Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties ...Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit(SAGRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform(FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features.Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.展开更多
The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal ...The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal of Electronics and Information Technology 29(9)(2007)2077-2081] and [Dong-Feng Chen et al., Procedia Engineering 29(5)(2012)3302-3306] the ignorance of the influence of the intuitionistic index's orientation on the membership functions in the reasoning, which caused partial information loss in reasoning process. Therefore, we present a 3D expression of intuitionistic fuzzy similarity measurement, make an analysis of the constraints for intuitionistic fuzzy similarity measurement, and redefine the intuitionistic fuzzy similarity measurement. Moreover, in view of the threat assessment problem, we give the system variables of attribute function and assessment index, set up the reasoning system based on intuitionistic fuzzy similarity measurement with orientation, and design the reasoning rules, reasoning algorithms and fuzzy-resolving algorithms. Finally, through the threat assessment, some typical examples are cited to verify the validity and superiority of the method.展开更多
The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate...The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance.展开更多
The sea surface escort formation faces various threats in reality. For example, suicide boats may carry explosives or other dangerous items, aiming to cause maximum damage by colliding or detonating escort targets. Si...The sea surface escort formation faces various threats in reality. For example, suicide boats may carry explosives or other dangerous items, aiming to cause maximum damage by colliding or detonating escort targets. Since suicide boats have a certain degree of concealment, it is necessary to establish a threat assessment algorithm to timely identify and respond to such fast and concealed threats. This paper establishes a threat assessment model that considers the instantaneous and historical states of the target. The instantaneous state of the target takes into account six evaluation indicators, including target category, target distance, target heading, target speed, collision risk, and ship automatic identification system(AIS) recognition status;in terms of historical state information mining, a target typical intention recognition method based on graph neural network is proposed to achieve end-to-end target typical intention recognition. Furthermore, this paper introduces a multi-attribute decision analysis method to weight the evaluation indicators, improves the relative closeness calculation method between different evaluation schemes and positive and negative ideal schemes, and determines the target threat ranking based on relative closeness. Based on Unity3D, a set of unmanned boat confrontation simulation system is designed and developed, and typical intention recognition data sets and threat assessment scenario simulation data are generated through real-life confrontation. Comparative analysis shows that the threat assessment model in this paper can accurately and timely detect raid target threats and give scientific and reasonable target threat ranking results.展开更多
The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave ind...The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.展开更多
In view of the fact that traditional air target threat assessment methods are difficult to reflect the combat characteristics of uncertain, dynamic and hybrid formation, an algorithm is proposed to solve the multi-tar...In view of the fact that traditional air target threat assessment methods are difficult to reflect the combat characteristics of uncertain, dynamic and hybrid formation, an algorithm is proposed to solve the multi-target threat assessment problems. The target attribute weight is calculated by the intuitionistic fuzzy entropy(IFE) algorithm and the time series weight is gained by the Poisson distribution method based on multi-times data. Finally,assessment and sequencing of the air multi-target threat model based on IFE and dynamic Vlse Kriterijumska Optimizacija I Kompromisno Resenje(VIKOR) is established with an example which indicates that the method is reasonable and effective.展开更多
Threat assessment is one of the most important parts of the tactical decisions,and it has a very important influence on task allocation.An application of fuzzy cognitive map(FCM) for target threat assessment in the ai...Threat assessment is one of the most important parts of the tactical decisions,and it has a very important influence on task allocation.An application of fuzzy cognitive map(FCM) for target threat assessment in the air combat is introduced.Considering the fact that the aircrafts participated in the cooperation may not have the same threat assessment mechanism,two different FCM models are established.Using the method of combination,the model of cooperative threat assessment in air combat of multi-aircrafts is established.Simulation results show preliminarily that the method is reasonable and effective.Using FCM for threat assessment is feasible.展开更多
This paper examines the use in assisting naval operators in managing the of a fuzzy knowledge-based system (KBS) situation and threat assessment problem in a littoral environment. Under the scenario created involvin...This paper examines the use in assisting naval operators in managing the of a fuzzy knowledge-based system (KBS) situation and threat assessment problem in a littoral environment. Under the scenario created involving air contacts in a littoral environment, the assessment of the KBS model is conducted and the results show that the correlation between assessment and human operation officers' judgment was high. The fuzzy KBS with its corresponding toolkits is much more flexible to be integrated with other components of a command and control system, while the fine-tuning of membership functions and fuzzy inference rules are intensive, this makes any further modification a non-trivial task.展开更多
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu...As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.展开更多
Real-time resource allocation is crucial for phased array radar to undertake multi-task with limited resources,such as the situation of multi-target tracking,in which targets need to be prioritized so that resources c...Real-time resource allocation is crucial for phased array radar to undertake multi-task with limited resources,such as the situation of multi-target tracking,in which targets need to be prioritized so that resources can be allocated accordingly and effectively.A three-way decision-based model is proposed for adaptive scheduling of phased radar dwell time.Using the model,the threat posed by a target is measured by an evaluation function,and therefore,a target is assigned to one of the three possible decision regions,i.e.,positive region,negative region,and boundary region.A different region has a various priority in terms of resource demand,and as such,a different radar resource allocation decision is applied to each region to satisfy different tracking accuracies of multi-target.In addition,the dwell time scheduling model can be further optimized by implementing a strategy for determining a proper threshold of three-way decision making to optimize the thresholds adaptively in real-time.The advantages and the performance of the proposed model have been verified by experimental simulations with comparison to the traditional twoway decision model and the three-way decision model without threshold optimization.The experiential results demonstrate that the performance of the proposed model has a certain advantage in detecting high threat targets.展开更多
Sensor management schemes are calculated to reduce target threat level assessment risk in this paper.Hidden Markov model and risk theory are combined to build the target threat level model firstly.Then the target thre...Sensor management schemes are calculated to reduce target threat level assessment risk in this paper.Hidden Markov model and risk theory are combined to build the target threat level model firstly.Then the target threat level estimation risk is defined.And the sensor management schemes are optimized with the smallest target threat level assessment risk.What’s more,the game theory is applied to calculate the optimal sensor management scheme.Some simulations are conducted to prove that the proposed sensor management method is effective.展开更多
基金supported by the National Natural Science Foundation of China (6202201562088101)+1 种基金Shanghai Municipal Science and Technology Major Project (2021SHZDZX0100)Shanghai Municip al Commission of Science and Technology Project (19511132101)。
文摘Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit(SAGRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform(FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features.Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.
基金supported by The Foundation of State Key Laboratory of Astronautic Dynamics of China under Grant No.2012ADL-DW0301The National Natural Science Foundation of China under Grant Nos.61272011,61179010 and 60773209+1 种基金The Natural Science Foundation of Shaanxi Province of China under Grant Nos.2013JQ8035 and 2006F18The Postdoctoral Science Foundation of China under Grant No.2013M542331
文摘The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal of Electronics and Information Technology 29(9)(2007)2077-2081] and [Dong-Feng Chen et al., Procedia Engineering 29(5)(2012)3302-3306] the ignorance of the influence of the intuitionistic index's orientation on the membership functions in the reasoning, which caused partial information loss in reasoning process. Therefore, we present a 3D expression of intuitionistic fuzzy similarity measurement, make an analysis of the constraints for intuitionistic fuzzy similarity measurement, and redefine the intuitionistic fuzzy similarity measurement. Moreover, in view of the threat assessment problem, we give the system variables of attribute function and assessment index, set up the reasoning system based on intuitionistic fuzzy similarity measurement with orientation, and design the reasoning rules, reasoning algorithms and fuzzy-resolving algorithms. Finally, through the threat assessment, some typical examples are cited to verify the validity and superiority of the method.
基金the Study on the Impact of the Construction and Development of Southwest Plateau Airport on the Ecological Environment(CZKY2023032).
文摘The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance.
基金funded by by the National Natural Science Foundation of China under Grant 52101377。
文摘The sea surface escort formation faces various threats in reality. For example, suicide boats may carry explosives or other dangerous items, aiming to cause maximum damage by colliding or detonating escort targets. Since suicide boats have a certain degree of concealment, it is necessary to establish a threat assessment algorithm to timely identify and respond to such fast and concealed threats. This paper establishes a threat assessment model that considers the instantaneous and historical states of the target. The instantaneous state of the target takes into account six evaluation indicators, including target category, target distance, target heading, target speed, collision risk, and ship automatic identification system(AIS) recognition status;in terms of historical state information mining, a target typical intention recognition method based on graph neural network is proposed to achieve end-to-end target typical intention recognition. Furthermore, this paper introduces a multi-attribute decision analysis method to weight the evaluation indicators, improves the relative closeness calculation method between different evaluation schemes and positive and negative ideal schemes, and determines the target threat ranking based on relative closeness. Based on Unity3D, a set of unmanned boat confrontation simulation system is designed and developed, and typical intention recognition data sets and threat assessment scenario simulation data are generated through real-life confrontation. Comparative analysis shows that the threat assessment model in this paper can accurately and timely detect raid target threats and give scientific and reasonable target threat ranking results.
文摘The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.
基金supported by the National Natural Science Foundation of China(61401363)the Science and Technology on Avionics Integration Laboratory and Aeronautical Science Foundation(20155153034)+1 种基金the Innovative Talents Promotion Plan in Shaanxi Province(2017KJXX-15)the Fundamental Research Funds for the Central Universities(3102016AXXX005)
文摘In view of the fact that traditional air target threat assessment methods are difficult to reflect the combat characteristics of uncertain, dynamic and hybrid formation, an algorithm is proposed to solve the multi-target threat assessment problems. The target attribute weight is calculated by the intuitionistic fuzzy entropy(IFE) algorithm and the time series weight is gained by the Poisson distribution method based on multi-times data. Finally,assessment and sequencing of the air multi-target threat model based on IFE and dynamic Vlse Kriterijumska Optimizacija I Kompromisno Resenje(VIKOR) is established with an example which indicates that the method is reasonable and effective.
基金the Northwest Polytechnical University (NWPU) Foundation for Fundamental Research(No.JC201117)the "E-Starts" Youth Foundation of School of Electronics and Information of Northwest Polytechnical University
文摘Threat assessment is one of the most important parts of the tactical decisions,and it has a very important influence on task allocation.An application of fuzzy cognitive map(FCM) for target threat assessment in the air combat is introduced.Considering the fact that the aircrafts participated in the cooperation may not have the same threat assessment mechanism,two different FCM models are established.Using the method of combination,the model of cooperative threat assessment in air combat of multi-aircrafts is established.Simulation results show preliminarily that the method is reasonable and effective.Using FCM for threat assessment is feasible.
文摘This paper examines the use in assisting naval operators in managing the of a fuzzy knowledge-based system (KBS) situation and threat assessment problem in a littoral environment. Under the scenario created involving air contacts in a littoral environment, the assessment of the KBS model is conducted and the results show that the correlation between assessment and human operation officers' judgment was high. The fuzzy KBS with its corresponding toolkits is much more flexible to be integrated with other components of a command and control system, while the fine-tuning of membership functions and fuzzy inference rules are intensive, this makes any further modification a non-trivial task.
基金supported by National Natural Science Foundation of China(Grant Nos.62162022 and 62162024)Young Talents’Science and Technology Innovation Project of Hainan Association for Science and Technology(Grant No.QCXM202007)Hainan Provincial Natural Science Foundation of China(Grant Nos.2019RC098 and 621RC612).
文摘As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.
基金the Aeronautical Science Foundation of China(2017ZC53021)the Open Project Fund of CETC Key Laboratory of Data Link Technology(CLDL-20182101).
文摘Real-time resource allocation is crucial for phased array radar to undertake multi-task with limited resources,such as the situation of multi-target tracking,in which targets need to be prioritized so that resources can be allocated accordingly and effectively.A three-way decision-based model is proposed for adaptive scheduling of phased radar dwell time.Using the model,the threat posed by a target is measured by an evaluation function,and therefore,a target is assigned to one of the three possible decision regions,i.e.,positive region,negative region,and boundary region.A different region has a various priority in terms of resource demand,and as such,a different radar resource allocation decision is applied to each region to satisfy different tracking accuracies of multi-target.In addition,the dwell time scheduling model can be further optimized by implementing a strategy for determining a proper threshold of three-way decision making to optimize the thresholds adaptively in real-time.The advantages and the performance of the proposed model have been verified by experimental simulations with comparison to the traditional twoway decision model and the three-way decision model without threshold optimization.The experiential results demonstrate that the performance of the proposed model has a certain advantage in detecting high threat targets.
文摘Sensor management schemes are calculated to reduce target threat level assessment risk in this paper.Hidden Markov model and risk theory are combined to build the target threat level model firstly.Then the target threat level estimation risk is defined.And the sensor management schemes are optimized with the smallest target threat level assessment risk.What’s more,the game theory is applied to calculate the optimal sensor management scheme.Some simulations are conducted to prove that the proposed sensor management method is effective.