期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Reliability Analysis of Heterogeneous Sensor-Cloud Systems against Targeted Attacks
1
作者 Hao Peng Zhen Qian +3 位作者 Guangquan Xu Kejie Mao Kangtian Li Dandan Zhao 《China Communications》 SCIE CSCD 2022年第8期181-197,共17页
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to t... Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability. 展开更多
关键词 sensor-cloud systems targeted attacks heterogeneous networks reliability analysis system security
在线阅读 下载PDF
Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization
2
作者 Zhiyi Ding Lei Sun +2 位作者 Xiuqing Mao Leyu Dai Ruiyang Ding 《Computers, Materials & Continua》 SCIE EI 2024年第9期4387-4412,共26页
Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural netw... Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural networks when confronted with carefully crafted adversarial examples.This not only reveals their shortcomings in defending against malicious attacks but also raises widespread concerns about the security of existing systems.Most existing adversarial attack strategies focus primarily on image classification problems,failing to fully exploit the unique characteristics of object detectionmodels,thus resulting in widespread deficiencies in their transferability.Furthermore,previous research has predominantly concentrated on the transferability issues of non-targeted attacks,whereas enhancing the transferability of targeted adversarial examples presents even greater challenges.Traditional attack techniques typically employ cross-entropy as a loss measure,iteratively adjusting adversarial examples to match target categories.However,their inherent limitations restrict their broad applicability and transferability across different models.To address the aforementioned challenges,this study proposes a novel targeted adversarial attack method aimed at enhancing the transferability of adversarial samples across object detection models.Within the framework of iterative attacks,we devise a new objective function designed to mitigate consistency issues arising from cumulative noise and to enhance the separation between target and non-target categories(logit margin).Secondly,a data augmentation framework incorporating random erasing and color transformations is introduced into targeted adversarial attacks.This enhances the diversity of gradients,preventing overfitting to white-box models.Lastly,perturbations are applied only within the specified object’s bounding box to reduce the perturbation range,enhancing attack stealthiness.Experiments were conducted on the Microsoft Common Objects in Context(MS COCO)dataset using You Only Look Once version 3(YOLOv3),You Only Look Once version 8(YOLOv8),Faster Region-based Convolutional Neural Networks(Faster R-CNN),and RetinaNet.The results demonstrate a significant advantage of the proposed method in black-box settings.Among these,the success rate of RetinaNet transfer attacks reached a maximum of 82.59%. 展开更多
关键词 Object detection model security targeted attack gradient diversity
在线阅读 下载PDF
HEURISTIC PARTICLE SWARM OPTIMIZATION ALGORITHM FOR AIR COMBAT DECISION-MAKING ON CMTA 被引量:18
3
作者 罗德林 杨忠 +2 位作者 段海滨 吴在桂 沈春林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2006年第1期20-26,共7页
Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm opt... Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm optimization (HPSO) algorithm is proposed to solve the decision-making (DM) problem. HA facilitates to search the local optimum in the neighborhood of a solution, while the PSO algorithm tends to explore the search space for possible solutions. Combining the advantages of HA and PSO, HPSO algorithms can find out the global optimum quickly and efficiently. It obtains the DM solution by seeking for the optimal assignment of missiles of friendly fighter aircrafts (FAs) to hostile FAs. Simulation results show that the proposed algorithm is superior to the general PSO algorithm and two GA based algorithms in searching for the best solution to the DM problem. 展开更多
关键词 air combat decision-making cooperative multiple target attack particle swarm optimization heuristic algorithm
在线阅读 下载PDF
An Unknown Trojan Detection Method Based on Software Network Behavior 被引量:2
4
作者 LIANG Yu PENG Guojun +1 位作者 ZHANG Huanguo WANG Ying 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期369-376,共8页
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) atta... Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) attack intents: besides dealing with damaging or destroying facilities, the more essential purpose of APT attacks is to gather confidential data from target hosts by planting Trojans. Inspired by this idea and some in-depth analyses on recently happened APT attacks, five typical communication characteristics are adopted to describe application’s network behavior, with which a fine-grained classifier based on Decision Tree and Na ve Bayes is modeled. Finally, with the training of supervised machine learning approaches, the classification detection method is implemented. Compared with general methods, this method is capable of enhancing the detection and awareness capability of unknown Trojans with less resource consumption. 展开更多
关键词 targeted attack unknown Trojan detection software network behavior machine learning
原文传递
HEURISTIC QUANTUM GENETIC ALGORITHM FOR AIR COMBAT DECISION MAKING ON COOPERATIVE MULTIPLE TARGET ATTACK
5
作者 HAIPENG KONG NI LI 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2013年第4期44-61,共18页
In order to achieve the optimal attack outcome in the air combat under the beyond visual range(BVR)condition,the decision-making(DM)problem which is to set a proper assignment for the friendly fighters on the hostile ... In order to achieve the optimal attack outcome in the air combat under the beyond visual range(BVR)condition,the decision-making(DM)problem which is to set a proper assignment for the friendly fighters on the hostile fighters is the most crucial task for cooperative multiple target attack(CMTA).In this paper,a heuristic quantum genetic algorithm(HQGA)is proposed to solve the DM problem.The originality of our work can be supported in the following aspects:(1)the HQGA assigns all hostile fighters to every missile rather than fighters so that the HQGA can encode chromosomes with quantum bits(Q-bits);(2)the relative successful sequence probability(RSSP)is defined,based on which the priority attack vector is constructed;(3)the HQGA can heuristically modify quantum chromosomes according to modification technique proposed in this paper;(4)last but not the least,in some special conditions,the HQGA gets rid of the constraint described by other algorithms that to obtain a better result.In the end of this paper,two examples are illustrated to show that the HQGA has its own advantage over other algorithms when dealing with the DM problem in the context of CMTA. 展开更多
