期刊文献+
共找到726篇文章
< 1 2 37 >
每页显示 20 50 100
A survey of backdoor attacks and defenses:From deep neural networks to large language models
1
作者 Ling-Xin Jin Wei Jiang +5 位作者 Xiang-Yu Wen Mei-Yu Lin Jin-Yu Zhan Xing-Zhi Zhou Maregu Assefa Habtie Naoufel Werghi 《Journal of Electronic Science and Technology》 2025年第3期13-35,共23页
Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susce... Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susceptibility to backdoors maliciously injected by adversaries.This vulnerability arises due to the intricate architecture and opacity of DNNs,resulting in numerous redundant neurons embedded within the models.Adversaries exploit these vulnerabilities to conceal malicious backdoor information within DNNs,thereby causing erroneous outputs and posing substantial threats to the efficacy of DNN-based applications.This article presents a comprehensive survey of backdoor attacks against DNNs and the countermeasure methods employed to mitigate them.Initially,we trace the evolution of the concept from traditional backdoor attacks to backdoor attacks against DNNs,highlighting the feasibility and practicality of generating backdoor attacks against DNNs.Subsequently,we provide an overview of notable works encompassing various attack and defense strategies,facilitating a comparative analysis of their approaches.Through these discussions,we offer constructive insights aimed at refining these techniques.Finally,we extend our research perspective to the domain of large language models(LLMs)and synthesize the characteristics and developmental trends of backdoor attacks and defense methods targeting LLMs.Through a systematic review of existing studies on backdoor vulnerabilities in LLMs,we identify critical open challenges in this field and propose actionable directions for future research. 展开更多
关键词 Backdoor attacks Backdoor defenses Deep neural networks Large language model
在线阅读 下载PDF
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
2
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
Adversarial Attacks and Defenses in Deep Learning 被引量:26
3
作者 Kui Ren Tianhang Zheng +1 位作者 Zhan Qin Xue Liu 《Engineering》 SCIE EI 2020年第3期346-360,共15页
With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algor... With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algorithms to adversarial samples has been widely recognized.The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans.Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality.Hence,adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.In this paper,we first introduce the theoretical foundations,algorithms,and applications of adversarial attack techniques.We then describe a few research efforts on the defense techniques,which cover the broad frontier in the field.Several open problems and challenges are subsequently discussed,which we hope will provoke further research efforts in this critical area. 展开更多
关键词 Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
在线阅读 下载PDF
DSGNN:Dual-Shield Defense for Robust Graph Neural Networks
4
作者 Xiaohan Chen Yuanfang Chen +2 位作者 Gyu Myoung Lee Noel Crespi Pierluigi Siano 《Computers, Materials & Continua》 2025年第10期1733-1750,共18页
Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),t... Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),to enhance structural reasoning,knowledge retrieval,and memory management.The expansion of their application scope imposes higher requirements on the robustness of GNNs.However,as GNNs are applied to more dynamic and heterogeneous environments,they become increasingly vulnerable to real-world perturbations.In particular,graph data frequently encounters joint adversarial perturbations that simultaneously affect both structures and features,which are significantly more challenging than isolated attacks.These disruptions,caused by incomplete data,malicious attacks,or inherent noise,pose substantial threats to the stable and reliable performance of traditional GNN models.To address this issue,this study proposes the Dual-Shield Graph Neural Network(DSGNN),a defense model that simultaneously mitigates structural and feature perturbations.DSGNN utilizes two parallel GNN channels to independently process structural noise and feature noise,and introduces an adaptive fusion mechanism that integrates information from both pathways to generate robust node representations.Theoretical analysis demonstrates that DSGNN achieves a tighter robustness boundary under joint perturbations compared to conventional single-channel methods.Experimental evaluations across Cora,CiteSeer,and Industry datasets show that DSGNN achieves the highest average classification accuracy under various adversarial settings,reaching 81.24%,71.94%,and 81.66%,respectively,outperforming GNNGuard,GCN-Jaccard,GCN-SVD,RGCN,and NoisyGNN.These results underscore the importance of multi-view perturbation decoupling in constructing resilient GNN models for real-world applications. 展开更多
关键词 Graph neural networks adversarial attacks dual-shield defense certified robustness node classification
在线阅读 下载PDF
Calculation of the Behavior Utility of a Network System: Conception and Principle 被引量:5
5
作者 Changzhen Hu 《Engineering》 2018年第1期78-84,共7页
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes o... The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes of network behavior as differential manifolds, Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathe- matical description of the network behavior path and behavior utility, Based on the principle of differen- tial geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility, We also provide a calculation framework for assessment of the network's attack-defense confrontation on the strength of behavior utility, Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior, 展开更多
关键词 network metric evaluation Differential MANIFOLD network BEHAVIOR UTILITY network attack-defense CONFRONTATION
在线阅读 下载PDF
A Comparison of Link Layer Attacks on Wireless Sensor Networks
6
作者 Shahriar Mohammadi Reza Ebrahimi Atani Hossein Jadidoleslamy 《Journal of Information Security》 2011年第2期69-84,共16页
Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously;conditions su... Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously;conditions such as cost, invisible deployment and many application domains, lead to small size and resource limited sensors [3]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional network security techniques are unusable on WSNs [3];This is due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. Therefore security is a vital requirement for these networks;but we have to design a proper security mechanism that attends to WSN’s constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs’ link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers;furthermore, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks;this would enable IT security managers to manage the link layer attacks of WSNs more effectively. 展开更多
关键词 WIRELESS Sensor network SECURITY LINK LAYER attackS Detection DEFENSIVE Mechanism
暂未订购
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
7
作者 Xiancheng Ding 《Journal of Information Security》 2016年第5期297-303,共7页
