修车大队一品楼qm论坛51一品茶楼论坛,栖凤楼品茶全国楼凤app软件 ,栖凤阁全国论坛入口,广州百花丛bhc论坛杭州百花坊妃子阁

oe1(光电查) - 科学论文

19 条数据
?? 中文(中国)
  • [IEEE 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) - Kathmandu, Nepal (2018.10.25-2018.10.27)] 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) - Li-Fi Technology: Bridging The Radio Frequency Communication Gap

    摘要: Communication in the modern day era is predominantly dependent on Information and Communication Technology (ICT). The rise in cybercrime, digital espionage and other cyber-related disturbances is one of great concerns to cyberspace users, both corporate and individual. Radio Frequency technologies and solutions been adopted for in-building, and outdoor wireless coverage solutions for the supply-chains market, including turnkey solutions for optimized communications, are been faced with security issues. This paper suggests a secure network communications route (Li-Fi Technology) alternative for users of radio frequency identification (RFID) technologies and solutions. A communication path that is resilient and resistant to disruptions by mitigating sophisticated network communication attacks such as spoofing and TCP/IP attacks (Man-In-the-middle attacks, Denial of Service attacks). This paper proposes the use of Li-Fi network for a safe and secure cyberspace communication exchange path.

    关键词: LED,Wi-Fi,Li-Fi,RFID,Network,Attacks,Communication

    更新于2025-09-23 15:23:52

  • Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform

    摘要: In this paper, using singular value decomposition (SVD) and sharp frequency localized contourlet transform (SFLCT) a secure and robust image watermarking procedure is introduced. The SVD and SFLCT are applied on both watermark and original images and using the properties of the SVD and utilizing the advantages of the SFLCT, noticeable results of the watermarking requirements are obtained. Since most of the SVD based watermarking schemes are not resistant against ambiguity attacks and suffer from the false positive problem, this objection is resolved without adding extra steps to the watermarking algorithm and the suggested scheme is secure and resistant against ambiguity attacks. The simulation of the scheme is implemented and its robustness against various types of attacks is experimented. In comparison with some of the recent schemes this procedure shows high imperceptibility, capacity and robustness and these features make the scheme a suitable choice for the image processing applications.

    关键词: Ambiguity attacks,Contourlet transform,Image processing,Singular values,Image watermarking

    更新于2025-09-23 15:22:29

  • Cognitive Cameras - [Opinion]

    摘要: Today, computer vision can track cars, faces, and production processes as accurately as most people can. When there’s a lot of data to sift through, computer-vision models are better than people. But there are limits. Computers still need more time than a human to recognize a person or action. They can’t follow a person or object between multiple video cameras. They can be fooled easily. They can’t assign meaning to what they see. These are the limits engineers must overcome to make cameras more useful in manufacturing and in smart cities.

    关键词: surveillance,image processing,adversarial attacks,computer vision,cognitive cameras

    更新于2025-09-23 15:21:21

  • RAGuard

    摘要: Control-flow integrity (CFI) is a general method for preventing code-reuse attacks, which utilize benign code sequences to achieve arbitrary code execution. CFI ensures that the execution of a program follows the edges of its predefined static Control-Flow Graph: any deviation that constitutes a CFI violation terminates the application. Despite decades of research effort, there are still several implementation challenges in efficiently protecting the control flow of function returns (Return-Oriented Programming attacks). The set of valid return addresses of frequently called functions can be large and thus an attacker could bend the backward-edge CFI by modifying an indirect branch target to another within the valid return set. This article proposes RAGuard, an efficient and user-transparent hardware-based approach to prevent Return-Oriented Programming attacks. RAGuard binds a message authentication code (MAC) to each return address to protect its integrity. To guarantee the security of the MAC and reduce runtime overhead: RAGuard (1) computes the RAMAC by encrypting the signature of the return address with AES-128 to raise the complexity of brute force attacks to 2128; (2) develops a key management module based on a Physical Unclonable Function (PUF) and a True Random Number Generator (TRNG), and (3) uses a dedicated register to reduce MACs’ load and store operations of leaf functions. We have evaluated our mechanism based on the open-source LEON3 processor and the results show that RAGuard incurs acceptable performance overhead and occupies reasonable area.

