We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve...We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve is shown to separate into smooth, elastic branches followed by a subsequent plastic event. Mode analysis shows that the lowest-frequency vibrational mode is more localized, and eigenvalues and participation ratios of low- frequency modes exhibit similar power-law behavior as the system approaches plastic instability, indicating that the nature of plastic events in the granular system is also a saddle node bifurcation. The analysis of projection and spatial structure shows that over 75% contributions to the non-affine displacement field at a plastic instability come from the lowest-frequency mode, and the lowest-frequency mode is strongly spatially correlated with local plastic rearrangements, inferring that the lowest-frequency mode could be used as a predictor for future plastic rearrangements in the disordered system jammed marginally.展开更多
By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired ...By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.展开更多
Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not e...Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not exhaustively treated.Our observations in the Hajj crowd show that freezing transition does not occur very often. On the contrary, penetrating a jammed crowd is a common aspect. We believe the kindness of pedestrians facing others whose walking is blocked is a main factor in eliminating the frozen state as well as in relieving the jammed state. We refine the social force model by incorporating a new social force to enable the simulated pedestrians to mimic the real behavior observed in the Hajj area.Simulations are performed to validate the work qualitatively.展开更多
This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at ...This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.展开更多
In electromagnetic countermeasures circumstances,synthetic aperture radar(SAR)imagery usually suffers from severe quality degradation from modulated interrupt sampling repeater jamming(MISRJ),which usually owes consid...In electromagnetic countermeasures circumstances,synthetic aperture radar(SAR)imagery usually suffers from severe quality degradation from modulated interrupt sampling repeater jamming(MISRJ),which usually owes considerable coherence with the SAR transmission waveform together with periodical modulation patterns.This paper develops an MISRJ suppression algorithm for SAR imagery with online dictionary learning.In the algorithm,the jamming modulation temporal properties are exploited with extracting and sorting MISRJ slices using fast-time autocorrelation.Online dictionary learning is followed to separate real signals from jamming slices.Under the learned representation,time-varying MISRJs are suppressed effectively.Both simulated and real-measured SAR data are also used to confirm advantages in suppressing time-varying MISRJs over traditional methods.展开更多
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s...In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training samples used to calculate the weight vector does not contain the jamming,then the jamming cannot be removed by adaptive spatial filtering.If the weight vector is constantly updated in the range dimension,the training data may contain target echo signals,resulting in signal cancellation effect.To cope with the situation that the training samples are contaminated by target signal,an iterative training sample selection method based on non-homogeneous detector(NHD)is proposed in this paper for updating the weight vector in entire range dimension.The principle is presented,and the validity is proven by simulation results.展开更多
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi...Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions.展开更多
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target...Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension.展开更多
This paper realizes the full-domain collaborative deployment of multiple interference sources of the global satellite navigation system(GNSS)and evaluates the deployment effect to enhance the ability to disturb the at...This paper realizes the full-domain collaborative deployment of multiple interference sources of the global satellite navigation system(GNSS)and evaluates the deployment effect to enhance the ability to disturb the attacker and the capability to defend the GNSS during navigation countermeasures.Key evaluation indicators for the jamming effect of GNSS suppressive and deceptive jamming sources are first created,their evaluation models are built,and their detection procedures are sorted out,as the basis for determining the deployment principles.The principles for collaboratively deploying multi-jamming sources are developed to obtain the deployment structures(including the required number,structures in demand,and corresponding positions)of three single interference sources required by collaboratively deploying.Accordingly,simulation and hardware-in-loop testing results are presented to determine a rational configuration of the collaborative deployment of multi-jamming sources in the set situation and further realize the full-domain deployment of an interference network from ground,air to space.Varied evaluation indices for the deployment effect are finally developed to evaluate the deployment effect of the proposed configuration and further verify its reliability and rationality.展开更多
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t...Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources.展开更多