关键词 Air combat decision making cooperative multiple target attack heuristic modification quantum genetic algorithm
原文传递
Open-loop solution of a defender–attacker–target game:penalty function approach
6
作者 Vladimir Turetsky Valery Y.Glizer 《Journal of Control and Decision》 EI 2019年第3期166-190,共25页
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu... A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders. 展开更多
关键词 Defender–attacker–target problem pursuit-evasion differential game zero-sum linear-quadratic game terminal state inequality constraint
原文传递
Complex Network Analysis of the Robustness of the Hanoi,Vietnam Bus Network 被引量:5
7
作者 TRAN Vu Hieu CHEONG Siew Ann BUI Ngoc Dung 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2019年第5期1251-1263,共13页
Many complex networks exist to facilitate the transport of material or information.In this capacity,the authors are often concerned with the continued flow of material or information when a fraction of the links in th... Many complex networks exist to facilitate the transport of material or information.In this capacity,the authors are often concerned with the continued flow of material or information when a fraction of the links in the complex network is disrupted.In other words,the authors are interested in the robustness of the complex network.In this paper,the authors survey measures of robustness like the average path length,the average clustering coefficient,the global efficiency,the size of largest cluster and use these to analyze the robustness of the bus network in Hanoi,Vietnam.The authors find that the bus network is robust against random failure but sensitive to targeted attack,in agreement with its scale-free character.By examining sharp drops in the average path length within the largest cluster of the Hanoi bus network under successive targeted attack,the authors identify five nodes whose loss lead to the fragmentation of the network into five or six disconnected clusters.These isolated clusters represent geographically the Central,Western,Southern,and Northwestern districts of Hanoi.Special considerations must therefore be given to these five nodes when planners wish to expand the bus network,or make it more robust. 展开更多
关键词 Complex network hanoi bus network random failure ROBUSTNESS targeted attack
原文传递
Structural Fault Tolerance of Scale-Free Networks 被引量:1
8
作者 蒿敬波 殷建平 张波云 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第S1期246-249,共4页
The fault tolerance of scale-free networks is examined in this paper. Through the simulation on the changes of the average path length and network fragmentation of the Barabasi-Albert model when faults happen, it can ... The fault tolerance of scale-free networks is examined in this paper. Through the simulation on the changes of the average path length and network fragmentation of the Barabasi-Albert model when faults happen, it can be observed that generic scale-free networks are quite robust to random failures, but are very vulnerable to targeted attacks at the same time. Therefore, an existing optimization strategy for the robustness of scale-free networks to failures and attacks is also introduced. The simulation similar with the above proved that the so-called (1,0) network has potentially interconnectedness closer to that of a scale-free network and robustness to targeted attacks closer to that of an exponential network. Furthermore, its resistance to random failures is better than that of either of them. 展开更多
关键词 scale-free network random failure targeted attack optimization strategy
原文传递
Hawk and pigeon's intelligence for UAV swarm dynamic combat game via competitive learning pigeon-inspired optimization 被引量:11
9
作者 YU YuePing LIU JiChuan WEI Chen 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2022年第5期1072-1086,共15页
For unmanned aerial vehicle(UAV)swarm dynamic combat,swarm antagonistic motion control and attack target allocation are extremely challenging sub-tasks.In this paper,the competitive learning pigeon-inspired optimizati... For unmanned aerial vehicle(UAV)swarm dynamic combat,swarm antagonistic motion control and attack target allocation are extremely challenging sub-tasks.In this paper,the competitive learning pigeon-inspired optimization(CLPIO)algorithm is proposed to handle the cooperative dynamic combat problem,which integrates the distributed swarm antagonistic motion and centralized attack target allocation.Moreover,the threshold trigger strategy is presented to switch two sub-tasks.To seek a feasible and optimal combat scheme,a dynamic game approach combined with hawk grouping mechanism and situation assessment between sub-groups is designed to guide the solution of the optimal attack scheme,and the model of swarm antagonistic motion imitating pigeon’s intelligence is proposed to form a confrontation situation.The analysis of the CLPIO algorithm shows its convergence in theory and the comparison with the other four metaheuristic algorithms shows its superiority in solving the mixed Nash equilibrium problem.Finally,numerical simulation verifis that the proposed methods can provide an effective combat scheme in the set scenario. 展开更多
关键词 unmanned aerial vehicle(UAV) competitive learning pigeon-inspired optimization(CLPIO) swarm antagonistic motion attack target allocation dynamic game theory
原文传递
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications 被引量:1
10
作者 Wei Ren Linchen Yu +1 位作者 Liangli Ma Yi Ren 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期100-107,共8页
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A ... Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme, 展开更多
关键词 Machine to Machine (M2M) reliability security target distinguishing attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部