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical fra... This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment. 展开更多
关键词 Information Security network attack and defense VIRTUALIZATION Experiment Platform
在线阅读 下载PDF
Attack and Defense Game with Intuitionistic Fuzzy Payoffs in Infrastructure Networks
8
作者 Yibo Dong Jin Liu +2 位作者 Jiaqi Ren Zhe Li Weili Li 《Tsinghua Science and Technology》 2025年第1期384-401,共18页
Due to our increasing dependence on infrastructure networks,the attack and defense game in these networks has draw great concerns from security agencies.Moreover,when it comes to evaluating the payoffs in practical at... Due to our increasing dependence on infrastructure networks,the attack and defense game in these networks has draw great concerns from security agencies.Moreover,when it comes to evaluating the payoffs in practical attack and defense games in infrastructure networks,the lack of consideration for the fuzziness and uncertainty of subjective human judgment brings forth significant challenges to the analysis of strategic interactions among decision makers.This paper employs intuitionistic fuzzy sets(IFSs)to depict such uncertain payoffs,and introduce a theoretical framework for analyzing the attack and defense game in infrastructure networks based on intuitionistic fuzzy theory.We take the changes in three complex network metrics as the universe of discourse,and intuitionistic fuzzy sets are employed based on this universe of discourse to reflect the satisfaction of decision makers.We employ an algorithm based on intuitionistic fuzzy theory to find the Nash equilibrium,and conduct experiments on both local and global networks.Results show that:(1)the utilization of intuitionistic fuzzy sets to depict the payoffs of attack and defense games in infrastructure networks can reflect the unique characteristics of decision makers’subjective preferences.(2)the use of differently weighted proportions of the three complex network metrics has little impact on decision makers’choices of different strategies. 展开更多
关键词 infrastructure networks attack and defense game intuitionistic fuzzy set Nash equilibrium
原文传递
Design and Implementation of an SDN-Enabled DNS Security Framework 被引量:5
9
作者 Zhenpeng Wang Hongchao Hu Guozhen Cheng 《China Communications》 SCIE CSCD 2019年第2期233-245,共13页
The Domain Name System(DNS) is suffering from the vulnerabilities exploited to launch the cache poisoning attack. Inspired by biodiversity, we design and implement a non-intrusive and tolerant secure architecture Mult... The Domain Name System(DNS) is suffering from the vulnerabilities exploited to launch the cache poisoning attack. Inspired by biodiversity, we design and implement a non-intrusive and tolerant secure architecture Multi-DNS(MDNS) to deal with it. MDNS consists of Scheduling Proxy and DNS server pool with heterogeneous DNSs in it. And the Scheduling Proxy dynamically schedules m DNSs to provide service in parallel and adopts the vote results from majority of DNSs to decide valid replies. And benefit from the centralized control of software defined networking(SDN), we implement a proof of concept for it. Evaluation results prove the validity and availability of MDNS and its intrusion/fault tolerance, while the average delay can be controlled in 0.3s. 展开更多
关键词 DNS CACHE POISONING attack software defined networkING moving target defense dynamic heterogeneous REDUNDANT
在线阅读 下载PDF
Deep Image Restoration Model: A Defense Method Against Adversarial Attacks 被引量:1
10
