traditional deceptive jamming. A strategy of using FDA to transmit two pulses with zero and nonzero frequency increments, respectively, is proposed to ensure that the angle of a target can be obtained by FDA. Moreover, the lo- calization performance is examined by analyzing the Cramer-Rao lower bound and detection probability. Effectiveness of the proposed method is confirmed by simulation results. 展开更多
关键词 Frequency diverse array (FDA) deceptive jamming Range-angle coupling Sum-difference beam DOUBLE-PULSE
原文传递
DCWord: A Novel Deep Learning Approach to Deceptive Review Identification by Word Vectors 被引量:3
8
作者 Wen Zhang Qiang Wang +2 位作者 Xiangjun Li Taketoshi Yoshida Jian Li 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2019年第6期731-746,共16页
Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text re... Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text representation called DCWord (Deep Context representation by Word vectors) to deceptive review identification.The basic idea is that since deceptive reviews and truthful reviews are composed by writers without and with real experience on using the online purchased goods or services,there should be different contextual information of words between them.Unlike state-of-the-art techniques in seeking best linguistic features for representation,we use word vectors to characterize contextual information of words in deceptive and truthful reviews automatically.The average-pooling strategy (called DCWord-A) and maxpooling strategy (called DCWord-M) are used to produce review vectors from word vectors.Experimental results on the Spam dataset and the Deception dataset demonstrate that the DCWord-M representation with LR (Logistic Regression) produces the best performances and outperforms state-of-the-art techniques on deceptive review identification.Moreover,the DCWord-M strategy outperforms the DCWord-A strategy in review representation for deceptive review identification.The outcome of this study provides potential implications for online review management and business intelligence of deceptive review identification. 展开更多
关键词 Online BUSINESS INTELLIGENCE skip-gram model DCWord representation deceptive REVIEW IDENTIFICATION deep learning
原文传递
Monitoring and Limiting Deceptive Counterfeiting:a Two-Stage Model
9
作者 Fang Liu Ke Liu Xin-Li Xie 《Journal of the Operations Research Society of China》 EI CSCD 2016年第3期265-308,共44页
Over past decades,deceptive counterfeits which cannot be recognized by ordinary consumers when purchasing,such as counterfeit cosmetics,have posed serious threats on consumers’health and safety,and resulted in huge e... Over past decades,deceptive counterfeits which cannot be recognized by ordinary consumers when purchasing,such as counterfeit cosmetics,have posed serious threats on consumers’health and safety,and resulted in huge economic loss and inestimable brand damages to the genuine goods at the same time.Thus,how to effectively control and eliminate deceptive counterfeits in the market has become a critical problem to the local government.One of the principal challenges in combating the cheating action for the government is how to enhance the enforcement of relative quality inspection agencies like industrial administration office(IAO).In this paper,we formulate a two-stage counterfeit product model with a fixed checking rate from IAO and a penalty for holding counterfeits.Tominimize the total expected cost over two stages,the retailer adopts optimal ordering policies which are correlated with the checking rate and penalty.Under certain circumstances,we find that the optimal expected cost function for the retailer is first-order continuous and convex.The optimal ordering policy in stage two depends closely on the inventory level after the first sales period.When the checking rate in stage one falls into a certain range,the optimal ordering policy for the retailer at each stage is to order both kinds of products.Knowing the retailer’s optimal ordering policy at each stage,IAO can modify the checking rate accordingly to keep the ratio of deceptive counterfeits on the market under a certain level. 展开更多
关键词 deceptive counterfeits Fixed checking rate PENALTY INVENTORY Optimal ordering policy STORAGE RESERVOIRS
原文传递
Does ischemic preconditioning enhance sports performance more than placebo or no intervention?A systematic review with meta-analysis
10
作者 Hiago L.R.Souza Géssyca T.Oliveira +5 位作者 Anderson Meireles Marcelo P.dos Santos Joao G.Vieira Rhai A.Arriel Stephen D.Patterson Moacir Marocolo 《Journal of Sport and Health Science》 2025年第2期21-34,共14页
