|
|
|
Shilin Qiu, Qihe Liu, Shijie Zhou and Chunjiang Wu
In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing, automatic driving, and other fields. However, artificial intelligence systems are vulnerable to adversarial attacks, which limit ...
ver más
|
|
|
|
|
|
|
Luitze Perk, Leo van Rijn, Kimberley Koudstaal and Jan Fordeyn
A rational method for the design of sand dike/dune systems at sheltered sites is presented, focussing on the cross-shore dimensions of the sand dike in relation to the local wave climate, tidal regime and available sandy materials. The example case is th...
ver más
|
|
|
|
|
|
|
Tatjana Stevanovic,Ljilja Antic,Aleksandar Savic
Pág. 283 - 297
The purpose of this paper is to investigate the specific characteristics of performance measurement on the example of the Ministry of Defense and the Serbian Armed Forces. The calculation of financial and non-financial performance measures of the Ministr...
ver más
|
|
|
|
|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|
|
|
|
Aneta Wysokinska-Senkus, Justyna Górna, Magdalena Kazmierczak, Pawel Mielcarek and Piotr Senkus
Context: Food safety is essential for every human. It determines public health, nutrition, elimination of hunger, and the promotion of sustainable agriculture. It is crucial for sustainable production, consumption, and international food trade. Ensuring ...
ver más
|
|
|
|
|
|
|
Weizhen Xu, Chenyi Zhang, Fangzhen Zhao and Liangda Fang
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative e...
ver más
|
|
|
|
|
|
|
Mengjing Gao, Tian Yan, Quancheng Li, Wenxing Fu and Jin Zhang
As defense technology develops, it is essential to study the pursuit?evasion (PE) game problem in hypersonic vehicles, especially in the situation where a head-on scenario is created. Under a head-on situation, the hypersonic vehicle?s speed advantage is...
ver más
|
|
|
|
|
|
|
Yuhang Zhang and Ming Ni
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C...
ver más
|
|
|
|
|
|
|
Dejian Guan, Wentao Zhao and Xiao Liu
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two...
ver más
|
|
|
|
|
|
|
Junfeng Zhou, Lin Zhao, Jianhua Cheng, Shuo Wang and Yipeng Wang
This paper studies the orbital pursuit-evasion-defense problem with the continuous low thrust propulsion. A control strategy for the pursuer is proposed based on the fuzzy comprehensive evaluation and the differential game. First, the system is described...
ver más
|
|
|
|
|
|
|
Yang Sun, Yun Li, Wei Xiong, Zhonghua Yao, Krishna Moniz and Ahmed Zahir
Using Pareto optimization in Multi-Objective Reinforcement Learning (MORL) leads to better learning results for network defense games. This is particularly useful for network security agents, who must often balance several goals when choosing what action...
ver más
|
|
|
|
|
|
|
Jinze Du, Chengtai Gao and Tao Feng
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, m...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Hong Zeng, Yuanhao Zhao, Tianjian Wang and Jundong Zhang
False Data Injection Attacks (FDIA) on ship Direct Current (DC) microgrids may result in the priority trip of a large load, a black-out, and serious accidents of ship collisions when maneuvering in the port. The key of the prevention of FDIA is the detec...
ver más
|
|
|
|
|
|
|
Li Fan, Wei Li and Xiaohui Cui
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the i...
ver más
|
|
|
|
|
|
|
Xiaole Ji, Xinze Li, Yaqian He and Xiaolong Liu
County-level economic statistics estimation using remotely sensed data, such as nighttime light data, has various advantages over traditional methods. However, uncertainties in remotely sensed data, such as the saturation problem of the Defense Meteorolo...
ver más
|
|
|
|
|
|
|
Zhixin Li, Desheng Wen, Zongxi Song, Tuochi Jiang, Weikang Zhang, Gang Liu and Xin Wei
Space target surveillance is a significant part of space defense, and is also important for maintaining national security. Imaging of the space targets is the direct method used to realize space target recognition. However, for long-range space targets, ...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|
|
|
|
Yong Zhu, Qingyi Wu, Shengnan Tang, Boo Cheong Khoo and Zhengxi Chang
As the modern industry rapidly advances toward digitalization, networking, and intelligence, intelligent fault diagnosis technology has become a necessary measure to ensure the safe and stable operation of mechanical equipment and effectively avoid major...
ver más
|
|
|
|
|
|
|
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS...
ver más
|
|
|
|