期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Impact Analysis of MTD on the Frequency Stability in Smart Grid
1
作者 Zhenyong Zhang Ruilong Deng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期275-277,共3页
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susc... Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susceptances. However, most pioneer work only focus on the defending performance of MTD in terms of detecting FDIAs and the impact of MTD on the static factors such as the power and economic losses. 展开更多
关键词 SMART MTD IMPACT
在线阅读 下载PDF
Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised Data-Driven Approach
2
作者 Zhenyong Zhang Yan Qin +2 位作者 Jingpei Wang Hui Li Ruilong Deng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期550-553,共4页
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is launched.Specifically, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them. 展开更多
关键词 DUMMY POWER LETTER
在线阅读 下载PDF
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
3
作者 Hao Li Kuan Shao +2 位作者 Xin Wang Mufeng Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第3期5387-5405,共19页
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.P... Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.Previous schemes have achieved secure outsourced computing,but they suffer from low computational accuracy,difficult-to-handle heterogeneous distribution of data from multiple sources,and high computational cost,which result in extremely poor user experience and expensive cloud computing costs.To address the above problems,we propose amulti-precision,multi-sourced,andmulti-key outsourcing neural network training scheme.Firstly,we design a multi-precision functional encryption computation based on Euclidean division.Second,we design the outsourcing model training algorithm based on a multi-precision functional encryption with multi-sourced heterogeneity.Finally,we conduct experiments on three datasets.The results indicate that our framework achieves an accuracy improvement of 6%to 30%.Additionally,it offers a memory space optimization of 1.0×2^(24) times compared to the previous best approach. 展开更多
关键词 Functional encryption multi-sourced heterogeneous data privacy preservation neural networks
在线阅读 下载PDF
FIR-YOLACT:Fusion of ICIoU and Res2Net for YOLACT on Real-Time Vehicle Instance Segmentation 被引量:1
4
作者 Wen Dong Ziyan Liu +1 位作者 Mo Yang Ying Wu 《Computers, Materials & Continua》 SCIE EI 2023年第12期3551-3572,共22页
Autonomous driving technology has made a lot of outstanding achievements with deep learning,and the vehicle detection and classification algorithm has become one of the critical technologies of autonomous driving syst... Autonomous driving technology has made a lot of outstanding achievements with deep learning,and the vehicle detection and classification algorithm has become one of the critical technologies of autonomous driving systems.The vehicle instance segmentation can perform instance-level semantic parsing of vehicle information,which is more accurate and reliable than object detection.However,the existing instance segmentation algorithms still have the problems of poor mask prediction accuracy and low detection speed.Therefore,this paper proposes an advanced real-time instance segmentation model named FIR-YOLACT,which fuses the ICIoU(Improved Complete Intersection over Union)and Res2Net for the YOLACT algorithm.Specifically,the ICIoU function can effectively solve the degradation problem of the original CIoU loss function,and improve the training convergence speed and detection accuracy.The Res2Net module fused with the ECA(Efficient Channel Attention)Net is added to the model’s backbone network,which improves the multi-scale detection capability and mask prediction accuracy.Furthermore,the Cluster NMS(Non-Maximum Suppression)algorithm is introduced in the model’s bounding box regression to enhance the performance of detecting similarly occluded objects.The experimental results demonstrate the superiority of FIR-YOLACT to the based methods and the effectiveness of all components.The processing speed reaches 28 FPS,which meets the demands of real-time vehicle instance segmentation. 展开更多
关键词 Instance segmentation real-time vehicle detection YOLACT Res2Net ICIoU
在线阅读 下载PDF
CoRE:Constrained Robustness Evaluation of Machine Learning-Based Stability Assessment for Power Systems 被引量:1
5
作者 Zhenyong Zhang David K.Y.Yau 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期557-559,共3页
Dear Editor,Machine learning(ML) approaches have been widely employed to enable real-time ML-based stability assessment(MLSA) of largescale automated electricity grids. However, the vulnerability of MLSA to malicious ... Dear Editor,Machine learning(ML) approaches have been widely employed to enable real-time ML-based stability assessment(MLSA) of largescale automated electricity grids. However, the vulnerability of MLSA to malicious cyber-attacks may lead to wrong decisions in operating the physical grid if its resilience properties are not well understood before deployment. Unlike adversarial ML in prior domains such as image processing, specific constraints of power systems that the attacker must obey in constructing adversarial samples require new research on MLSA vulnerability analysis for power systems. 展开更多
关键词 enable CONSTRAINTS Power
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部