Background:Ischemic preconditioning(IPC)is purported to have beneficial effects on athletic performance,although findings are inconsistent,with some studies reporting placebo effects.The majority of studies have inves... Background:Ischemic preconditioning(IPC)is purported to have beneficial effects on athletic performance,although findings are inconsistent,with some studies reporting placebo effects.The majority of studies have investigated IPC alongside a placebo condition,but without a control condition that was devoid of experimental manipulation,thereby limiting accurate determination of the IPC effects.Therefore,the aims of this study were to assess the impact of the IPC intervention,compared to both placebo and no intervention,on exercise capacity and athletic performance.Methods:A systematic search of PubMed,Embase,SPORTDiscus,Cochrane Library,and Latin American and Caribbean Health Sciences Literature(LILACS)covering records from their inception until July 2023 was conducted.To qualify for inclusion,studies had to apply IPC as an acute intervention,comparing it with placebo and/or control conditions.Outcomes of interest were performance(force,number of repetitions,power,time to exhaustion,and time trial performance),physiological measurements(maximum oxygen consumption,and heart rate),or perceptual measurements(RPE).For each outcome measure,we conducted 3 independent meta-analyses(IPC vs.placebo,IPC vs.control,placebo vs.control)using an inverse-variance random-effects model.The between-treatment effects were quantified by the standardized mean difference(SMD),accompanied by their respective 95%confidence intervals.Additionally,we employed the Grading of Recommendations,Assessment,Development and Evaluation(GRADE)approach to assess the level of certainty in the evidence.Results:Seventy-nine studies were included in the quantitative analysis.Overall,IPC demonstrates a comparable effect to the placebo condition(using a low-pressure tourniquet),irrespective of the subjects'training level(all outcomes presenting p>0.05),except for the outcome of time to exhaustion,which exhibits a small magnitude effect(SMD=0.37;p=0.002).Additionally,the placebo exhibited effects notably greater than the control condition(outcome:number of repetitions;SMD=0.45;p=0.03),suggesting a potential influence of participants'cognitive perception on the outcomes.However,the evidence is of moderate to low certainty,regardless of the comparison or outcome.Conclusion:IPC has significant effects compared to the control intervention,but it did not surpass the placebo condition.Its administration might be influenced by the cognitive perception of the receiving subject,and the efficacy of IPC as an ergogenic strategy for enhancing exercise capacity and athletic performance remains questionable. 展开更多
关键词 DECEPTION Nocebo effects Athletic performance REPERFUSION TOURNIQUETS
在线阅读 下载PDF
Optimized Attack and Detection on Multi-Sensor Cyber-Physical System
11
作者 Fangju Zhou Hanbo Zhang +2 位作者 Na Ye Jing Huang Zhu Ren 《Computers, Materials & Continua》 2025年第9期4539-4561,共23页
This paper explores security risks in state estimation based on multi-sensor systems that implement a Kalman filter and aχ^(2) detector.When measurements are transmitted via wireless networks to a remote estimator,th... This paper explores security risks in state estimation based on multi-sensor systems that implement a Kalman filter and aχ^(2) detector.When measurements are transmitted via wireless networks to a remote estimator,the innovation sequence becomes susceptible to interception and manipulation by adversaries.We consider a class of linear deception attacks,wherein the attacker alters the innovation to degrade estimation accuracy while maintaining stealth against the detector.Given the inherent volatility of the detection function based on theχ^(2) detector,we propose broadening the traditional feasibility constraint to accommodate a certain degree of deviation from the distribution of the innovation.This broadening enables the design of stealthy attacks that exploit the tolerance inherent in the detection mechanism.The state estimation error is quantified and analyzed by deriving the iteration of the error covariance matrix of the remote estimator under these conditions.The selected degree of deviation is combined with the error covariance to establish the objective function and the attack scheme is acquired by solving an optimization problem.Furthermore,we propose a novel detection algorithm that employs a majority-voting mechanism to determine whether the system is under attack,with decision parameters dynamically adjusted in response to system behavior.This approach enhances sensitivity to stealthy and persistent attacks without increasing the false alarm rate.Simulation results show that the designed leads to about a 41%rise in the trace of error covariance for stable systems and 29%for unstable systems,significantly impairing estimation performance.Concurrently,the proposed detection algorithm enhances the attack detection rate by 33%compared to conventional methods. 展开更多
关键词 Cyber-physical system kalman filter remote state estimation Chi-square detection linear deception attack
在线阅读 下载PDF
Seed dispersal by deception:A game between mimetic seeds and their bird dispersers
12
作者 Min-Fei Jin Xiang-Hai Cai Gao Chen 《Plant Diversity》 2025年第2期169-177,共9页
