期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 被引量:1
1
作者 何广强 朱思维 +1 位作者 郭红斌 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1263-1268,共6页
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon... For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 展开更多
关键词 quantum key distribution two-mode squeezed states optimal beam splitter attack
原文传递
Footprint Problem with Angle of Attack Optimization for High Lifting Reentry Vehicle 被引量:12
2
作者 LI Huifeng ZHANG Ran +1 位作者 LI Zhaoying ZHANG Rui 《Chinese Journal of Aeronautics》 SCIE EI CSCD 2012年第2期243-251,共9页
A formal analysis to footprint problem with effects of angle of attack (AOA) is presented. First a flexible and rapid standardized method for footprint generation is developed. Zero bank angle control strategy and t... A formal analysis to footprint problem with effects of angle of attack (AOA) is presented. First a flexible and rapid standardized method for footprint generation is developed. Zero bank angle control strategy and the maximum crossrange method are used to obtain virtual target set; afterward, closed-loop bank angle guidance law is used to find footprint by solving closest approach problem for each element in virtual target set. Then based on quasi-equilibrium glide condition, the typical inequality reentry trajectory constraints are converted to angle of attack lower boundary constraint. Constrained by the lower boundary, an original and practical angle of attack parametric method is proposed. By using parametric angle of attack profile, optimization algorithm for angle of attack is designed and the impact of angle of attack to footprint is discussed. Simulations with different angle of attack profiles are presented to demonstrate the performance of the proposed footprint solution method and validity of optimal algorithm. 展开更多
关键词 REENTRY angle of attack optimization FOOTPRINT trajectory constraints bank angle control
原文传递
Optimal Cyber-attack Evaluation for Cross-domain Cascading Failures Considering Spatiotemporal Synergy of Multiple Attack-event-chains
3
作者 Yihan Liu Yufei Wang +1 位作者 Hongru Wang Qi Wang 《CSEE Journal of Power and Energy Systems》 2026年第1期495-507,共13页
According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subseq... According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subsequently forming cross-domain cascading failures(CDCF)that cross cyber-domain and power-domain and endanger the stable running of GCPS.To reveal the evolutionary mechanism of CDCF,an optimal attack scheme evaluation method is proposed,considering the spatiotemporal synergy of multiple attack-event-chains.First,in accordance with the spatiotemporal synergy of multiple attack-event-chains,the CDCF evolutionary mechanism is analyzed from the attackers'perspective,and a CDCF mathematical model is established.Furthermore,an attack graph model of CDCF evolution and its hazard calculation method are proposed.Then,the attackers'decision-making process for the optimal attack scheme of CDCF is deduced based on the attack graph model.Finally,both the evaluation and implementation processes of the optimal attack scheme are simulated in the GCPS experimental system based on IEEE-39 bus systems. 展开更多
关键词 attack graph cascading failure cyber-attacks grid cyber-physical system optimal attack scheme
原文传递
Multi-Objective Cooperative Salvo Attack Against Group Target 被引量:9
4
作者 ZENG Jie DOU Lihua XIN Bin 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第1期244-261,共18页
This paper proposes a solution for the problem of cooperative salvo attack of multiple cruise missiles against targets in a group. Synchronization of the arrival time of missiles to hit their common target, minimizing... This paper proposes a solution for the problem of cooperative salvo attack of multiple cruise missiles against targets in a group. Synchronization of the arrival time of missiles to hit their common target, minimizing the time consumption of attack and maximizing the expected damage to group targets are taken into consideration simultaneously. These operational objectives result in a hierarchical mixed-variable optimization problem which includes two types of subproblems, namely the multi-objective missile-target assignment(MOMTA) problem at the upper level and the time-optimal coordinated path planning(TOCPP) problems at the lower level. In order to solve the challenging problem, a recently proposed coordinated path planning method is employed to solve the TOCPP problems to achieve the soonest salvo attack against each target. With the aim of finding a more competent solver for MOMTA, three state-of-the-art multi-objective optimization methods(MOMs),namely NSGA-II, MOEA/D and DMOEA-εC, are adopted. Finally, a typical example is used to demonstrate the advantage of the proposed method. A simple rule-based method is also employed for comparison. Comparative results show that DMOEA-εC is the best choice among the three MOMs for solving the MOMTA problem. The combination of DMOEA-εC for MOMTA and the coordinated path planning method for TOCPP can generate obviously better salvo attack schemes than the rule-based method. 展开更多
关键词 Coordinated path planning missile-target assignment multi-missile salvo attack multiobjective optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部