Background Currently,the next-generation industrial systems have attracted a lot of attention,which has raised a new round of innovation in various areas,including smart manufacturing,transportation,and the petrochemi...
Background The intelligent connected vehicle realizes the deep coupling between the traditional closed automobile world and the internet space.The information of the vehicle,road,person,sky and cloud is connected to t...
Background Cyberspace technology has already penetrated various areas such as science,economy,politics as well as defense and military.Cyberspace has now become one of the most important areas which draws attention fr...
Background As a technology integrating distributed computing,network computing and virtualization,cloud computing has attracted much attention since its emergence.By offering flexible and reliable resource services,cl...
supported in part by the National Natural Science Foundation of China (NSFC) under Grant 62372328;in part by the National Key Research and Development Program of China under Grant 2022YFB4501704;in part by the Program of Shanghai Academic Research Leader under Grant 22XD1423700;in part by the Shanghai Science and Technology Innovation Action Plan Project under Grant 22511100700;in part by the Leadership Project under the Oriental Talent Program;in part by the Open Fund of Key Laboratory of Industrial Internet of Things and Networked Control,Ministry of Education,under Grant 2021FF08
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a...
supported by the Chinese Academy of Engineering Strategic Research and Consulting Program (No. 2023-XZ-11)
To address the serious imbalance between the supply and demand of the cybersecurity workforce, this paper proposes to embrace the latest trend of a fundamental shift in the“underlying dynamics of the digital ecosyste...
Background As a technology integrating distributed computing,network computing and virtualization,cloud computing has attracted much attention since its emergence.By offering flexible and reliable resource services,cl...
Background Cyberspace technology has already penetrated various areas such as science,economy,politics as well as defense and military.Cyberspace has now become one of the most important areas which draws attention fr...
This special topic mainly focuses on the progress of physical-layer security(PLS)technologies and their potential applications for the future beyond fifth-generation(B5G)and sixth-generation(6G)networks.The tremendous...
supported in part by the National Science Fund for Distinguished Young Scholars 61825302;in part by the National Natural Science Foundation of China under Grant U2013201;in part by the Key R&D projects(Social Development)in Jiangsu Province of China under Grant BE2020704.
In this paper,as for the unmanned air vehicle(UAV)under external disturbance,an attainable-equilibrium-set-based safety fight envelope(SFE)calculation method is proposed,based on which a prescribed performance protect...