期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Multi-Label Feature Selection Based on Improved Ant Colony Optimization Algorithm with Dynamic Redundancy and Label Dependence
1
作者 Ting Cai Chun Ye +5 位作者 Zhiwei Ye Ziyuan Chen Mengqing Mei Haichao Zhang Wanfang Bai Peng Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1157-1175,共19页
The world produces vast quantities of high-dimensional multi-semantic data.However,extracting valuable information from such a large amount of high-dimensional and multi-label data is undoubtedly arduous and challengi... The world produces vast quantities of high-dimensional multi-semantic data.However,extracting valuable information from such a large amount of high-dimensional and multi-label data is undoubtedly arduous and challenging.Feature selection aims to mitigate the adverse impacts of high dimensionality in multi-label data by eliminating redundant and irrelevant features.The ant colony optimization algorithm has demonstrated encouraging outcomes in multi-label feature selection,because of its simplicity,efficiency,and similarity to reinforcement learning.Nevertheless,existing methods do not consider crucial correlation information,such as dynamic redundancy and label correlation.To tackle these concerns,the paper proposes a multi-label feature selection technique based on ant colony optimization algorithm(MFACO),focusing on dynamic redundancy and label correlation.Initially,the dynamic redundancy is assessed between the selected feature subset and potential features.Meanwhile,the ant colony optimization algorithm extracts label correlation from the label set,which is then combined into the heuristic factor as label weights.Experimental results demonstrate that our proposed strategies can effectively enhance the optimal search ability of ant colony,outperforming the other algorithms involved in the paper. 展开更多
关键词 Multi-label feature selection ant colony optimization algorithm dynamic redundancy high-dimensional data label correlation
在线阅读 下载PDF
Microcontroller Design Based on Dynamic Heterogeneous Redundancy Architecture 被引量:2
2
作者 Ling Ouyang Ke Song +1 位作者 Wenjian Zhang Shuai Wei 《China Communications》 SCIE CSCD 2023年第9期144-159,共16页
Redundancy control can effectively enhance the stability and robustness of a system.Based on the conventional redundancy control switchover and majority arbitration strategy,this paper introduces the concept of hetero... Redundancy control can effectively enhance the stability and robustness of a system.Based on the conventional redundancy control switchover and majority arbitration strategy,this paper introduces the concept of heterogeneity and dynamics,constructs a dynamic heterogeneous redundancy-based microcontroller architecture DHR-MCU,and designs a fixed-leader distributed consensus algorithm that satisfies the program running state control of this architecture.The theoretical analysis and actual measurement of the prototype system prove that this architecture has good anti-attack and self-recovery capabilities under normal functions and performances and meets the general robust features in terms of safety and security. 展开更多
关键词 dynamic heterogeneous redundancy MICROCONTROLLER distributed consensus algorithm generalized robustness
在线阅读 下载PDF
Intelligent Dynamic Heterogeneous Redundancy Architecture for IoT Systems 被引量:2
3
作者 Zhang Han Wang Yu +2 位作者 Liu Hao Lin Hongyu Chen Liquan 《China Communications》 SCIE CSCD 2024年第7期291-306,共16页
The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we ... The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we propose an intelligent DHR architecture,which is more feasible by intelligently combining the random distribution based dynamic scheduling algorithm(RD-DS)and information weight and heterogeneity based arbitrament(IWHA)algorithm.In the proposed architecture,the random distribution function and information weight are employed to achieve the optimal selection of executors in the process of RD-DS,which avoids the case that some executors fail to be selected due to their stability difference in the conventional DHR architecture.Then,through introducing the heterogeneity to restrict the information weights in the procedure of the IWHA,the proposed architecture solves the common mode escape issue caused by the existence of multiple identical error output results of similar vulnerabilities.The experimental results characterize that the proposed architecture outperforms in heterogeneity,scheduling times,security,and stability over the conventional DHR architecture under the same conditions. 展开更多
关键词 dynamic heterogeneous redundancy HETEROGENEITY IoT security security defense
在线阅读 下载PDF
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism 被引量:1
4
作者 Junjie Xu 《Journal of Computer and Communications》 2021年第7期1-7,共7页
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy... With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense. 展开更多
关键词 Cyberspace Mimic Defense dynamic Heterogeneous redundancy Structure Defense Technology Network Security
在线阅读 下载PDF
A Dynamic Solution for Document Redundancies in Multiple Sources
5
作者 Gong Zhiguo(Faculty of Science and Technology University of Macao,Macao 3001,China)Zhou Longxiang (Institute of Mathematics Chinese Academy of Science Beijing 100080 China) 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期129-133,149,共6页