作者 Kazim Ali Adnan N.Quershi +3 位作者 Ahmad Alauddin Bin Arifin Muhammad Shahid Bhatti Abid Sohail Rohail Hassan 《Computers, Materials & Continua》 SCIE EI 2022年第5期2209-2224,共16页
These days,deep learning and computer vision are much-growing fields in this modern world of information technology.Deep learning algorithms and computer vision have achieved great success in different applications li... These days,deep learning and computer vision are much-growing fields in this modern world of information technology.Deep learning algorithms and computer vision have achieved great success in different applications like image classification,speech recognition,self-driving vehicles,disease diagnostics,and many more.Despite success in various applications,it is found that these learning algorithms face severe threats due to adversarial attacks.Adversarial examples are inputs like images in the computer vision field,which are intentionally slightly changed or perturbed.These changes are humanly imperceptible.But are misclassified by a model with high probability and severely affects the performance or prediction.In this scenario,we present a deep image restoration model that restores adversarial examples so that the target model is classified correctly again.We proved that our defense method against adversarial attacks based on a deep image restoration model is simple and state-of-the-art by providing strong experimental results evidence.We have used MNIST and CIFAR10 datasets for experiments and analysis of our defense method.In the end,we have compared our method to other state-ofthe-art defense methods and proved that our results are better than other rival methods. 展开更多
关键词 Computer vision deep learning convolutional neural networks adversarial examples adversarial attacks adversarial defenses
在线阅读 下载PDF
Mechanism and Defense on Malicious Code
11
作者 WEN Wei-ping QING Si-han 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期83-88,共6页
With the explosive growth of network applications,the threat of the malicious code against network security becomes increasingly serious.In this paper we explore the mechanism of the malicious code by giving an attack... With the explosive growth of network applications,the threat of the malicious code against network security becomes increasingly serious.In this paper we explore the mechanism of the malicious code by giving an attack model of the malicious code,and discuss the critical techniques of implementation and prevention against the malicious code.The remaining problems and emerging trends in this area are also addressed in the paper. 展开更多
关键词 malicious code attacking model MECHANISM defense system security network security
在线阅读 下载PDF
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
12
作者 Abdulaziz Alshammari Mohamed A Zohdy +1 位作者 Debatosh Debnath George Corser 《Journal of Information Security》 2020年第1期71-80,共10页
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar... Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol. 展开更多
关键词 Black Hole attacks Vehicular Ad HOC networks AODV Protocol simulation SUMO GREATER DETROIT Area
在线阅读 下载PDF
Black Box Adversarial Defense Based on Image Denoising and Pix2Pix
13
作者 Zhenyong Rui Xiugang Gong 《Journal of Computer and Communications》 2023年第12期14-30,共17页
