Network topology obfuscation is a technique aimed at protecting critical nodes and links from disruptions such as Link Flooding Attack(LFA).Currently,there are limited topology obfuscation methods for protecting criti...Network topology obfuscation is a technique aimed at protecting critical nodes and links from disruptions such as Link Flooding Attack(LFA).Currently,there are limited topology obfuscation methods for protecting critical nodes,and the existing approaches mainly achieve obfuscation by extensivelymodifying network links,resulting in high costs.To address this issue,this paper proposes a low-cost network topology obfuscation method dedicated to critical node protection,with its core innovation lying in a lightweight obfuscation architecture based on Fake Node Clusters(FNCs).Firstly,the protected network is modeled as an undirected graph,and an adjacency matrix is constructed to quantify the network scale and structural characteristics.Then,a fake node cluster generation algorithm is designed to construct an FNC adapted to the target network.Finally,a heuristic obfuscated topology generation algorithm is proposed.By optimizing the deployment positions of Fake Nodes Clusters(FNCs)in the protected network,this algorithm effectively reduces the number of FNCs required to generate the obfuscated topology,further lowering the obfuscation cost.Extensive experiments were conducted on the public Topology Zoo dataset,categorizing network topologies by node count into small-scale([0,50)),medium-scale([50,100)),and large-scale([100,200))groups.The experimental results demonstrate that the proposed approach achieves excellent obfuscation performance,reducing the critical node recognition rate to 0%.Compared to the typical method,EigenObfu,the proposed approach also reduces obfuscation costs by an average of 97.9%,99.6%,and 99.3%for small,medium,and large-scale networks,respectively.展开更多
In this paper,we enumerate the set of Motzkin trees with n edges according to the number of leaves,the number of vertices adjacent to a leaf,the number of protected nodes,the number of(protected)branch nodes,and the n...In this paper,we enumerate the set of Motzkin trees with n edges according to the number of leaves,the number of vertices adjacent to a leaf,the number of protected nodes,the number of(protected)branch nodes,and the number of(protected)lonely nodes.Explicit formulae as well as generating functions are obtained.We also find that,as n goes to infinity,the proportion of protected branch nodes and protected lonely nodes among all vertices of Motzkin trees with n edges approaches 4/27 and 2/9.展开更多
Node line semimetals(NLSMs) were characterized by one-dimensional band crossings in their bulk electronic structures.The nontrivial band topology of NLSM gives rise to "drumhead" surface electronic excitatio...Node line semimetals(NLSMs) were characterized by one-dimensional band crossings in their bulk electronic structures.The nontrivial band topology of NLSM gives rise to "drumhead" surface electronic excitations that exhibits exotic physical properties.The symmetries of crystalline provide the needed protection of node line from being gapped out by the perturbations that preserve the symmetry.The progress of NLSM in tungsten-based materials is reviewed with an emphasis on their symmetry-based protection,characteristic electronic band structures and their response to the spin-orbit coupling(SOC)and breaking of time-reversal symmetry.The potential exploration directions of tungsten-based NLSM in the future are also discussed.展开更多
基金funded by the National Key Research and Development Program of China(Grant No.2022YFB3102900)the Key Science and Technology Project of Henan Province,China(No.252102211091).
文摘Network topology obfuscation is a technique aimed at protecting critical nodes and links from disruptions such as Link Flooding Attack(LFA).Currently,there are limited topology obfuscation methods for protecting critical nodes,and the existing approaches mainly achieve obfuscation by extensivelymodifying network links,resulting in high costs.To address this issue,this paper proposes a low-cost network topology obfuscation method dedicated to critical node protection,with its core innovation lying in a lightweight obfuscation architecture based on Fake Node Clusters(FNCs).Firstly,the protected network is modeled as an undirected graph,and an adjacency matrix is constructed to quantify the network scale and structural characteristics.Then,a fake node cluster generation algorithm is designed to construct an FNC adapted to the target network.Finally,a heuristic obfuscated topology generation algorithm is proposed.By optimizing the deployment positions of Fake Nodes Clusters(FNCs)in the protected network,this algorithm effectively reduces the number of FNCs required to generate the obfuscated topology,further lowering the obfuscation cost.Extensive experiments were conducted on the public Topology Zoo dataset,categorizing network topologies by node count into small-scale([0,50)),medium-scale([50,100)),and large-scale([100,200))groups.The experimental results demonstrate that the proposed approach achieves excellent obfuscation performance,reducing the critical node recognition rate to 0%.Compared to the typical method,EigenObfu,the proposed approach also reduces obfuscation costs by an average of 97.9%,99.6%,and 99.3%for small,medium,and large-scale networks,respectively.
基金Supported by the National Natural Science Foundation of China(Grant No.11861045)Gansu Province Science Foundation for Youths(Grant No.20JR10RA187)the Hongliu Foundation of First-Class Disciplines of Lanzhou University of Technology,China。
文摘In this paper,we enumerate the set of Motzkin trees with n edges according to the number of leaves,the number of vertices adjacent to a leaf,the number of protected nodes,the number of(protected)branch nodes,and the number of(protected)lonely nodes.Explicit formulae as well as generating functions are obtained.We also find that,as n goes to infinity,the proportion of protected branch nodes and protected lonely nodes among all vertices of Motzkin trees with n edges approaches 4/27 and 2/9.
基金supported by the National Natural Foundation of China (NFSC)(Grants No.11574215)。
文摘Node line semimetals(NLSMs) were characterized by one-dimensional band crossings in their bulk electronic structures.The nontrivial band topology of NLSM gives rise to "drumhead" surface electronic excitations that exhibits exotic physical properties.The symmetries of crystalline provide the needed protection of node line from being gapped out by the perturbations that preserve the symmetry.The progress of NLSM in tungsten-based materials is reviewed with an emphasis on their symmetry-based protection,characteristic electronic band structures and their response to the spin-orbit coupling(SOC)and breaking of time-reversal symmetry.The potential exploration directions of tungsten-based NLSM in the future are also discussed.