-
1721
STRATEGIA CÂȘTIGĂTOARE A ARMATEI CAUCAZIENE PENTRU CUCERIREA CETĂȚII ERZURUM (FEBRUARIE 1916)
Published 2023-01-01“…In 1915 the allies in Anatolia, notably Britain and France but without Russian participation, attempted to defeat Turkey by attacking the Dardanelles. The attack failed because the Ottomans concentrated significant troops near Constantinople. …”
Get full text
Article -
1722
Performance Evaluation and Disruption Recovery for Military Supply Chain Network
Published 2020-01-01“…This paper highlights the problem from the perspective of targeted defense strategies before being attacked and analyzes the acceptable recovery time against attacks. …”
Get full text
Article -
1723
Galloping Stability and Aerodynamic Characteristic of Iced Transmission Line Based on 3-DOF
Published 2020-01-01“…At the initial angle of attack, the aerodynamic load is expanded by Taylor, and the unsymmetrical linear aerodynamic coefficient matrix is obtained. …”
Get full text
Article -
1724
A novel approach for detecting malicious hosts based on RE-GCN in intranet
Published 2024-12-01“…Abstract Internal network attacks pose a serious security threat to enterprises and organizations, potentially leading to critical information leaks and network system damage. …”
Get full text
Article -
1725
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…The solution was able to obtain equally good resistance against differential attacks and increased resistance against linear attacks with 40% less linear probability value in comparison with its competitors. …”
Get full text
Article -
1726
NLP neural network copyright protection based on black box watermark
Published 2023-02-01“…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
Get full text
Article -
1727
Traditional guidance mechanism based deep robust watermarking
Published 2023-04-01“…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
Get full text
Article -
1728
An Experimental and Quantum Chemical Calculation Study on the Performance of Different Types of Ester Collectors
Published 2025-01-01“…The S atom polarizability, electrophilic, and nucleophilic attack index of PXA are the smallest, indicating that its electronic deformation capability and nucleophilicity are the weakest, and its collecting ability is the weakest. …”
Get full text
Article -
1729
The Development of the US National Missile Defense and its Impact on the International Security
Published 2015-02-01“…The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. …”
Get full text
Article -
1730
Review of communication optimization methods in federated learning
Published 2024-12-01“…Traditional cloud-centric distributed machine learning, which trains models or optimizes model performance by collecting data from participating parties, is susceptible to security attacks and privacy attacks during the data exchange process, leading to consequences such as a decline in overall system efficiency or the leakage of private data. …”
Get full text
Article -
1731
Pattern Dynamics Analysis of Host–Parasite Models with Aggregation Effect Based on Coupled Map Lattices
Published 2024-12-01“…In such systems, the host is the organism being attacked by the parasitoid, while the parasitoid depends on the host to complete its life cycle. …”
Get full text
Article -
1732
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01“…As one of the most widely utilized censorship circumvention systems, Tor faces serious Sybil attacks in bridge distribution.Censors with rich network and human resources usually deploy a large number of Sybils, which disguise themselves as normal nodes to obtain bridges information and block them.In the process, due to the different identities, purposes and intentions of Sybils and normal nodes, individual or group behavior differences occur in network activities, called as node behavior characteristics.To handle the Sybil attacks threat, a Sybil detection mechanism integrating physical-social attributes was proposed based on the analysis of node behavior characteristics.The physical-social attributes evaluation methods were designed.The credit value of nodes objectively reflecting the operation status of bridges on the nodes and the suspicion index of nodes reflecting the blocking status of bridges, were utilized to evaluate the physical attributes of nodes.The social attributes of nodes were evaluated by the social similarity, which described the static attribute labels of nodes and their social trust characterizing the dynamic interaction behaviors of nodes.Furthermore, integrating the physical-social attributes, the credibility of nodes were defined as the possibility of the current node being a Sybil, which was exploited as a guidance on inferring the true identifies of nodes, so as to achieve accurate detection on Sybils.The detection performance of the proposed mechanism based on the constructed Tor network operation status simulator and the Microblog PCU dataset were simulated.The results show that the proposed mechanism can effectively improve the true positive rate on Sybils, and decrease the false positive rate.It also has stronger resistance on the deceptive behavior of censors, and still performs well in the absence of node social attributes.…”
Get full text
Article -
1733
Effect of betel leaf extract (Piper Betle L.) toward hatching and survival rate of sea bass (Lates calcarifer) larvae
Published 2025-01-01“…One of the factors that causes the hatchability of sea bass (Lates calcarifer) eggs to be low is fungal attack. One natural ingredient that can prevent fungal attacks on fish eggs is betel leaves (Piper betle L.) because they have antifungal compounds. …”
Get full text
Article -
1734
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…Consequently, developing strategies to counter Java deserialization vulnerability attacks has become a critical aspect of network security. …”
Get full text
Article -
1735
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
1736
Blockchain based adaptive federated learning in computational power network
Published 2024-06-01“…Finally, the integration of blockchain technology strengthened the security mechanism, effectively preventing poisoning attacks and inference attacks. Comprehensive experiments on three public standard datasets show that AWFL-BC achieves higher model accuracy and faster model convergence compared to state-of-the-art methods.…”
Get full text
Article -
1737
Network security of the National Natural Science Foundation of China: today and prospects
Published 2022-12-01“…The National Natural Science Foundation of China (hereinafter referred to as the Natural Science Foundation of China) is responsible for effectively utilizing the National Natural Science Foundation of China, supporting basic research, adhering to free exploration, playing a guiding role, and discovering and cultivating science and technology in accordance with the national guidelines, policies and plans for the promotion of scientific and technological progress and coordinated economic and social development.With the continuous development of new productive forces represented by information technology, the Natural Science Foundation of China has been committed to promoting the informatization and intelligence of fund management.With the increasing complexity of business types, various types of network attacks, such as information leakage attacks, are encountered in the construction of informatization and make network security face severe challenges.The network security construction of the Natural Science Foundation of China was took as the main line and the network security construction of the existing platform was introduced.At present, a network security system structure with the science fund project management as the core has been established to ensure the safe and stable operation of the network system.The main information systems of the Natural Science Foundation of China (Natural Science Foundation Shared Service Network, business department website, email system) and its main threats were analyzed and introduced.Then the thoughts and suggestions in the follow-up informatization and network security construction were given.The Natural Science Foundation of China will start the construction of a new generation of secure network.Under the premise of fully considering the characteristics of science fund review, management, and open sharing, it will achieve the overall goal of “smarter, safer, and better” and carry out network security system construction for relevant units.…”
Get full text
Article -
1738
Counterterrorism Planning in the Shipping Industry Leveraging Competitive Intelligence
Published 2025-01-01“…The first chapter delves into primary threats, including hijacking, piracy, ship-borne terrorism, and port attacks, providing an in-depth analysis of their implications and necessary countermeasures. …”
Get full text
Article -
1739
EdgeSecureDP: Strengthening IoHTs Differential Privacy Through Graphvariate Skellam
Published 2025-01-01“…These mechanisms treat data points independently, failing to account for the complex interconnections between nodes (drugs) and edges (interactions), leaves the network vulnerable to structural attacks that can reverse-engineer relationships, thus limiting the security of collaborative drug discovery. …”
Get full text
Article -
1740
Early Stroke Prediction Methods for Prevention of Strokes
Published 2022-01-01“…The literature reveals that the patients always experience ministrokes which are also known as transient ischemic attacks (TIA) before experiencing the actual attack of the stroke. …”
Get full text
Article