This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection...This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection transmission schemes,named random sub-channel selection(RSS)scheme and maximum sub-channel selection(MSS)scheme,to enhance communication covertness.For each proposed scheme,we first derive closed-form expressions of the transmission outage probability(TOP),the average effective rate,and the minimum average detection error probability(DEP).Then,the average effective covert rate(ECR)is maximized by jointly optimizing the transmit power at the transmitter and the number of sub-channels.Numerical results show that there is an optimal value of the number of sub-channels that maximizes the average ECR.We also find that to achieve the maximum average ECR,a larger number of subchannels are needed facing a stricter covertness constraint.展开更多
Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitud...Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed.展开更多
In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise p...In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results.展开更多
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta...Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.展开更多
Internet of Things (IoT) networks present unique cybersecurity challenges due to their distributed and heterogeneous nature. Our study explores the effectiveness of two types of deep learning models, long-term memory ...Internet of Things (IoT) networks present unique cybersecurity challenges due to their distributed and heterogeneous nature. Our study explores the effectiveness of two types of deep learning models, long-term memory neural networks (LSTMs) and deep neural networks (DNNs), for detecting attacks in IoT networks. We evaluated the performance of six hybrid models combining LSTM or DNN feature extractors with classifiers such as Random Forest, k-Nearest Neighbors and XGBoost. The LSTM-RF and LSTM-XGBoost models showed lower accuracy variability in the face of different types of attack, indicating greater robustness. The LSTM-RF and LSTM-XGBoost models show variability in results, with accuracies between 58% and 99% for attack types, while LSTM-KNN has higher but more variable accuracies, between 72% and 99%. The DNN-RF and DNN-XGBoost models show lower variability in their results, with accuracies between 59% and 99%, while DNN-KNN has higher but more variable accuracies, between 71% and 99%. LSTM-based models are proving to be more effective for detecting attacks in IoT networks, particularly for sophisticated attacks. However, the final choice of model depends on the constraints of the application, taking into account a trade-off between accuracy and complexity.展开更多
This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and...This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and biscuits, by inserting change or credit card into the machine. This technological feat is due to the advent of sensors. A sensor is a part of the measurement chain, it receives the quantity to be measured and provides information directly linked to this quantity. However, these vending robots are faced with malfunctions linked to sensor jams. The identification of the jam phenomenon was possible thanks to the inspection and monitoring of the various sensors installed on the vending robot. And Cadence software was used to model, control and locate the jammed sensor(s). The various tests were carried out by setting the robot in motion to better understand the causes of the phenomenon. The jam is therefore the phenomenon which triggers the sensors permanently, which causes the automatic vending robot to stop functioning. And this jam was due to the presence of water droplets on the sensor or dirt. This presence of water droplets on the sensor is linked to an increase in temperature. Controlling the temperature and locating the jammed sensor has made it possible to considerably reduce jamming and its harmful effects on the vending machine robot.展开更多
Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The var...Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The variations of the water level under the ice jammed condition with bridge piers are compared to those without bridge piers in an 180° bend channel. Results indicate that the bridge piers in the S-shaped channel have obvious impacts on the ice accumulation and the water level. The increment of the water level with the presence of the bridge piers is less than that without the bridge piers in the channel. Different arrangements of the bridge piers result in different increments of the water level. When one bridge pier is installed in the straight section of the channel(between 2 bends) and another one at the bend apex(for a convex bank), the increment of the water level during the equilibrium ice jammed period is between that with a single bridge pier located in the straight section of the bend channel and that with a single bridge pier located at the bend apex. It is also shown that the increment of the water level during the equilibrium ice jammed period increases with the increase of the average thickness of the ice jams.展开更多
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming c...To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 11272048 and 51239006the European Commission Marie Curie Actions under Grant No IRSES-294976
文摘We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve is shown to separate into smooth, elastic branches followed by a subsequent plastic event. Mode analysis shows that the lowest-frequency vibrational mode is more localized, and eigenvalues and participation ratios of low- frequency modes exhibit similar power-law behavior as the system approaches plastic instability, indicating that the nature of plastic events in the granular system is also a saddle node bifurcation. The analysis of projection and spatial structure shows that over 75% contributions to the non-affine displacement field at a plastic instability come from the lowest-frequency mode, and the lowest-frequency mode is strongly spatially correlated with local plastic rearrangements, inferring that the lowest-frequency mode could be used as a predictor for future plastic rearrangements in the disordered system jammed marginally.