Mimetic seeds attract birds to disperse seeds mainly by mimicking fleshy fruits or arillate seeds,however,they provide little nutritive reward for bird dispersers.The key characteristics of mimetic seeds are conspicuo... Mimetic seeds attract birds to disperse seeds mainly by mimicking fleshy fruits or arillate seeds,however,they provide little nutritive reward for bird dispersers.The key characteristics of mimetic seeds are conspicuous seed color,hard seed coat,certain toxic secondary metabolites,and perhaps smooth waxy layer.In this review,we discuss the global distribution of mimetic seeds,the interaction of mimetic seeds with bird dispersers,and secondary metabolites that underlie key characteristics of mimetic seeds.Mimetic-seed species mainly occur in the tropics,with large numbers distributed along coastal areas.The interaction between mimetic-seed species and bird dispersers can be antagonistic,mutualistic,or both.These interactions are generally established by conspicuous visual cues and hard tactile cues from mimetic seeds.The formation and variation of key characteristics of mimetic seeds may contribute to the metabolism of several kind of secondary compounds.Here,we also discuss mimetic-seed dispersal in the context of an evolutionary game,and propose several aspects of mimetic-seed dispersal that remain unstudied.While this review is based on preliminary findings and does not account for other potential influencing factors such as climate,it is expected to contribute to an improved understanding of mimetic-seed dispersal. 展开更多
关键词 Mimetic seeds Frugivorous birds Seed dispersal DECEPTION Secondary metabolites Evolutionary game
在线阅读 下载PDF
Sum-based dynamic discrete event-triggered mechanism for synchronization of delayed neural networks under deception attacks
13
作者 Zhongjing YU Duo ZHANG +3 位作者 Shihan KONG Deqiang OUYANG Hongfei LI Junzhi YU 《Frontiers of Information Technology & Electronic Engineering》 2025年第9期1662-1678,共17页
This paper focuses on the design of event-triggered controllers for the synchronization of delayed Takagi-Sugeno(T-S)fuzzy neural networks(NNs)under deception attacks.The traditional event-triggered mechanism(ETM)dete... This paper focuses on the design of event-triggered controllers for the synchronization of delayed Takagi-Sugeno(T-S)fuzzy neural networks(NNs)under deception attacks.The traditional event-triggered mechanism(ETM)determines the next trigger based on the current sample,resulting in network congestion.Furthermore,such methods suffer from the issues of deception attacks and unmeasurable system states.To enhance the system stability,we adaptively detect the occurrence of events over a period of time.In addition,deception attacks are recharacterized to describe general scenarios.Specifically,the following enhancements are implemented:First,we use a Bernoulli process to model the occurrence of deception attacks,which can describe a variety of attack scenarios as a type of general Markov process.Second,we introduce a sum-based dynamic discrete event-triggered mechanism(SDDETM),which uses a combination of past sampled measurements and internal dynamic variables to determine subsequent triggering events.Finally,we incorporate a dynamic output feedback controller(DOFC)to ensure the system stability.The concurrent design of the DOFC and SDDETM parameters is achieved through the application of the cone complement linearization(CCL)algorithm.We further perform two simulation examples to validate the effectiveness of the algorithm. 展开更多
关键词 Sum-based dynamic discrete event-triggered mechanism Takagi-Sugeno(T-S)fuzzy model Deception attacks
原文传递
Robust Control and Stabilization of Autonomous Vehicular Systems under Deception Attacks and Switching Signed Networks
14
作者 Muflih Alhazmi Waqar Ul Hassan +5 位作者 Saba Shaheen Mohammed M.A.Almazah Azmat Ullah Khan Niazi Nafisa A.Albasheir Ameni Gargouri Naveed Iqbal 《Computer Modeling in Engineering & Sciences》 2025年第11期1903-1940,共38页
This paper proposes a model-based control framework for vehicle platooning systems with secondorder nonlinear dynamics operating over switching signed networks,time-varying delays,and deception attacks.The study inclu... This paper proposes a model-based control framework for vehicle platooning systems with secondorder nonlinear dynamics operating over switching signed networks,time-varying delays,and deception attacks.The study includes two configurations:a leaderless structure using Finite-Time Non-Singular Terminal Bipartite Consensus(FNTBC)and Fixed-Time Bipartite Consensus(FXTBC),and a leader—follower structure ensuring structural balance and robustness against deceptive signals.In the leaderless model,a bipartite controller based on impulsive control theory,gauge transformation,and Markovian switching Lyapunov functions ensures mean-square stability and coordination under deception attacks and communication delays.The FNTBC achieves finite-time convergence depending on initial conditions,while the FXTBC guarantees fixed-time convergence independent of them,providing adaptability to different operating states.In the leader—follower case,a discontinuous impulsive control law synchronizes all followers with the leader despite deceptive attacks and switching topologies,maintaining robust coordination through nonlinear corrective mechanisms.To validate the approach,simulations are conducted on systems of five and seventeen vehicles in both leaderless and leader—follower configurations.The results demonstrate that the proposed framework achieves rapid consensus,strong robustness,and high resistance to deception attacks,offering a secure and scalable model-based control solution for modern vehicular communication networks. 展开更多
关键词 Autonomous vehicles vehicle platooning STABILIZATION decision and control systems switching signed networks leader–follower coordination gauge transformation Lyapunov stability deception and cybe-security attacks secure vehicular networks
在线阅读 下载PDF
Are Celebrities Criminally Responsible For Deceptive Advertising?
