partially supported by National Natural Science Foundation of China(Grant No.62303125);Guangdong Basic and Applied Basic Research Foundation(Grant No.2022A1515110949),Guangdong Basic and Applied Basic Research Foundation(Grant No.2023A1515011311);Open Fund of Guangdong Province Key Laboratory of Intelligent Decision and Cooperative Control。
This paper addresses the challenge of dynamic event-based non-fragile state estimation for discrete time-varying systems under deception attacks.These attacks involve injecting deceptive signals into the communication...
supported by ARC Discovery Early Career Researcher Award(Grant No.DE200101465);ARC DP Project(Grant No.DP240101108).
As the adoption of explainable AI(XAI)continues to expand,the urgency to address its privacy implications intensifies.Despite a growing corpus of research in AI privacy and explainability,there is little attention on ...
supported by Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key R&D Program(Grant No.BE2022071);National Natural Science Foundation of China(Grant Nos.12074194,12104240,62101285);Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701);Natural Science Foundation of Jiangsu Province(Grant Nos.BK20192001,BK20210582);Natural Science Foundation of the Jiangsu Higher Education Institutions(Grant No.21KJB140014);Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX23_1030)。
The realistic security of quantum key distribution(QKD)systems is currently a hot research topic in the field of quantum communications.There are always defects in practical devices,and eavesdroppers can make use of t...
supported in part by National Nature Science Foundation of China (Grant Nos. 62272091, 61872060);National Key R&D Program of China (Grant No. 2017YFB0802000)
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information.Subliminal channel attacks are one of the kleptographic attacks.In such attacks,backdoors ar...
supported by National Key Research and Development Program of China (Grant Nos. 2020AAA0104304, 2017YFA0700904);National Natural Science Foundation of China (Grant Nos. 61620106010, 62061136001, 61621136008, 62076147, U19B2034, U1811461, U19A2081);Beijing NSF Project (Grant No. JQ19016);Beijing Academy of Artificial Intelligence (BAAI);Tsinghua-Huawei Joint Research Program, Tsinghua Institute for Guo Qiang;Tsinghua-OPPO Joint Research Center for Future Terminal Technology;Tsinghua-China Mobile Communications Group Co., Ltd. Joint Institute
Deep reinforcement learning models are vulnerable to adversarial attacks that can decrease the cumulative expected reward of a victim by manipulating its observations.Despite the efficiency of previous optimization-ba...
supported by National Natural Science Foundation of China(Grant Nos.62373103,62173308)。
The discrete event system(DES)is a dynamic system driven by asynchronous/sudden events and has been widely used in many critical infrastructures,such as electric transportation networks and intelligent transportation ...
National Natural Science Foundation of China(Grant Nos.62173255,62188101);Shenzhen Key Laboratory of Control Theory and Intelligent Systems(Grant No.ZDSYS20220330161800001)。
This research addresses the output tracking of networked high-order fully actuated(NHOFA)systems under random deception attacks in the sensor to networked controller(SNC)and networked controller to actuator(NCA)commun...
supported by Open Research Projects of Zhejiang Lab(Grnat No.2021KE0AB04);Technology Innovation Project of Hubei Province of China(Grnat No.2019AEA171);Hubei Province Funds for Distinguished Young Scholars(Grnat No.2020CFA050)。
Transfer learning(TL)has been widely used in electroencephalogram(EEG)-based braincomputer interfaces(BCIs)for reducing calibration efforts.However,backdoor attacks could be introduced through TL.In such attacks,an at...
supported in part by National Natural Science Foundation of China(Grant Nos.62073144,61873099,61733008);Natural Science Foundation of Guangdong Province(Grant No.2020A1515010441);Guangzhou Science and Technology Planning Project(Grant Nos.202002030389,202002030158)。
Dear editor,Markovian jump systems(MJSs)have been investigated for decades[1,2].Most existing results on MJSs assume that the mode switching of the controller/filter is synchronized with the operational system.However...
supported by National Natural Science Foundation of China(Grant Nos.12005015,11974205,11774197);National Key Research and Development Program of China(Grant No.2017YFA0303700);Key Research and Development Program of Guangdong Province(Grant No.2018B030325002);Beijing Advanced Innovation Center for Future Chip(ICFC)。
We propose a variational quantum attack algorithm(VQAA)for classical advanced encryption standard(AES)-like symmetric cryptography,as exemplified by the simplified-data encryption standard(S-DES).In the VQAA,the known...