    关键词: PUF,key management,return-oriented programming attacks,AES-128,Code-reuse attacks,message authentication code

    更新于2025-09-23 15:21:01

  • Stereotactic laser anterior corpus callosotomy for Lennoxa??Gastaut syndrome

    摘要: Objective: Corpus callosotomy is an effective palliative treatment for drug-resistant Lennox-Gastaut syndrome (LGS). Laser interstitial thermal therapy has been increasingly used in the treatment of epilepsy. Here, we assess the safety and effectiveness of minimally invasive stereotactic laser anterior corpus callosotomy (SLACC) for drop attacks in LGS. Methods: We reviewed sequential cases of patients with medically intractable LGS who underwent SLACC using a two-cannula technique between November 2014 and July 2019. Pre- and postoperative magnetic resonance imaging was used to measure the anteroposterior length of callosal ablation (contrast-enhancing lesion) and estimated disconnection (gap in tract projections on diffusion tensor imaging). Patients were followed longitudinally to assess clinical outcomes. Results: Ten patients were included in this study. The median age was 33 (range = 11-52) years, median duration of epilepsy was 26 (range = 10-49) years, and median duration of postoperative follow-up was 19 (range = 6-40) months. In the anteroposterior direction, 53 ± 7% (mean ± SD) of the corpus callosum was ablated and 62 ± 19% of the corpus callosum was estimated to be disconnected. Six (60%) of 10 patients achieved >80% seizure reduction, two (20%) of whom became seizure-free. Eight (80%) patients had >80% reduction in drop attacks, five (50%) of whom became free of drop attacks. Three patients subsequently underwent laser posterior callosotomy with further improvement in drop attacks and/or overall seizure frequency. One patient had an asymptomatic intracerebral hemorrhage along the cannula tract. One patient developed significant aggression after becoming seizure-free. Significance: Seizure outcomes following SLACC were comparable to previously reported outcomes of open callosotomy, with reasonable safety profile. SLACC appears to be an effective alternative to open anterior corpus callosotomy with minimal postoperative discomfort and a short recovery period.

    关键词: Lennox-Gastaut syndrome,corpus callosotomy,laser ablation,drop attacks,vagus nerve stimulation

    更新于2025-09-23 15:21:01

  • D-band waveguide-to-microstrip transition implemented in eWLB packaging technology

    摘要: In this paper, based on fractional calculus, the arbitrary-order fractor is proposed to implement the analog circuit realization of the arbitrary-order Fractional Hop?eld Neural Networks (FHNNs) and the fractor-based FHNNs are ?rst proposed to apply to the hardware security of defense against chip cloning attacks. Since the fractor is the most important circuit component needed to implement the FHNNs, the hardware achievement of the arbitrary-order fractor is the primary task and crux for the state-of-the-art application of the FHNNs to defense against chip cloning attacks. Motivated by this need, based on fractional calculus, the arbitrary-order fractor is proposed to implement the analog circuit realization of the arbitrary-order FHNNs and the fractor-based FHNNs are proposed to apply to defense against chip cloning attacks. The ?rst step is the proposal for the analog circuit realization of an arbitrary-order FHNN. In particular, the hardware achievement of the arbitrary-order net-grid-type capacitive scaling fractor of the arbitrary-order FHNNs is chie?y analyzed in detail. The circuit con?guration of the arbitrary-order net-grid-type scaling fractor can be achieved more convenient than any other discovered approximate implementation of the arbitrary-order fractor. Finally, the approximation performance of the arbitrary-order fractor of the FHNNs is analyzed, the arbitrary-order FHNNs are achieved by analog circuit realization, and its ability of defense against chip cloning attacks is illustrated in detail experimentally. The main contribution of this paper is the proposal for the ?rst preliminary attempt of a feasible hardware implementation of the arbitrary-order FHNNs for defense against chip cloning attacks. Different order FHNNs can be achieved and distributed for different users, respectively. Thus, in a similar way to frequency band, order band can also be allocated ef?ciently that is another emerging promising electronic resource.

    关键词: allocation of order band,Fractional calculus,fractance,net-grid-type scaling fractor,defense against chip cloning attacks

    更新于2025-09-23 15:19:57

  • Laser-Induced Flexible Electronics (LIFE) for Resistive, Capacitive and Electrochemical Sensing Applications

    摘要: Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware, and other attacks are able to circumvent traditional technical security controls and target the user directly. Our aim is to explore the feasibility of predicting user susceptibility to deception-based attacks through attributes that can be measured, preferably in real-time and in an automated manner. Toward this goal, we have conducted two experiments, the first on 4333 users recruited on the Internet, allowing us to identify useful high-level features through association rule mining, and the second on a smaller group of 315 users, allowing us to study these features in more detail. In both experiments, participants were presented with attack and non-attack exhibits and were tested in terms of their ability to distinguish between the two. Using the data collected, we have determined practical predictors of users’ susceptibility against semantic attacks to produce and evaluate a logistic regression and a random forest prediction model, with the accuracy rates of .68 and .71, respectively. We have observed that security training makes a noticeable difference in a user’s ability to detect deception attempts, with one of the most important features being the time since last self-study, while formal security education through lectures appears to be much less useful as a predictor. Other important features were computer literacy, familiarity, and frequency of access to a specific platform. Depending on an organisation’s preferences, the models learned can be configured to minimise false positives or false negatives or maximise accuracy, based on a probability threshold. For both models, a threshold choice of 0.55 would keep both false positives and false negatives below 0.2.

    关键词: Security,cyber crime,social engineering,semantic attacks

    更新于2025-09-19 17:13:59

  • [IEEE 2019 IEEE High Power Diode Lasers and Systems Conference (HPD) - Coventry, United Kingdom (2019.10.9-2019.10.10)] 2019 IEEE High Power Diode Lasers and Systems Conference (HPD) - Coherent beam combining of tapered amplifiers under QCW regime

    摘要: In this paper, based on fractional calculus, the arbitrary-order fractor is proposed to implement the analog circuit realization of the arbitrary-order Fractional Hop?eld Neural Networks (FHNNs) and the fractor-based FHNNs are ?rst proposed to apply to the hardware security of defense against chip cloning attacks. Since the fractor is the most important circuit component needed to implement the FHNNs, the hardware achievement of the arbitrary-order fractor is the primary task and crux for the state-of-the-art application of the FHNNs to defense against chip cloning attacks. Motivated by this need, based on fractional calculus, the arbitrary-order fractor is proposed to implement the analog circuit realization of the arbitrary-order FHNNs and the fractor-based FHNNs are proposed to apply to defense against chip cloning attacks. The ?rst step is the proposal for the analog circuit realization of an arbitrary-order FHNN. In particular, the hardware achievement of the arbitrary-order net-grid-type capacitive scaling fractor of the arbitrary-order FHNNs is chie?y analyzed in detail. The circuit con?guration of the arbitrary-order net-grid-type scaling fractor can be achieved more convenient than any other discovered approximate implementation of the arbitrary-order fractor. Finally, the approximation performance of the arbitrary-order fractor of the FHNNs is analyzed, the arbitrary-order FHNNs are achieved by analog circuit realization, and its ability of defense against chip cloning attacks is illustrated in detail experimentally. The main contribution of this paper is the proposal for the ?rst preliminary attempt of a feasible hardware implementation of the arbitrary-order FHNNs for defense against chip cloning attacks. Different order FHNNs can be achieved and distributed for different users, respectively. Thus, in a similar way to frequency band, order band can also be allocated ef?ciently that is another emerging promising electronic resource.

    关键词: Fractional calculus,defense against chip cloning attacks,fractance,allocation of order band,net-grid-type scaling fractor

    更新于2025-09-19 17:13:59

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Wing Integrated Solar Array Performance Study Using Photoluminescence

    摘要: Recent investigations have revealed the susceptibility of phasor measurement units (PMUs) to the time synchronization attack by spoofing its global positioning system (GPS). This paper proposes a cross-layer detection mechanism to fight against simultaneous attacks toward multiple PMUs. In the physical layer, we propose a GPS carrier-to-noise ratio (C/No) based spoofing detection technique. We apply the patch-monopole hybrid antenna to two GPS receivers and compute the difference between the standard deviation of each receiver’s C/No. The priori probability of spoofing is calculated from the distributions of the difference. A counter is embedded in the physical layer to identify the most suspicious PMU. In the upper layer, the spoofing attack is considered similarly to the bad data injection toward the power system. A trustworthiness evaluation, which is based on both the physical layer information and power grid measurements, is applied to identify the PMU being attacked. An experiment has been carried to validate the proposed algorithm.

    关键词: multiple attacks detection,Cross-layer mechanism,global positioning system (GPS) spoofing,phasor measurement units (PMU)

    更新于2025-09-19 17:13:59

  • Optimal attack-aware RWA for scheduled lightpath demands

    摘要: In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire transmission path, creating a virtual topology over the physical connections of optical fibers. Due to the increasingly high data rates and the vulnerabilities related to the transparency of optical networks, TONs are susceptible to different physical layer attacks, including high-power jamming attacks. Developing strategies to handle such attacks and mitigating their impact on network performance is becoming an important design problem for TONs. Some approaches for handling physical layer attacks for static and dynamic traffic in TONs have been presented in recent years. In this work, we propose an integer linear program (ILP) formulation to control the propagation of such attacks in TONs for scheduled lightpath demands, which need periodic bandwidth usage at certain predefined times. We consider both the fixed window model, where the start and end timings of the demand are known in advance, and the sliding window model, where exact start and end times are unknown but fall within a larger window. We consider a number of potential objectives for attack-aware RWA and show how the flexibility to schedule demands in time can impact these objectives, compared to both attack-unaware and fixed window models.

    关键词: Assignment (RWA),Scheduled lightpath demands (SLDs),Routing and wavelength,High-power jamming attacks,Integer linear program (ILP),Transparent optical networks (TONs)

    更新于2025-09-19 17:13:59