15
《Beijing Review》 2010年第45期46-47,共2页
The State Administration for Industry and Commerce recently said it has suggested the addition of an article in the Advertising Law to make celebrities who represent fake products in deceptive advertising criminally r... The State Administration for Industry and Commerce recently said it has suggested the addition of an article in the Advertising Law to make celebrities who represent fake products in deceptive advertising criminally responsible for their actions if it is 展开更多
关键词 In Are Celebrities Criminally Responsible For deceptive Advertising
原文传递
Deceptive Forensics and the“Generalized”Negation of the Evidences
16
作者 Qi YaPing 《Journal of Forensic Science and Medicine》 2021年第3期96-104,共9页
Deceptive interrogation,undercover investigation,special information,and covert spying may be used as deceptive evidentiary acts.By Article 52 of the Criminal Procedure Law,these methods must undergo the examination o... Deceptive interrogation,undercover investigation,special information,and covert spying may be used as deceptive evidentiary acts.By Article 52 of the Criminal Procedure Law,these methods must undergo the examination of the admissibility of evidence in the trial stage.How interpretate obtaining evidence by deception such judicial postmortem review should include the necessity of investigation and the legality of investigation.The sources of information examined should not only be limited to the defendanfs confession and prosecution files but also include the evidence of personal testimony,intelligence sources,and material evidence sources,especially the appropriate presentation of investigation files.In a case,the necessity,possibility,and possibility of distortion of the means of obtaining evidence determine whether the specific evidence has the legality of evidence.Documents must be able to truthfully reflect the implementation process of specific evidence in the case. 展开更多
关键词 Case files DECEPTION examination of evidence legality undercover investigation
原文传递
CORMAND2--针对工业机器人的欺骗攻击
17
作者 Hongyi Pu Liang He +2 位作者 Peng Cheng Jiming Chen Youxian Sun 《Engineering》 SCIE EI CAS CSCD 2024年第1期186-201,共16页
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vu... Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in three dimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot’s movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for. 展开更多
关键词 Industrial robots Vulnerability analysis Deception attacks DEFENSES
在线阅读 下载PDF
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
18
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
在线阅读 下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
19
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
在线阅读 下载PDF
LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques
20
作者 Shanjita Akter Prome Md Rafiqul Islam +4 位作者 Md.Kowsar Hossain Sakib David Asirvatham Neethiahnanthan Ari Ragavan Cesar Sanin Edward Szczerbicki 《Computers, Materials & Continua》 SCIE EI 2024年第11期2845-2871,共27页
Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie ... Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie detection systems are non-intrusive,cost-effective,and mobile by identifying facial expressions.Over the last decade,numerous studies have been conducted on deception detection using several advanced techniques.Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception.So,it could be challenging to spot trends,practical approaches,gaps,and chances for contribution.However,there are still a lot of opportunities for innovative deception detection methods.Therefore,we used a variety of machine learning(ML)and deep learning(DL)approaches to experiment with this work.This research aims to do the following:(i)review and analyze the current lie detection(LD)systems;(ii)create a dataset;(iii)use several ML and DL techniques to identify lying;and(iv)create a hybrid model known as LDNet.By combining layers from Vgg16 and DeneseNet121,LDNet was developed and offered the best accuracy(99.50%)of all the models.Our developed hybrid model is a great addition that significantly advances the study of LD.The findings from this research endeavor are expected to advance our understanding of the effectiveness of ML and DL techniques in LD.Furthermore,it has significant practical applications in diverse domains such as security,law enforcement,border control,organizations,and investigation cases where accurate lie detection is paramount. 展开更多
关键词 Artificial intelligence deception/lie detection deep learning facial expression machine learning
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部