This study introduces a novel methodology designed to facilitate the capture of comprehensive image datasets, crucial for accurate 3D modeling of expansive indoor spaces. Leveraging orthophotos generated from panorami...
详细信息
The turbulent combustion characteristics within the combustion chamber of rocket engines and other propulsion systems are crucial to engine performance. In recent years, advancements in deep learning techniques have s...
详细信息
Effective energy storage system (ESS) management is critical for enhancing the performance of standalone DC microgrids, particularly when integrating renewable energy sources such as photovoltaic (PV) or wind systems....
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
Integrated high-linearity modulators are crucial for high dynamic-range microwave photonic (MWP)systems. Conventional linearization schemes usually involve the fine tuning of radio-frequency (RF) power distributio...
详细信息
Integrated high-linearity modulators are crucial for high dynamic-range microwave photonic (MWP)systems. Conventional linearization schemes usually involve the fine tuning of radio-frequency (RF) power distribution, which is rather inconvenient for practical applications and can hardly be implemented on the integrated photonics chip. In this paper, we propose an elegant scheme to linearize a silicon-based modulator in which the active tuning of RF power is eliminated. The device consists of two carrier-depletion-based Mach–Zehnder modulators (MZMs), which are connected in series by a 1×2 thermal optical switch (OS).The OS is used to adjust the ratio between the modulation depths of the two sub-MZMs. Under a proper ratio, the complementary third-order intermodulation distortion (IMD3) of the two sub-MZMs can effectively cancel each other out. The measured spurious-free dynamic ranges for IMD3 are 131, 127, 118, 110,and 109 d B·Hz6∕7at frequencies of 1, 10, 20, 30, and 40 GHz, respectively, which represent the highest linearities ever reached by the integrated modulator chips on all available material platforms.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
A typical setup in many machine learning scenarios involves a server that holds a model and a user that possesses data, and the challenge is to perform inference while safeguarding the privacy of both parties. Private...
详细信息
Quasi (pseudo/approximate) periodic signals often occur in natural settings, particularly when a periodic signal is recorded with noise. In this work, we develop a new dynamical equation system to construct a family o...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Practical applications in Mobile Ad-hoc Networks (MANETs) require the support of diverse network services, e.g., host-centric, content-centric, and location-centric routing and forwarding services. However, existing s...
详细信息
暂无评论