Deep Neural Networks (DNN) are widely utilized due to their outstanding performance, but the susceptibility to adversarial attacks poses significant security risks, making adversarial defense research crucial in the f... Deep Neural Networks (DNN) are widely utilized due to their outstanding performance, but the susceptibility to adversarial attacks poses significant security risks, making adversarial defense research crucial in the field of AI security. Currently, robustness defense techniques for models often rely on adversarial training, a method that tends to only defend against specific types of attacks and lacks strong generalization. In response to this challenge, this paper proposes a black-box defense method based on Image Denoising and Pix2Pix (IDP) technology. This method does not require prior knowledge of the specific attack type and eliminates the need for cumbersome adversarial training. When making predictions on unknown samples, the IDP method first undergoes denoising processing, followed by inputting the processed image into a trained Pix2Pix model for image transformation. Finally, the image generated by Pix2Pix is input into the classification model for prediction. This versatile defense approach demonstrates excellent defensive performance against common attack methods such as FGSM, I-FGSM, DeepFool, and UPSET, showcasing high flexibility and transferability. In summary, the IDP method introduces new perspectives and possibilities for adversarial sample defense, alleviating the limitations of traditional adversarial training methods and enhancing the overall robustness of models. 展开更多
关键词 Deep Neural networks (DNN) Adversarial attack Adversarial Training Fourier Transform Robust defense
在线阅读 下载PDF
Security Risk Assessment and Risk-oriented Defense Resource Allocation for Cyber-physical Distribution Networks Against Coordinated Cyber Attacks
14
作者 Shuheng Wei Zaijun Wu +2 位作者 Junjun Xu Yanzhe Cheng Qinran Hu 《Journal of Modern Power Systems and Clean Energy》 2025年第1期312-324,共13页
With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components,power distribution networks are subject to miscellaneous security risks induced by ... With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components,power distribution networks are subject to miscellaneous security risks induced by malicious attackers.To address the issue,this paper proposes a security risk assessment method and a risk-oriented defense resource allocation strategy for cyber-physical distribution networks(CPDNs)against coordinated cyber attacks.First,an attack graph-based CPDN architecture is constructed,and representative cyber-attack paths are drawn considering the CPDN topology and the risk propagation process.The probability of a successful coordinated cyber attack and incurred security risks are quantitatively assessed based on the absorbing Markov chain model and National Institute of Standards and Technology(NIST)standard.Next,a risk-oriented defense resource allocation strategy is proposed for CPDNs in different attack scenarios.The tradeoff between security risk and limited resource budget is formulated as a multi-objective optimization(MOO)problem,which is solved by an efficient optimal Pareto solution generation approach.By employing a generational distance metric,the optimal solution is prioritized from the optimal Pareto set of the MOO and leveraged for subsequent atomic allocation of defense resources.Several case studies on a modified IEEE 123-node test feeder substantiate the efficacy of the proposed security risk assessment method and risk-oriented defense resource allocation strategy. 展开更多
关键词 Coordinated cyber attack defense resource allocation multi-objective optimization power distribution network security risk assessment
原文传递
基于剪枝与后门遗忘的深度神经网络后门移除方法
15
作者 李学相 高亚飞 +2 位作者 夏辉丽 王超 刘明林 《郑州大学学报(工学版)》 北大核心 2026年第2期27-34,共8页
后门攻击对深度神经网络的安全性构成了严重威胁。现有的大多数后门防御方法依赖部分原始训练数据来移除模型中的后门,但在数据访问受限这一现实场景中,这些方法在移除模型后门时的效果不佳,并且对模型的原始精度产生较大影响。针对上... 后门攻击对深度神经网络的安全性构成了严重威胁。现有的大多数后门防御方法依赖部分原始训练数据来移除模型中的后门,但在数据访问受限这一现实场景中,这些方法在移除模型后门时的效果不佳,并且对模型的原始精度产生较大影响。针对上述问题,提出了一种基于剪枝和后门遗忘的无数据后门移除方法(DBR-PU)。首先,用所提方法分析模型神经元在合成数据集上的预激活分布差异,以此来定位可疑神经元;其次,通过对这些可疑神经元进行剪枝操作来降低后门对模型的影响;最后,使用对抗性后门遗忘策略来进一步消除模型对少量残留后门信息的内部响应。在CIFAR10和GTSRB数据集上对6种主流后门攻击方法进行实验,结果表明:在数据访问受限的条件下,所提方法在准确率上可以与最优的基准防御方法保持较小差距,并且在降低攻击成功率方面表现最好。 展开更多
关键词 深度神经网络 后门攻击 后门防御 预激活分布 对抗性后门遗忘
在线阅读 下载PDF
基于神经网络的载机机动策略与攻击时机在线决策方法研究
16
作者 李知麟 周浩 陈万春 《空军工程大学学报》 北大核心 2026年第1期97-105,116,共10页
针对现代战争中载机与地空导弹之间的复杂攻防对抗问题,提出了一种基于神经网络的在线决策方法。该方法同时考虑载机机动生存与挂弹命中地面目标的双重约束,对载机机动策略与发射时机进行综合优化,以提高作战任务的成功率并满足实时决... 针对现代战争中载机与地空导弹之间的复杂攻防对抗问题,提出了一种基于神经网络的在线决策方法。该方法同时考虑载机机动生存与挂弹命中地面目标的双重约束,对载机机动策略与发射时机进行综合优化,以提高作战任务的成功率并满足实时决策需求。首先建立了反辐射导弹、地空导弹和载机的动力学模型,并构建了包含三者的攻防对抗场景模型,通过仿真分析了不同机动策略与发射时机对作战结果的影响,定义了操作时间来衡量任务成败;其次,采用遗传算法针对离散-连续混合参数问题进行离线优化,得到最优的载机机动策略和反辐射导弹发射时机,以此构建神经网络训练样本集,并搭建了神经网络模型进行训练和检验。最后,通过仿真算例验证了神经网络在线决策的有效性,结果表明该方法能够显著扩大反辐射导弹的优势区,提高任务成功率,且预测时间短,满足实时决策需求。 展开更多
关键词 反辐射导弹 地空导弹 攻防对抗 神经网络 在线决策
在线阅读 下载PDF
图神经网络后门攻击与防御综述
17
作者 丁艳 丁红发 +1 位作者 喻沐然 蒋合领 《计算机科学》 北大核心 2026年第3期1-22,共22页
在人工智能技术驱动的智能信息系统中,图神经网络(GNN)因其强大的图结构建模能力,被广泛应用于社交网络分析和金融风控等关键场景的知识发现与决策支持。然而,此类系统高度依赖第三方数据与模型,使GNN面临隐蔽的后门攻击威胁。攻击者通... 在人工智能技术驱动的智能信息系统中,图神经网络(GNN)因其强大的图结构建模能力,被广泛应用于社交网络分析和金融风控等关键场景的知识发现与决策支持。然而,此类系统高度依赖第三方数据与模型,使GNN面临隐蔽的后门攻击威胁。攻击者通过注入后门触发器或篡改模型,可诱导系统对含特定模式的输入产生预设错误输出,进而破坏智能信息服务的可信性与可靠性。为保障智能信息系统的安全可控,从数据和模型两个层面对GNN后门攻击与防御研究进行了系统性综述。首先,深入分析了GNN在数据集收集、模型训练和部署阶段面临的后门攻击风险,构建了清晰的GNN后门攻防模型。其次,依据GNN后门攻击的实施阶段和攻击者能力,将后门攻击分为包含了6种面向数据的攻击和2种面向模型的攻击;依据防御实施阶段和防御者能力,将GNN后门防御方法分为面向数据、面向模型和面向鲁棒训练的防御;对各类方法的核心原理、技术特点进行了详细对比分析,阐释了其优缺点。最后,总结了当前研究面临的主要挑战,并展望了未来研究方向。提出的后门攻防模型和分类体系,有助于深入理解智能信息系统中的GNN后门安全威胁的本质及技术演进,推动下一代可信智能信息系统的安全设计与实践。 展开更多
关键词 图神经网络 后门攻击 后门防御 后门触发器 数据隐私与安全 智能信息系统
在线阅读 下载PDF
一种基于通用扰动的后门攻击防御框架
18
作者 饶月 马晓宁 程忠锋 《计算机工程与科学》 北大核心 2026年第1期70-78,共9页
最近研究表明,深度神经网络(DNN)容易受到后门攻击,这种攻击隐蔽且强大,能让模型输出攻击者所期待的结果。针对目前后门攻击防御研究需要较高计算开销的同时还会影响模型准确率的问题,提出了一种基于通用扰动的防御框架,该框架将检测后... 最近研究表明,深度神经网络(DNN)容易受到后门攻击,这种攻击隐蔽且强大,能让模型输出攻击者所期待的结果。针对目前后门攻击防御研究需要较高计算开销的同时还会影响模型准确率的问题,提出了一种基于通用扰动的防御框架,该框架将检测后门与消除后门的工作结合起来。检测阶段在样本集上产生能使良性样本分类错误而对后门样本无影响的扰动,通过对比待检测样本添加扰动后模型前后输出结果的变化来完成后门样本的高效检测。消除阶段将检测到的后门样本使用随机主色覆盖方法重建后与良性样本混合去重训练后门模型。在MNIST、Fashion-MNIST和CIFAR-10数据集上验证该框架在不同触发器设计、中毒比例对防御的影响以及对于特定标签攻击的防御效果。实验表明,该框架不仅能很好地降低后门攻击在不同条件下的攻击成功率,还对良性样本的分类性能几乎没有影响,同时对于特定标签攻击的防御效果相比之前的研究也有了很大的提升。 展开更多
关键词 深度神经网络 通用扰动 特定标签攻击 后门攻击 后门防御
在线阅读 下载PDF
脉冲神经网络对抗样本攻击与防御综述
19
作者 王晓璐 岳鹏飞 +3 位作者 张家琪 姬婕 董航 孔德懿 《计算机工程与应用》 北大核心 2026年第2期54-72,共19页
随着脉冲神经网络的广泛部署应用,其安全性问题也愈发明显,尤其是来自对抗样本攻击的威胁。因此,展开对脉冲神经网络中的对抗样本攻击方法与防御措施的调查。就对抗样本攻击方法展开研究,软件层方面从梯度攻击、迁移学习攻击、编码扰动... 随着脉冲神经网络的广泛部署应用,其安全性问题也愈发明显,尤其是来自对抗样本攻击的威胁。因此,展开对脉冲神经网络中的对抗样本攻击方法与防御措施的调查。就对抗样本攻击方法展开研究,软件层方面从梯度攻击、迁移学习攻击、编码扰动攻击和传感器攻击着手整理;硬件层方面从电源注入攻击、侧信道攻击和特洛伊木马攻击开展整理。就对抗样本防御措施开展研究,软件层的防御措施从对抗训练、输入过滤、改进编码、特征网络分析和模型融合入手整理;硬件层的防御措施从电路优化和安全框架的两部分切入开展论述。探讨对抗样本在模型安全研究以及验证码反识别中的应用。最后,提出当下的挑战与未来展望并总结全文。 展开更多
关键词 脉冲神经网络(SNN) 对抗样本攻击 对抗样本防御 人工智能模型安全
在线阅读 下载PDF
基于服务器主动安全的自动化红队测试技术研究
20
作者 周勇 陈玺名 +4 位作者 程度 仇晶 袁启 张献 李晓辉 《微电子学与计算机》 2026年第2期126-138,共13页
高级持续性威胁(Advanced Persistent Threat, APT)对政府机构、企业及其他组织的网络安全和隐私构成了严重威胁。在现有的红队测试中,缺乏明确的攻击行为顺序指导,导致潜在网络威胁的推理和验证效率低下。为解决这一问题,提出了一种基... 高级持续性威胁(Advanced Persistent Threat, APT)对政府机构、企业及其他组织的网络安全和隐私构成了严重威胁。在现有的红队测试中,缺乏明确的攻击行为顺序指导,导致潜在网络威胁的推理和验证效率低下。为解决这一问题,提出了一种基于偏序规划的攻击图构建方法。这种方法能够快速、准确且有序地预测潜在的威胁路径。此外,现有的威胁评估指标主要集中于通用威胁评估,忽视了实际网络环境中威胁利用的难度。针对这一问题,提出了一种结合CVSS和代理深度的风险评估模型,以更全面地衡量风险。设计了一款基于攻击图的自动化渗透测试工具,能够实现基于攻击路径的自主信息收集、渗透测试和后渗透测试的全流程自动化。通过在多个网络环境中的验证,结果表明:所提方法能够有效推理攻击序列并针对攻击路径可行性实现高效精准评估,最终指导自动化渗透攻击实现可行性验证。 展开更多
关键词 攻击图 风险评估 自动化渗透 网络攻防
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部