The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept o...
详细信息
The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept o...
详细信息
Given the escalating environmental challenges, it is clear that the approach to the usage of public transport (PT) must be reconsidered. Loyal PT users help attract other travelers through positive recommendations, th...
详细信息
This paper concerns with the problem of event-triggered dissipative control for discrete-time fuzzy singular systems. By adopting the fuzzy modeling and the idea of input delay method, the nonlinear singular system wi...
详细信息
This paper concerns with the problem of event-triggered dissipative control for discrete-time fuzzy singular systems. By adopting the fuzzy modeling and the idea of input delay method, the nonlinear singular system with eventtriggered control scheme is reformulated as a new piecewise fuzzy singular system with time delays. Based on the PQLF and some techniques on matrix convexification, an approach to the event-trigger dissipative piecewise state-feedback controller design is developed for the system concerned to be strictly(W, W, W)-γ-dissipative. In addition, the controller gain and the event triggering parameters have been derived by solving a series of linear matrix ***, a numerical example is provided to demonstrate the effectiveness of the proposed method.
The timely identification of external intruders is crucial to the protection of concerned regions or targets against malicious attacks. Multi-agent barrier coverage provides a powerful framework for the effective depl...
详细信息
Resonant beam communications (RBCom) is capable of providing wide bandwidth when using light as the carrier. Besides, the RBCom system possesses the characteristics of mobility, high signal-to-noise ratio (SNR), and m...
详细信息
Environmental Microorganism Data Set Fifth Version (EMDS-5) is a microscopic image dataset including original Environmental Microorganism (EM) images and two sets of Ground Truth (GT) images. The GT image sets include...
详细信息
In this paper, the problem of privacy preservation in the continuous-time dynamic average consensus is addressed by using a state decomposition scheme. We first show that for a conventional dynamic average consensus a...
详细信息
The L − σ relation of HII galaxies (HIIGx) calibrated by a distance indicator is a reliable standard candle for measuring the Hubble constant H0. The most straightforward calibration technique anchors them with the f...
详细信息
Network reconnaissance aims at gathering as much information as possible before an attack is launched. Meanwhile, static host address configuration facilitates network reconnaissance. Currently, more sophisticated net...
Network reconnaissance aims at gathering as much information as possible before an attack is launched. Meanwhile, static host address configuration facilitates network reconnaissance. Currently, more sophisticated network reconnaissance has been emerged with the adaptive and cooperative features. To address this, in this paper, we present Hiding and Trapping (HaT), which is a deceptive approach to disrupt adversarial network reconnaissance with the help of the software-defined networking (SDN) paradigm. HaT is able to hide valuable hosts from attackers and to trap them into decoy nodes through strategic and holistic host address mutation according to characteristic of adversaries. We implement a prototype of HaT, and evaluate its performance by experiments. The experimental results show that HaT is capable to effectively disrupt adversarial network reconnaissance with better deceptive performance than the existing address randomization approach.
暂无评论