期刊文献+
共找到720篇文章
< 1 2 36 >
每页显示 20 50 100
Behaviour of rainbow trout(Oncorhynchus mykiss) under defensible and indefensible patterns of food delivery
1
作者 M.SAEED HEYDARNEJAD G.J.PURSER 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2010年第4期749-755,共7页
The goal of this study was to investigate the behaviour of rainbow trout(n=30),Oncorhynchus mykiss,in small raceways when either self-feeders(T2) or hand-feeding(t2) were used.The method of food delivery in T2 was def... The goal of this study was to investigate the behaviour of rainbow trout(n=30),Oncorhynchus mykiss,in small raceways when either self-feeders(T2) or hand-feeding(t2) were used.The method of food delivery in T2 was defensible while that of t2 was indefensible.Fish in both raceways were subjected to restricted feeding(RF) for 25 days.Food was available in the morning(09:00-10:00) in the downstream area and in the afternoon(16:00-17:00) in the upstream area of the raceways.The results showed that the behaviour of rainbow trout was significantly different under interference competition(T2) for food compared with that under scramble competition(t2).RF in T2 fish limited food availability to meal times when feeding rewards were available while t2 fish only responded to the location of food delivery.The aggressive fish in T2 were dominant,and t2 fish at high densities showed intense social interactions under the indefensible pattern of food distribution;these interactions did not dampen to a minimum level to suppress the development of dominance hierarchies.Further,the stocking density did not break down the dominance hierarchies between the T2 fish.This suggests that decreased efficiency in the search for food or inefficient foraging,induced by interference competition at high densities,affected the behaviour of rainbow trout. 展开更多
关键词 rainbow trout defensible and indefensible pattern of food delivery DOMINANT
原文传递
Seasonal increase in nest defense,but not egg rejection,in a cuckoo host 被引量:1
2
作者 Bo Zhou Wei Liang 《Avian Research》 SCIE CSCD 2024年第1期50-54,共5页
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ... The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality. 展开更多
关键词 AGGRESSION Anti-parasite strategy Egg rejection Mismatch cuckoo parasitism Nest defense
下载PDF
Grain Yield,Biomass Accumulation,and Leaf Photosynthetic Characteristics of Rice under Combined Salinity-Drought Stress 被引量:1
3
作者 WEI Huanhe GENG Xiaoyu +7 位作者 ZHANG Xiang ZHU Wang ZHANG Xubin CHEN Yinglong HUO Zhongyang ZHOU Guisheng MENG Tianyao DAI Qigen 《Rice science》 SCIE CSCD 2024年第1期118-128,I0023,共12页
Simultaneous stresses of salinity and drought often coincide during rice-growing seasons in saline lands,primarily due to insufficient water resources and inadequate irrigation facilities.Consequently,combined salinit... Simultaneous stresses of salinity and drought often coincide during rice-growing seasons in saline lands,primarily due to insufficient water resources and inadequate irrigation facilities.Consequently,combined salinity-drought stress poses a major threat to rice production.In this study,two salinity levels(NS,non-salinity;HS,high salinity)along with three drought treatments(CC,control condition;DJ,drought stress imposed at jointing;DH,drought stress imposed at heading)were performed to investigate their combined influences on leaf photosynthetic characteristics,biomass accumulation,and rice yield formation.Salinity,drought,and their combination led to a shortened growth period from heading to maturity,resulting in a reduced overall growth duration.Grain yield was reduced under both salinity and drought stress,with a more substantial reduction under the combined salinity-drought stress.The combined stress imposed at heading caused greater yield losses in rice compared with the stress imposed at jointing.Additionally,the combined salinity-drought stress induced greater decreases in shoot biomass accumulation from heading to maturity,as well as in shoot biomass and nonstructural carbohydrate(NSC)content in the stem at heading and maturity.However,it increased the harvest index and NSC remobilization reserve.Salinity and drought reduced the leaf area index and SPAD value of flag leaves and weakened the leaf photosynthetic characteristics as indicated by lower photosynthetic rates,transpiration rates,and stomatal conductance.These reductions were more pronounced under the combined stress.Salinity,drought,and especially their combination,decreased the activities of ascorbate peroxidase,catalase,and superoxide dismutase,while increasing the contents of malondialdehyde,hydrogen peroxide,and superoxide radical.Our results indicated a more significant yield loss in rice when subjected to combined salinity-drought stress.The individual and combined stresses of salinity and drought diminished antioxidant enzyme activities,inhibited leaf photosynthetic functions,accelerated leaf senescence,and subsequently lowered assimilate accumulation and grain yield. 展开更多
关键词 antioxidant defense system combined salinity-drought stress drought stress photosynthetic characteristics RICE salinity stress
下载PDF
Functional dissection of parabrachial substrates in processing nociceptive information 被引量:1
4
作者 Jin Ke Wei-Cheng Lu +11 位作者 Hai-Yang Jing Shen Qian Sun-Wook Moon Guang-Fu Cui Wei-Xin Qian Xiao-Jing Che Qian Zhang Shi-Shi Lai Ling Zhang Ying-Jie Zhu Jing-Dun Xie Tian-Wen Huang 《Zoological Research》 SCIE CSCD 2024年第3期633-647,共15页
Painful stimuli elicit first-line reflexive defensive reactions and,in many cases,also evoke second-line recuperative behaviors,the latter of which reflects the sensing of tissue damage and the alleviation of sufferin... Painful stimuli elicit first-line reflexive defensive reactions and,in many cases,also evoke second-line recuperative behaviors,the latter of which reflects the sensing of tissue damage and the alleviation of suffering.The lateral parabrachial nucleus(lPBN),composed of external-(elPBN),dorsal-(dlPBN),and central/superior-subnuclei(jointly referred to as slPBN),receives sensory inputs from spinal projection neurons and plays important roles in processing affective information from external threats and body integrity disruption.However,the organizational rules of lPBN neurons that provoke diverse behaviors in response to different painful stimuli from cutaneous and deep tissues remain unclear.In this study,we used region-specific neuronal depletion or silencing approaches combined with a battery of behavioral assays to show that slPBN neurons expressing substance P receptor(NK1R)(lPBNNK1R)are crucial for driving pain-associated self-care behaviors evoked by sustained noxious thermal and mechanical stimuli applied to skin or bone/muscle,while elPBN neurons are dispensable for driving such reactions.Notably,lPBNNK1R neurons are specifically required for forming sustained somatic pain-induced negative teaching signals and aversive memory but are not necessary for fear-learning or escape behaviors elicited by external threats.Lastly,both lPBNNK1R and elPBN neurons contribute to chemical irritant-induced nocifensive reactions.Our results reveal the functional organization of parabrachial substrates that drive distinct behavioral outcomes in response to sustained pain versus external danger under physiological conditions. 展开更多
关键词 Lateral parabrachial nucleus Substance P receptor Pain affect Defensive reaction SOMATOSENSORY
下载PDF
BnaWRKY75 positively regulates the resistance against Sclerotinia sclerotiorum in ornamental Brassica napus 被引量:1
5
作者 Kexin Yu Yijie Zhang +4 位作者 Xiaoyuan Fei Luyue Ma Rehman Sarwar Xiaoli Tan Zheng Wang 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第3期784-796,共13页
With the development of tourism at home and abroad,Rapeseed(Brassica napus)has become an important ornamental plant.However,its ornamental value at the inflorescence stage is greatly reduced by Sclerotinia sclerotioru... With the development of tourism at home and abroad,Rapeseed(Brassica napus)has become an important ornamental plant.However,its ornamental value at the inflorescence stage is greatly reduced by Sclerotinia sclerotiorum.Identification of important genes in the defense responses is critical for molecular breeding,which is an important strategy for controlling the disease.In this study,we isolated a B.napus WRKY transcription factor gene,BnaWRKY75.BnaWRKY75 was found to encode a nucleus-localized protein and exhibited relatively high expression in the stems.Arabidopsis thaliana transgenic plants expressing BnaWRKY75 showed enhanced resistance to S.sclerotiorum,and both ProBnaWRKY75:GUS and gene expression analyses showed that BnaWRKY75 was highly responsive to S.sclerotiorum infection,indicating the involvement of BnaWRKY75 in response to this infection.Furthermore,overexpression(OE)of BnaWRKY75 in B.napus significantly enhanced the resistance to S.sclerotiorum,whereas the resistance was reduced in RNAi transgenic B.napus plants.Moreover,the BnaWRKY75-OE B.napus plants exhibited constitutive activation of salicylic acid-,jasmonic acid-,and ethylene-mediated defense responses and the inhibition of both H_(2)O_(2)and O_(2)·^(-)accumulation in response to this pathogen.By contrast,BnaWRKY75-RNAi plants showed a reverse pattern,suggesting that BnaWRKY75 is involved in hormonal signaling pathways and in the control of reactive oxygen species accumulation.In conclusion,these data indicate that BnaWRKY75,a regulator of multiple defense responses,positively regulates resistance against S.sclerotiorum,which may guide the improvement of resistance in rapeseed. 展开更多
关键词 Brassica napus BnaWRKY75 Defense response Sclerotinia sclerotiorum
下载PDF
Trajectory tracking guidance of interceptor via prescribed performance integral sliding mode with neural network disturbance observer 被引量:1
6
作者 Wenxue Chen Yudong Hu +1 位作者 Changsheng Gao Ruoming An 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期412-429,共18页
This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance system... This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots. 展开更多
关键词 BP network neural Integral sliding mode control(ISMC) Missile defense Prescribed performance function(PPF) State observer Tracking guidance system
下载PDF
Defensible citadel:History and architectural character of the Lahore Railway Station 被引量:1
7
作者 Naubada Ali Zhou Qi 《Frontiers of Architectural Research》 CSCD 2020年第4期805-819,共15页
This study aims to investigate the defensible character of the Lahore railway station built in response to"the war of independenee in 1857,"which greatly impacted the location and design of the building.This... This study aims to investigate the defensible character of the Lahore railway station built in response to"the war of independenee in 1857,"which greatly impacted the location and design of the building.This study demonstrates the in tegral role played by the railway station in the development of the new colonial city,which the British wants to be defensive in every aspect.Railways were introduced in Pakistan(India)soon after their inauguration in Britain.Beginning from the mode of transportation,the multifaced contribution of railways toward the urban growth,new architectural style,mode of construction,and technology cannot be recanted.The research is based on the documentation and analysis of the history of Lahore railway station design.First,this study uses primary and secondary data to offer a history of the Lahore railway station from its inception to final execution.Second,it explores the criteria adopted by the British for its site selection to make the station a defensible post.The research finding in eludes the visual features that enhanced the architectural character of the building.Qualitative methods are used including several other approaches,namely,literature review,archival data collection,analysis of photographs,and study of architectural drawings and old maps,to achieve the objectives. 展开更多
关键词 HISTORY Lahore Railway station defensible character Architectural character
原文传递
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
8
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
How far have we come?Review of main public policies to reduce landslide impacts in Brazil
9
作者 Bianca Carvalho VIEIRA Tiago Damas MARTINS +1 位作者 Telma Mendes da SILVA JoséEduardo BONINI 《Journal of Mountain Science》 SCIE CSCD 2024年第9期2891-2904,共14页
During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live ... During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live in disaster-prone areas.The objective of this article is to present a chronological review of the principal policies and programmes at the national,state,and municipal levels,with an emphasis on their key actions aimed at mitigating the impact of disasters related to natural hazards,particularly landslides.Our analysis was based on official records of public policies from the national,state,and municipal governments.The results show that several initiatives were initially developed at the local and regional level.However,it was not until the late 1980s that a comprehensive organisation of civil protection at the national level emerged as a response measure.It is possible to highlight three phases(understanding,coexistence,and prevention)of institutional action focused on risk management in the face of disasters.Despite the growing knowledge of risk scenarios,disasters continue to occur in Brazil on an annual basis,revealing several obstacles to reducing their impact,particularly given the social and economic disparities between Brazilian regions and the applicability of public policies that must overcome the limitations of each municipality. 展开更多
关键词 DISASTERS Risk Mitigation Prevention LEGISLATION Civil Defense Natural Hazards
原文传递
A shield of defense:Developing ballistic composite panels with effective electromagnetic interference shielding absorption
10
作者 Nisrin Rizek Abdelal 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期123-136,共14页
The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through a... The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense. 展开更多
关键词 BALLISTIC FRP composite EMI shielding ABSORPTIVITY CT-SCAN NIJ test BULLET DEFENSE
下载PDF
The life-history trait trade-offs mediated by reproduction and immunity in the brown planthopper,Nilaparvata lugens Stål