基金supported by the National Natural Science Foundation of China(Grant No.21325418)the National Basic Research Program of China(GrantNo.2012CB821500)+1 种基金the Chinese Academy of Sciences 100-Talent Program(Grant No.2030020004)the Fundamental Research Funds for the Central Universities,China(Grant No.2340000034)
文摘By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.
文摘Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not exhaustively treated.Our observations in the Hajj crowd show that freezing transition does not occur very often. On the contrary, penetrating a jammed crowd is a common aspect. We believe the kindness of pedestrians facing others whose walking is blocked is a main factor in eliminating the frozen state as well as in relieving the jammed state. We refine the social force model by incorporating a new social force to enable the simulated pedestrians to mimic the real behavior observed in the Hajj area.Simulations are performed to validate the work qualitatively.
基金supported by the National Natural Science Foundation of China (Grant No. 11034010)
文摘This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.
基金supported by the National Natural Science Foundation of China(61771372,61771367,62101494)the National Outstanding Youth Science Fund Project(61525105)+1 种基金Shenzhen Science and Technology Program(KQTD20190929172704911)the Aeronautic al Science Foundation of China(2019200M1001)。
文摘In electromagnetic countermeasures circumstances,synthetic aperture radar(SAR)imagery usually suffers from severe quality degradation from modulated interrupt sampling repeater jamming(MISRJ),which usually owes considerable coherence with the SAR transmission waveform together with periodical modulation patterns.This paper develops an MISRJ suppression algorithm for SAR imagery with online dictionary learning.In the algorithm,the jamming modulation temporal properties are exploited with extracting and sorting MISRJ slices using fast-time autocorrelation.Online dictionary learning is followed to separate real signals from jamming slices.Under the learned representation,time-varying MISRJs are suppressed effectively.Both simulated and real-measured SAR data are also used to confirm advantages in suppressing time-varying MISRJs over traditional methods.
基金supported by the National Natural Science Foundation of China(62371049)。
文摘In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training samples used to calculate the weight vector does not contain the jamming,then the jamming cannot be removed by adaptive spatial filtering.If the weight vector is constantly updated in the range dimension,the training data may contain target echo signals,resulting in signal cancellation effect.To cope with the situation that the training samples are contaminated by target signal,an iterative training sample selection method based on non-homogeneous detector(NHD)is proposed in this paper for updating the weight vector in entire range dimension.The principle is presented,and the validity is proven by simulation results.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 12247104 and 12047503)。
文摘Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions.
基金supported by the National Natural Science Foundation of China(6207148262001510)the Civil Aviation Administration o f China(U1733116)。
文摘Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension.
基金the National Natural Science Foundation of China(Grant No.42174047 and No.42174036)the National Science Foundation Project for Outstanding Youth(No.42104034).
文摘This paper realizes the full-domain collaborative deployment of multiple interference sources of the global satellite navigation system(GNSS)and evaluates the deployment effect to enhance the ability to disturb the attacker and the capability to defend the GNSS during navigation countermeasures.Key evaluation indicators for the jamming effect of GNSS suppressive and deceptive jamming sources are first created,their evaluation models are built,and their detection procedures are sorted out,as the basis for determining the deployment principles.The principles for collaboratively deploying multi-jamming sources are developed to obtain the deployment structures(including the required number,structures in demand,and corresponding positions)of three single interference sources required by collaboratively deploying.Accordingly,simulation and hardware-in-loop testing results are presented to determine a rational configuration of the collaborative deployment of multi-jamming sources in the set situation and further realize the full-domain deployment of an interference network from ground,air to space.Varied evaluation indices for the deployment effect are finally developed to evaluate the deployment effect of the proposed configuration and further verify its reliability and rationality.
