Graph matching over two known graphs is a method for de-anonymizing obscured node labels within an anonymous graph, finding the corresponding nodes in a second graph. In this paper, we consider a new case where a set ...
Graph matching over two known graphs is a method for de-anonymizing obscured node labels within an anonymous graph, finding the corresponding nodes in a second graph. In this paper, we consider a new case where a set of graph signals originate from a hidden graph. We want to match their components to a reference graph to reveal labels of asymmetric nodes. We refer to this as the graph-signal-to-graph matching (GS2GM) problem. We introduce a symmetry detection method to pinpoint the asymmetric nodes in the reference graph. Then, we adapt the existing blind graph matching algorithm, originally designed for asymmetric graphs, to align the detected nodes with signals generated from the target hidden graph. Furthermore, we establish sufficient conditions for perfect node de-anonymization through graph signals, showing that graph signals can leak substantial private information on the concealed labels of the underlying graph.
In this paper, we present a framework based on differential privacy (DP) for querying electric power measurements to detect system anomalies or bad data caused by false data injections (FDIs). Our DP approach conceals...
详细信息
Palladium diselenide(PdSe_(2)),a novel two-dimensional(2D)material with a unique pentagonal crystal structure including anisotropic properties,has emerged as a highly promising candidate for developing the next genera...
详细信息
Palladium diselenide(PdSe_(2)),a novel two-dimensional(2D)material with a unique pentagonal crystal structure including anisotropic properties,has emerged as a highly promising candidate for developing the next generation photoelectronic *** this review,firstly,we have shed light on key figures of merit for polarization *** that,this review mainly highlights the structural and electronic properties of PdSe_(2)focusing on its strong polarization sensitivity,tunable bandgap,and excellent environmental stability,making it ideal for developing the photoelectronic devices such as broadband photodetectors and their further applications in polarization detection-based imaging *** also discuss challenges in scalable synthesis,material stability,and integration with other low-dimensional materials,offering future research directions to optimize PdSe_(2)for commercial *** to the outstanding optoelectronic properties of PdSe_(2),it stands at the forefront of optoelectronic materials,poised to enable new innovations in polarization photodetection.
Cybersecurity breaches targeting electrical substations constitute a significant threat to the integrity of the power grid, necessitating comprehensive defense and mitigation strategies. Any anomaly in information and...
详细信息
ISBN:
(数字)9798350381832
ISBN:
(纸本)9798350381849
Cybersecurity breaches targeting electrical substations constitute a significant threat to the integrity of the power grid, necessitating comprehensive defense and mitigation strategies. Any anomaly in information and communication technology (ICT) should be detected for secure communications between devices in digital substations. This paper proposes large language models (LLMs), e.g., ChatGPT, for the cybersecurity of IEC 61850-based communications. Multi-cast messages such as generic object oriented system events (GOOSE) and sampled values (SV) are used for case studies. The proposed LLM-based cybersecurity framework includes, for the first time, data pre-processing of communication systems and human-in-the-loop (HITL) training (considering the cybersecurity guidelines recommended by humans). The results show a comparative analysis of detected anomaly data carried out based on the performance evaluation metrics for different LLMs. A hardware-in-the-loop (HIL) testbed is used to generate and extract a dataset of IEC 61850 communications.
The representation of distribution networks within large transmission systems becomes increasingly relevant due to the growing share of distributed generation in lower voltage levels. Modelling detailed distribution n...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions $(\text{TLA}^{+}...
详细信息
ISBN:
(数字)9798350351507
ISBN:
(纸本)9798350363067
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions $(\text{TLA}^{+})$ , into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive “failuresy” through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding $\text { TLA }^{+}$ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in $\text { TLA }^{+}$ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudi
This article introduces a novel method for predicting solar energy production using an affordable data logger and the Artificial Neural Network (ANN) algorithm. The main goal of this research is to create a ...
详细信息
In this paper, a compact wideband dual-polarized Luneburg lens antenna (LLA) with reduced anisotropy and improved impedance matching is proposed in Ka band with a wide 2D beamscanning capability. Based on transformati...
详细信息
Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first *** centr...
详细信息
Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first *** central wavelengths of Q-switching,Q-switched mode-locking and mode-locking operation modes are 1569.7 nm,1570.9 nm,and 1572 nm,*** mode-locking operation of the proposed fiber laser generates stable dark soliton with a repetition rate of 0.99 MHz and signal-to-noise ratio of 65 *** results validate the capability of generating soliton pulse by doped fiber saturable ***,the proposed fiber laser is beneficial to the applications of optical communication and signal processing system.
暂无评论