11
作者 Dan Sun Hongfeng Wang +4 位作者 Jiahui Zeng Qiuchen Xu Mingyun Wang Xiaoping Yu Xuping Shentu 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第6期2018-2032,共15页
Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global supe... Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global superpest that mostly damages rice crops.Yeast-like symbionts(YLS)exist in the abdominal fat body tissue and are tightly associated with the development,growth,and reproduction of BPH.Our previous research demonstrated that mating behavior promotes the release of YLS from the fat body into the hemolymph in the BPH,thereby triggering an immune response.Additionally,the fitness costs related to life-history traits of BPH(such as survival rate)have a strong dependence on the relative abundance of YLS.However,the possible relationship between reproduction and the immune response in BPH has not been identified.In this study,an omics-based approach was used to analyze the transcriptome of fat body tissues in mated and unmated BPH at 72 h post-eclosion,from which two antimicrobial peptide genes,NlDefensin A(NlDfA)and NlDefensin B(NlDfB),were selected since they were highly expressed in mated BPH.Subsequently,the full-length cDNA sequences of the NlDfA and NlDfB genes were cloned and analyzed.qPCR results showed up-regulation of the NlDfA and NlDfB genes in mated BPH when compared to unmated BPH.Spatial-temporal expression analysis indicated that the NlDfA and NlDfB genes were expressed in all tissues and developmental stages,and they were most highly expressed in the fat body at 24 h post-eclosion.Moreover,the symbionts in BPH were significantly inhibited by the in vitro expression of the NlDfA and NlDfB proteins.Furthermore,RNA interference(RNAi)-mediated suppression of NlDfA and NlDfB dramatically increased the relative abundance of YLS in the fat body,while YLS in the hemolymph decreased significantly.These BPHs also displayed some fitness disadvantages in survival,fecundity,hatchability,and possibly the vertical transmission of YLS from hemolymph to egg.Our results indicated that mating could heighten the immunity of BPH by upregulating the expression of the NlDfA and NlDfB genes,which protect the host from pathogen challenges during reproduction.However,the reduced content of YLS may act as a fitness disadvantage in dictating the life-history traits of BPH.This work has significant theoretical and practical implications for the precise green control technology that involves crucial gene targeting,as well as for the“endosymbionts for pest control”strategy in insects. 展开更多
关键词 Nilaparvata lugens REPRODUCTION immune defense trade-off
下载PDF
Starlet:Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT
12
作者 Hui Xia Ning Huang +2 位作者 Xuecai Feng Rui Zhang Chao Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第3期586-596,共11页
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ... The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility. 展开更多
关键词 Internet of things Defense resource sharing Multi-armed bandits Defense resource allocation
下载PDF
A tensile wearable SHF antenna with efficient communication in defense beacon technology
13
作者 Pooja Naresh Bhatt Rashmi Pandhare 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期198-210,共13页
The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture wi... The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture with electrical dimensions of 0.12λ_(0)×0.22λ_(0)×0.01λ_(0)attains a vast bandwidth over 3.1-34.5 GHz Super High Frequency(SHF)frequency band at S_(11)≤-10 dB,peak gain of 7.14 dBi and proportionately homogeneous radiation pattern.The fractional bandwidth(%BW)acquired is 168%that envelopes diversified frequency spectrum inclusive of X band specifically targeted to all kinds of defense and military operations.The proposed antenna can be worn on a soldier's uniform and hence the Specific Absorption Rate simulation is accomplished.The Peak SAR Value over 1 g of tissue is 1.48 W/kg and for 10 g of tissue is 0.27 W/kg well under the safety standards.The flexibility is proven by analyzing the full electromagnetic simulations for various bending conditions.Time response analysis is attained with its Fidelity Factor and Group Delay.Communication excellence is determined using Link Budget Analysis and it is seen that margin at 100 Mbps is 62 m and at 200 Mbps is 59 m.Prototype is fabricated along with experimental validation.All the results show harmony in shaping the antenna to provide critical situational awareness and data sharing capabilities required in defense beacon technology for location identification. 展开更多
关键词 COMPACT Defense beacon technology Link budget SAR Time domain WEARABLE
下载PDF
ATSSC:An Attack Tolerant System in Serverless Computing
14
作者 Zhang Shuai Guo Yunfei +2 位作者 Hu Hongchao Liu Wenyan Wang Yawen 《China Communications》 SCIE CSCD 2024年第6期192-205,共14页
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ... Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are invoked by its driven events.Nonetheless,security threats in serverless computing such as vulnerability-based security threats have become the pain point hindering its wide adoption.The ideas in proactive defense such as redundancy,diversity and dynamic provide promising approaches to protect against cyberattacks.However,these security technologies are mostly applied to serverless platform based on“stacked”mode,as they are designed independent with serverless computing.The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost.In this paper,we present ATSSC,a proactive defense enabled attack tolerant serverless platform.ATSSC integrates the characteristic of redundancy,diversity and dynamic into serverless seamless to achieve high-level security and efficiency.Specifically,ATSSC constructs multiple diverse function replicas to process the driven events and performs cross-validation to verify the results.In order to create diverse function replicas,both software diversity and environment diversity are adopted.Furthermore,a dynamic function refresh strategy is proposed to keep the clean state of serverless functions.We implement ATSSC based on Kubernetes and Knative.Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs. 展开更多
关键词 active defense attack tolerant cloud computing SECURITY serverless computing
下载PDF
CORMAND2--针对工业机器人的欺骗攻击
15
作者 Hongyi Pu Liang He +2 位作者 Peng Cheng Jiming Chen Youxian Sun 《Engineering》 SCIE EI CAS CSCD 2024年第1期186-201,共16页
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vu... Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in three dimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot’s movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for. 展开更多
关键词 Industrial robots Vulnerability analysis Deception attacks DEFENSES
下载PDF
Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
16
作者 Yongsheng Zhu Chong Liu +8 位作者 Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1305-1325,共21页
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning o... The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness. 展开更多
关键词 PRIVACY-PRESERVING intelligent railway transportation system federated learning poisoning attacks DEFENSES
下载PDF
A chorismate mutase from Radopholus similis plays an essential role in pathogenicity
17
作者 Sihua Yang Junyi Li +4 位作者 Shuai Yang Shiqiao Tang Huizhong Wang Chunling Xu Hui Xie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第3期923-937,共15页
In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body wa... In the process of infecting plants, plant parasitic nematodes release a series of proteins that play an essential role in the successful infection and pathogenesis of plant cells and tissues through stylets or body walls. In this study,based on transcriptome data, a chorismate mutase gene of Radopholus similis(RsCM) was identified and cloned,which is a single copy gene specifically expressed in the oesophageal gland and highly expressed in juveniles and females. Transient expression of RsCM in tobacco leaves showed that it was localised in the cytoplasm and nucleus of tobacco leaf cells, which inhibited the pattern-triggered immunity(PTI) induced by flg22, including callose deposition and defence gene expression, and cell death induced by immune elicitors BAX, but could not inhibit cell death induced by immune elicitors Gpa2/RBP-1. The RNA interference(RNAi) transgenic tomato of RsCM obviously inhibited the infection, pathogenicity, and reproduction of R. similis. However, the resistance of the overexpression transgenic tomato of RsCM to R. similis infection was significantly reduced, and the expression levels of two salicylic acid(SA) pathway genes(PR1 and PR5) in roots infected by the nematode were significantly down-regulated,which indicated that RsCM might be involved in the inhibition of SA pathway. The results of this study demonstrate that RsCM suppresses the host immune system and might be a new target for the control of R. similis, which also provides new data for the function and mechanism of CM genes of migratory parasitic plant nematodes. 展开更多
关键词 Radopholus similis chorismate mutase plant defense transgenic tomato
下载PDF
Two intestinal microbiota-derived metabolites, deoxycholic acid and butyrate, synergize to enhance host defense peptide synthesis and alleviate necrotic enteritis
18
作者 Dohyung M.Kim Jing Liu +3 位作者 Melanie A.Whitmore Isabel Tobin Zijun Zhao Guolong Zhang 《Journal of Animal Science and Biotechnology》 SCIE CAS CSCD 2024年第3期1158-1172,共15页
Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,... Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,have independently been shown to induce host defense peptide(HDP)synthesis.However,the potential synergy between these two compounds remains unexplored.Methods To investigate the possible synergistic effect between DCA and butyrate in regulating HDP synthesis and barrier function,we treated chicken HD11 macrophage cells and jejunal explants with DCA and sodium butyrate(NaB),either individually or in combination,for 24 h.Subsequently,we performed RNA isolation and reverse transcrip-tion-quantitative PCR to analyze HDP genes as well as the major genes associated with barrier function.To further determine the synergy between DCA and NaB in enhancing NE resistance,we conducted two independent trials with Cobb broiler chicks.In each trial,the diet was supplemented with DCA or NaB on the day-of-hatch,followed by NE induction through sequential challenges with Eimeria maxima and Clostridium perfringens on d 10 and 14,respectively.We recorded animal mortality after infection and assessed intestinal lesions on d 17.The impact of DCA and NaB on the microbiota in the ileum and cecum was evaluated through bacterial 16S rRNA gene sequencing.Results We found that the combination of DCA and NaB synergistically induced multiple HDP genes in both chicken HD11 cells and jejunal explants.Additionally,the gene for claudin-1,a major tight junction protein,also exhibited synergistic induction in response to DCA and NaB.Furthermore,dietary supplementation with a combination of 0.75 g/kg DCA and 1 g/kg NaB led to a significant improvement in animal survival and a reduction in intestinal lesions compared to either compound alone in a chicken model of NE.Notably,the cecal microbiota of NE-infected chickens showed a marked decrease in SCFA-producing bacteria such as Bacteroides,Faecalibacterium,and Cuneatibacter,with lactobacilli becoming the most dominant species.However,supplementation with DCA and NaB largely restored the intestinal microbiota to healthy levels.Conclusions DCA synergizes with NaB to induce HDP and claudin-1 expression and enhance NE resistance,with potential for further development as cost-effective antibiotic alternatives. 展开更多
关键词 Bile acids Host defense peptides METABOLITES MICROBIOME Necrotic enteritis Short-chain fatty acids
下载PDF
A Function-Aware Mimic Defense Theory and Its Practice
19
作者 He Jiajun Yuan Yali +3 位作者 Liang Sichu Fu Jiale Zhu Hongyu Cheng Guang 《China Communications》 SCIE CSCD 2024年第8期192-210,共19页
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach... In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense. 展开更多
关键词 Bayesian theory CONFIDENCE functional implementation mimic defense
下载PDF
Comparative transcriptome analysis reveals key genes and pathways in response to Alternaria alternata apple pathotype infection
20
作者 Kai Liu Zhaolin Liang +4 位作者 An Yang Jiadi Yan Peihua Cong Xiaolei Han Caixia Zhang 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第3期641-656,共16页
Apple leaf spot,caused by the Alternaria alternata apple pathotype(AAAP),is an important fungal disease of apple.To understand the molecular basis of resistance and pathogenesis in apple leaf spot,the transcriptomes o... Apple leaf spot,caused by the Alternaria alternata apple pathotype(AAAP),is an important fungal disease of apple.To understand the molecular basis of resistance and pathogenesis in apple leaf spot,the transcriptomes of two apple cultivars‘Hanfu'(HF)(resistant)and‘Golden Delicious'(GD)(susceptible)were analyzed at 0,6,18,24 and 48 h after AAAP inoculation by RNA-Seq.At each time point,a large number of significantly differentially expressed genes(DEGs)were screened between AAAP-inoculated and uninoculated apple leaves.Analysis of the common DEGs at four time points revealed significant differences in the resistance of‘HF'and‘GD'apple to AAAP infection.RLP,RNL,and JA signal-related genes were upregulated in both cultivars to restrict AAAP development.However,genes encoding CNLs,TNLs,WRKYs,and AP2s were only activated in‘HF'as part of the resistance response,of which,some play major roles in the regulation of ET and SA signal transduction.Further analysis showed that many DEGs with opposite expression trends in the two hosts may play important regulatory roles in response to AAAP infection.Transient expression of one such gene MdERF110 in‘GD'apple leaves improved AAAP resistance.Collectively,this study highlights the reasons for differential resistance to AAAP infection between‘HF'and‘GD'apples which can theoretically assist the molecular breeding of disease-resistant apple crops. 展开更多
关键词 APPLE TRANSCRIPTOME Alternaria alternata apple pathotype Infection Defense response
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部