ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Science China(Information Sciences)x
条 记 录,以下是1-10
视图:
排序:
Event-based non-fragile state estimation for time-varying systems under deception attacks
《Science China(Information Sciences)》2025年第4期345-358,共14页Xiao-Meng LI Tao ZOU Renquan LU Zhijia ZHAO 
partially supported by National Natural Science Foundation of China(Grant No.62303125);Guangdong Basic and Applied Basic Research Foundation(Grant No.2022A1515110949),Guangdong Basic and Applied Basic Research Foundation(Grant No.2023A1515011311);Open Fund of Guangdong Province Key Laboratory of Intelligent Decision and Cooperative Control。
This paper addresses the challenge of dynamic event-based non-fragile state estimation for discrete time-varying systems under deception attacks.These attacks involve injecting deceptive signals into the communication...
关键词:discrete time-varying systems deception attacks dynamic event-triggered mechanism finite horizon non-fragile estimation 
Privacy-preserving explainable AI:a survey
《Science China(Information Sciences)》2025年第1期20-53,共34页Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN 
supported by ARC Discovery Early Career Researcher Award(Grant No.DE200101465);ARC DP Project(Grant No.DP240101108).
As the adoption of explainable AI(XAI)continues to expand,the urgency to address its privacy implications intensifies.Despite a growing corpus of research in AI privacy and explainability,there is little attention on ...
关键词:privacy-preserving explainable AI privacy attacks privacy defences PrivEx PPXAI 
Automatically identifying imperfections and attacks in practical quantum key distribution systems via machine learning
《Science China(Information Sciences)》2024年第10期355-368,共14页Jiaxin XU Xiao MA Jingyang LIU Chunhui ZHANG Hongwei LI Xingyu ZHOU Qin WANG 
supported by Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key R&D Program(Grant No.BE2022071);National Natural Science Foundation of China(Grant Nos.12074194,12104240,62101285);Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701);Natural Science Foundation of Jiangsu Province(Grant Nos.BK20192001,BK20210582);Natural Science Foundation of the Jiangsu Higher Education Institutions(Grant No.21KJB140014);Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX23_1030)。
The realistic security of quantum key distribution(QKD)systems is currently a hot research topic in the field of quantum communications.There are always defects in practical devices,and eavesdroppers can make use of t...
关键词:quantum key distribution device imperfections eavasdropping attacks real-time detection machine learning algorithms 
Blockchain-based immunization against kleptographic attacks
《Science China(Information Sciences)》2024年第7期168-179,共12页Changsong JIANG Chunxiang XU Jie CHEN Kefei CHEN 
supported in part by National Nature Science Foundation of China (Grant Nos. 62272091, 61872060);National Key R&D Program of China (Grant No. 2017YFB0802000)
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information.Subliminal channel attacks are one of the kleptographic attacks.In such attacks,backdoors ar...
关键词:kleptographic attacks subliminal channel blockchain IMMUNIZATION randomized algorithm 
Understanding adversarial attacks on observations in deep reinforcement learning被引量:1
《Science China(Information Sciences)》2024年第5期65-79,共15页You QIAOBEN Chengyang YING Xinning ZHOU Hang SU Jun ZHU Bo ZHANG 
supported by National Key Research and Development Program of China (Grant Nos. 2020AAA0104304, 2017YFA0700904);National Natural Science Foundation of China (Grant Nos. 61620106010, 62061136001, 61621136008, 62076147, U19B2034, U1811461, U19A2081);Beijing NSF Project (Grant No. JQ19016);Beijing Academy of Artificial Intelligence (BAAI);Tsinghua-Huawei Joint Research Program, Tsinghua Institute for Guo Qiang;Tsinghua-OPPO Joint Research Center for Future Terminal Technology;Tsinghua-China Mobile Communications Group Co., Ltd. Joint Institute
Deep reinforcement learning models are vulnerable to adversarial attacks that can decrease the cumulative expected reward of a victim by manipulating its observations.Despite the efficiency of previous optimization-ba...
关键词:deep learning reinforcement learning adversarial robustness adversarial attack 
Critical observability of partially observed discrete event systems under cyber attacks
《Science China(Information Sciences)》2024年第2期329-330,共2页Liyun TONG Jinling LIANG Yang LIU 
supported by National Natural Science Foundation of China(Grant Nos.62373103,62173308)。
The discrete event system(DES)is a dynamic system driven by asynchronous/sudden events and has been widely used in many critical infrastructures,such as electric transportation networks and intelligent transportation ...
关键词:system networks TRANSPORTATION 
Predictive sliding-mode control of networked high-order fully actuated systems under random deception attacks被引量:1
《Science China(Information Sciences)》2023年第9期46-59,共14页Da-Wei ZHANG Guo-Ping LIU 
National Natural Science Foundation of China(Grant Nos.62173255,62188101);Shenzhen Key Laboratory of Control Theory and Intelligent Systems(Grant No.ZDSYS20220330161800001)。
This research addresses the output tracking of networked high-order fully actuated(NHOFA)systems under random deception attacks in the sensor to networked controller(SNC)and networked controller to actuator(NCA)commun...
关键词:NHOFA systems random deception attacks predictive sliding-mode control stability and tracking performance tracking control of ABS simulator 
Active poisoning:efficient backdoor attacks on transfer learning-based brain-computer interfaces被引量:2
《Science China(Information Sciences)》2023年第8期207-228,共22页Xue JIANG Lubin MENG Siyang LI Dongrui WU 
supported by Open Research Projects of Zhejiang Lab(Grnat No.2021KE0AB04);Technology Innovation Project of Hubei Province of China(Grnat No.2019AEA171);Hubei Province Funds for Distinguished Young Scholars(Grnat No.2020CFA050)。
Transfer learning(TL)has been widely used in electroencephalogram(EEG)-based braincomputer interfaces(BCIs)for reducing calibration efforts.However,backdoor attacks could be introduced through TL.In such attacks,an at...
关键词:brain-computer interface ELECTROENCEPHALOGRAM transfer learning poisoning attack backdoor attack 
Observer-based event-triggered asynchronous control of networked Markovian jump systems under deception attacks
《Science China(Information Sciences)》2023年第5期291-292,共2页Xiaobin GAO Feiqi DENG Hongyang ZHANG Pengyu ZENG 
supported in part by National Natural Science Foundation of China(Grant Nos.62073144,61873099,61733008);Natural Science Foundation of Guangdong Province(Grant No.2020A1515010441);Guangzhou Science and Technology Planning Project(Grant Nos.202002030389,202002030158)。
Dear editor,Markovian jump systems(MJSs)have been investigated for decades[1,2].Most existing results on MJSs assume that the mode switching of the controller/filter is synchronized with the operational system.However...
关键词:EDITOR OBSERVER NETWORK 
Variational quantum attacks threaten advanced encryption standard based symmetric cryptography
《Science China(Information Sciences)》2022年第10期27-38,共12页Zeguo WANG Shijie WEI Gui-Lu LONG Lajos HANZO 
supported by National Natural Science Foundation of China(Grant Nos.12005015,11974205,11774197);National Key Research and Development Program of China(Grant No.2017YFA0303700);Key Research and Development Program of Guangdong Province(Grant No.2018B030325002);Beijing Advanced Innovation Center for Future Chip(ICFC)。
We propose a variational quantum attack algorithm(VQAA)for classical advanced encryption standard(AES)-like symmetric cryptography,as exemplified by the simplified-data encryption standard(S-DES).In the VQAA,the known...
关键词:S-DES VQA ANSATZ cost function OPTIMIZATION 
检索报告 对象比较 聚类工具 使用帮助 返回顶部