With the development of IT,more andmore document resources are available over the Internet.Inorder to facilitate users’retrieval of the digital documents,Integrations of the multi source systems are necessary,Sinceth... With the development of IT,more andmore document resources are available over the Internet.Inorder to facilitate users’retrieval of the digital documents,Integrations of the multi source systems are necessary,Sincethe individual sources collect their information independently,the same papers may be stored in different source systems.The traditional solutions to the redundancy problems in thedistributed environments are usually based on the globalcatalogs which keep the redundancy information for thesyst... 展开更多
关键词 A dynamic Solution for Document Redundancies in Multiple Sources
在线阅读 下载PDF
Cyberspace Endogenous Safety and Security 被引量:6
6
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom dynamic heterogeneous redundant architecture
在线阅读 下载PDF
MimicCloudSim:An Environment for Modeling and Simulation of Mimic Cloud Service 被引量:4
7
作者 Liming Pu Jiangxing Wu +2 位作者 Hailong Ma Yuhang Zhu Yingle Li 《China Communications》 SCIE CSCD 2021年第1期212-221,共10页
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha... In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable. 展开更多
关键词 cyber mimic defense mimic cloud service SIMULATION dynamic heterogeneous redundancy
在线阅读 下载PDF
Harnessing dynamic heterogeneous redundancy to empower deep learning safety and security 被引量:1
8
作者 Fan Zhang Xi Chen +10 位作者 Wei Huang Jiangxing Wu Zijie Zhang Chenyu Zhou Jianpeng Li Ziwen Peng Wei Guo Guangze Yang Xinyuan Miao Ruiyang Huang Jiayu Du 《Security and Safety》 2024年第4期86-112,共27页
The rapid development of deep learning(DL) models has been accompanied by various safety and security challenges, such as adversarial attacks and backdoor attacks.By analyzing the current literature on attacks and def... The rapid development of deep learning(DL) models has been accompanied by various safety and security challenges, such as adversarial attacks and backdoor attacks.By analyzing the current literature on attacks and defenses in DL, we find that the ongoing adaptation between attack and defense makes it impossible to completely resolve these issues.In this paper, we propose that this situation is caused by the inherent flaws of DL models,namely non-interpretability, non-recognizability, and non-identifiability. We refer to these issues as the Endogenous Safety and Security(ESS) problems. To mitigate the ESS problems in DL, we propose using the Dynamic Heterogeneous Redundant(DHR) architecture. We believe that introducing diversity is crucial for resolving the ESS problems. To validate the efectiveness of this approach, we conduct various case studies across multiple application domains of DL. Our experimental results confirm that constructing DL systems based on the DHR architecture is more efective than existing DL defense strategies. 展开更多
关键词 Deep learning Endogenous security dynamic heterogeneous redundancy AI safety
原文传递
Integrated safety and security enhancement of connected automated vehicles using DHR architecture 被引量:3
9
作者 Yufeng Li Qi Liu +1 位作者 Xuehong Chen Chenhong Cao 《Security and Safety》 2023年第1期29-44,共16页
Safety and security are interrelated and both essential for connected automated vehicles(CAVs).They are usually investigated independently,followed by standards ISO 26262 and ISO/SAE 21434,respectively.However,more fu... Safety and security are interrelated and both essential for connected automated vehicles(CAVs).They are usually investigated independently,followed by standards ISO 26262 and ISO/SAE 21434,respectively.However,more functional safety and security fea-tures of in-vehicle components make existing safety mechanisms weaken security mechanisms and vice versa.This results in a dilemma that the safety-critical and security-critical in-vehicle components cannot be protected.In this paper,we propose a dynamic heterogeneous redundancy(DHR)architecture to enhance the safety and security of CAVs simultaneously.We first investigate the current status of integrated safety and security analysis and explore the relationship between safety and security.Then,we propose a new taxonomy of in-vehicle components based on safety and security features.Finally,a dynamic heterogeneous redun-dancy(DHR)architecture is proposed to guarantee integrated functional safety and cyber security of connected vehicles for the first time.A case study on an automated bus shows that DHR architecture can not only detect unknown failures and ensure functional safety but also detect unknown attacks to protect cyber security.Furthermore,we provide an in-depth analysis of quantification for CAVs performance using DHR architecture and identify chal-lenges and future research directions.Overall,integrated safety and security enhancement is an emerging research direction. 展开更多
关键词 Connected automated vehicles Safety SECURITY dynamic heterogeneous redundancy(DHR) Quantification
原文传递
Problems and solutions regarding generalized functional safety in cyberspace 被引量:5
10
作者 JiangXing Wu 《Security and Safety》 2022年第1期90-102,共13页
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical s... The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace. 展开更多
关键词 Common endogenous security problem Generalized functional safety(S&S) dynamic heterogeneity redundancy(DHR)architecture General robust control mechanism Coding channel theory Common cross-disciplinary eld problems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部