基金the National Natural Science Foundation of China(Grant No.62101579).
文摘Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources.
文摘This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection transmission schemes,named random sub-channel selection(RSS)scheme and maximum sub-channel selection(MSS)scheme,to enhance communication covertness.For each proposed scheme,we first derive closed-form expressions of the transmission outage probability(TOP),the average effective rate,and the minimum average detection error probability(DEP).Then,the average effective covert rate(ECR)is maximized by jointly optimizing the transmit power at the transmitter and the number of sub-channels.Numerical results show that there is an optimal value of the number of sub-channels that maximizes the average ECR.We also find that to achieve the maximum average ECR,a larger number of subchannels are needed facing a stricter covertness constraint.
基金supported by the Equipment Pre-research Project(GK202002A020068)。
文摘Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed.
基金supported by Shandong Provincial Natural Science Foundation(ZR2020MF015)Aerospace Technology Group Stability Support Project(ZY0110020009).
文摘In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results.
文摘Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
文摘Internet of Things (IoT) networks present unique cybersecurity challenges due to their distributed and heterogeneous nature. Our study explores the effectiveness of two types of deep learning models, long-term memory neural networks (LSTMs) and deep neural networks (DNNs), for detecting attacks in IoT networks. We evaluated the performance of six hybrid models combining LSTM or DNN feature extractors with classifiers such as Random Forest, k-Nearest Neighbors and XGBoost. The LSTM-RF and LSTM-XGBoost models showed lower accuracy variability in the face of different types of attack, indicating greater robustness. The LSTM-RF and LSTM-XGBoost models show variability in results, with accuracies between 58% and 99% for attack types, while LSTM-KNN has higher but more variable accuracies, between 72% and 99%. The DNN-RF and DNN-XGBoost models show lower variability in their results, with accuracies between 59% and 99%, while DNN-KNN has higher but more variable accuracies, between 71% and 99%. LSTM-based models are proving to be more effective for detecting attacks in IoT networks, particularly for sophisticated attacks. However, the final choice of model depends on the constraints of the application, taking into account a trade-off between accuracy and complexity.
文摘This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and biscuits, by inserting change or credit card into the machine. This technological feat is due to the advent of sensors. A sensor is a part of the measurement chain, it receives the quantity to be measured and provides information directly linked to this quantity. However, these vending robots are faced with malfunctions linked to sensor jams. The identification of the jam phenomenon was possible thanks to the inspection and monitoring of the various sensors installed on the vending robot. And Cadence software was used to model, control and locate the jammed sensor(s). The various tests were carried out by setting the robot in motion to better understand the causes of the phenomenon. The jam is therefore the phenomenon which triggers the sensors permanently, which causes the automatic vending robot to stop functioning. And this jam was due to the presence of water droplets on the sensor or dirt. This presence of water droplets on the sensor is linked to an increase in temperature. Controlling the temperature and locating the jammed sensor has made it possible to considerably reduce jamming and its harmful effects on the vending machine robot.
基金Project supported by the National Natural Science Foundation of China(Grant No.51379054)
文摘Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The variations of the water level under the ice jammed condition with bridge piers are compared to those without bridge piers in an 180° bend channel. Results indicate that the bridge piers in the S-shaped channel have obvious impacts on the ice accumulation and the water level. The increment of the water level with the presence of the bridge piers is less than that without the bridge piers in the channel. Different arrangements of the bridge piers result in different increments of the water level. When one bridge pier is installed in the straight section of the channel(between 2 bends) and another one at the bend apex(for a convex bank), the increment of the water level during the equilibrium ice jammed period is between that with a single bridge pier located in the straight section of the bend channel and that with a single bridge pier located at the bend apex. It is also shown that the increment of the water level during the equilibrium ice jammed period increases with the increase of the average thickness of the ice jams.
基金supported by the National Natural Science Foundation of China(U19B2016)Zhejiang Provincial Key Lab of Data Storage and Transmission Technology,Hangzhou Dianzi University。
文摘To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming.