May 26-29,2013 Nanjing,China http://***/2013/cyber Physical systems:Embedded systems;integrated sensing,communication,and computational systems;chemical,biological,physical diagnostic and implantable systems;complex s...
详细信息
May 26-29,2013 Nanjing,China http://***/2013/cyber Physical systems:Embedded systems;integrated sensing,communication,and computational systems;chemical,biological,physical diagnostic and implantable systems;complex systems
The proceedings contain 164 papers. The topics discussed include: the cubic B-spline trajectories with the boundary conditions of null velocities and accelerations;vision-based autonomous perceiving and planning syste...
ISBN:
(纸本)9781665425278
The proceedings contain 164 papers. The topics discussed include: the cubic B-spline trajectories with the boundary conditions of null velocities and accelerations;vision-based autonomous perceiving and planning system of a 7DOF robotic manipulator;ultra-short term power prediction of wind farm based on EEMDSE-GGRU;effect of high speed grinding on surface integrity of cycloid gear;prescribed performance-based chattering-free tracking control for pneumatic muscle actuators;visual detection of cells in brain tissue slice for patch clamp system;and a fast and energy-saving neural network inference method for fault diagnosis of industrial equipment based on edge-end collaboration.
The proceedings contain 304 papers. The topics discussed include: Obstacle avoidance of aerial vehicle based on monocular vision;research on pedestrian detection technology based on improved DPM model;a global localiz...
ISBN:
(纸本)9781538604892
The proceedings contain 304 papers. The topics discussed include: Obstacle avoidance of aerial vehicle based on monocular vision;research on pedestrian detection technology based on improved DPM model;a global localization system for mobile robot using LIDAR sensor;temperature effect analysis of bridge natural frequency based on particle swarm optimized neural network;an improved artificial immune algorithm for trajectory optimization based on comprehensive index;a novel temporal coordination neural model for arm movement based on 3D-hand gesture tracing;an extensible local surface descriptor for 3D object recognition;kinematic calibration and compensation for industrial robots using a telescoping ballbar;and accurate estimation of the spring stiffness in series elastic actuators.
This paper investigates injection attacks incorporating stochastic noise against linear discrete time-varying system, which is more general but also more challenging to defend than deterministic injection attacks. Bas...
详细信息
This paper investigates injection attacks incorporating stochastic noise against linear discrete time-varying system, which is more general but also more challenging to defend than deterministic injection attacks. Based on the optimization theory and novel key defining matrices, an optimal stochastic injection attack strategy is proposed. Unlike existing strategies, this strategy is stochastic, making it harder for defenders to predict. Therefore, the newly designed attack is expected to be widely used to disrupt system performance. By leveraging estimated data from the observer and the attack input, a virtual residual system is established, which more accurately reflects changes in the system error before and after the attack than the traditional error system. Using the state and output residuals along with the stochastic attack input, two performances are defined to ensure the stealthiness and effectiveness of the attack, respectively. Subsequently, an optimal attack problem with non-convex objective function and constraint is formulated. The key to acquiring the designed optimal stochastic injection attack strategy is to apply a semi-definite relaxation involving moment matrices for transforming this non-convex optimization problem into a convex optimization problem and solving it. Finally, the effectiveness of the proposed attack strategy is validated through numerical simulation of a networked mass-spring-damper system and a V-formation experiment involving three quadrotors. Note to Practitioners-The primary objective of this paper is to focus on the cyber security of discrete time-varying systems from the perspective of the attacker, which provides insight into the way of generating attack strategies under the stochastic case. The majority of existing injection attack strategies against intelligentsystems are deterministic, and this can make the attacks less effective as the attacked system reconstructs and compensates for the attack signals, and the attack s
The rapid advancement of industrial automation has led to increased reliance on intelligentcontrolsystems for optimizing mechanical processes. Traditional automation methods often struggle with dynamic environmental...
详细信息
Industrial automation has become a cornerstone of modern manufacturing, enhancing efficiency, reliability, and scalability. The integration of intelligentcontrol algorithms, such as fuzzy logic, neural networks, gene...
详细信息
With the evolution of information and communication technology, the shipping industry, responsible for the highest volume of international trade in goods, has experienced significant advantages in terms of cost-effect...
详细信息
With the evolution of information and communication technology, the shipping industry, responsible for the highest volume of international trade in goods, has experienced significant advantages in terms of cost-effectiveness and the safety of ship operations. However, the implementation of a network with an open interface has compromised network and system security, leading to heightened vulnerability to external cyber-attacks. This survey analyzes the security research trends at four stages of Maritime Autonomous Surface Ships (MASS) and provides an overview of state-of-the-art strategies for enhancing security at the final Level 4, based on key achievements and limitations. In particular, we examine the major research and development efforts for MASS Levels 2 and 3, which include remote control functionalities, emphasizing the importance of security research in the areas of remote control, unmanned ships, and international agreements. The study then focuses on the key achievements and limitations within these three areas. Additionally, we propose seven research areas necessary for the final Level 4 and highlight the importance of developing security architectures that consider maritime stakeholders and foster international consensus. Finally, this study aims to present the current research limitations and future directions to guide researchers interested in contributing to the field of autonomous ship security.
暂无评论