190 research outputs found
Adaversarial Issue of Machine Learning Approaches Applied in Smart Grid: A Survey
The machine learning (ML) sees an increasing prevalence of being used in the
internet-of-things enabled smart grid. However, the trustworthiness of ML is a
severe issue that must be addressed to accommodate the trend of ML-based smart
grid applications (MLsgAPPs). The adversarial distortion injected into the
power signal will greatly affect the system's normal control and operation.
Therefore, it is imperative to conduct vulnerability assessment for MLsgAPPs
applied in the context of safety-critical power systems. In this paper, we
provide a comprehensive review of the recent progress in designing attack and
defense methods for MLsgAPPs. Unlike the traditional survey about ML security,
this is the first review work about the security of MLsgAPPs that focuses on
the characteristics of power systems. The survey is organized from the aspects
of adversarial assumptions, targeted applications, evaluation metrics,
defending approaches, physics-related constraints, and applied datasets. We
also highlight future directions on this topic to encourage more researchers to
conduct further research on adversarial attacks and defending approaches for
MLsgAPPs
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse
Metaverse is a vast virtual environment parallel to the physical world in
which users enjoy a variety of services acting as an avatar. To build a secure
living habitat, it's vital to ensure the virtual-physical traceability that
tracking a malicious player in the physical world via his avatars in virtual
space. In this paper, we propose a two-factor authentication framework based on
chameleon signature and biometric-based authentication. First, aiming at
disguise in virtual space, we propose a chameleon collision signature algorithm
to achieve the verifiability of the avatar's virtual identity. Second, facing
at impersonation in physical world, we construct an avatar's identity model
based on the player's biometric template and the chameleon key to realize the
verifiability of the avatar's physical identity. Finally, we design two
decentralized authentication protocols based on the avatar's identity model to
ensure the consistency of the avatar's virtual and physical identities.
Security analysis indicates that the proposed authentication framework
guarantees the consistency and traceability of avatar's identity. Simulation
experiments show that the framework not only completes the decentralized
authentication between avatars but also achieves the virtual-physical tracking.Comment: 12 pages, 9 figure
Efficacy and safety of weekly versus triweekly cisplatin treatment concomitant with radiotherapy for locally advanced nasopharyngeal carcinoma: A systematic review and pooled analysis
Background: Most nasopharyngeal carcinoma cases are diagnosed at an advanced stage due to their hidden anatomical structure and atypical clinical symptoms and often require chemoradiotherapy. Here, we present a systematic review and pooled analysis to synthesize existing research on the efficacy and adverse effects of weekly versus triweekly cisplatin chemotherapy concomitant with radiotherapy for locally advanced nasopharyngeal carcinoma (LANPC).Methods: We searched the PubMed, Embase, and Cochrane Library databases from inception to 1 September 2021, for relevant original research articles published in English. The literature search and data extraction were done independently by two investigators. We used random-effects models to provide point estimates [95% confidence interval (CI)] of overall response rate (ORR), overall survival (OS), progression-free survival (PFS), locoregional recurrence-free survival (LRFS), distant metastasis-free survival (DMFS) and the incidence rate of adverse effects (AEs) and with subgroup analysis according to each study type. The primary endpoints were ORR, OS, and PFS; LRFS, DMFS, and grade ≥3 acute AEs were secondary endpoints.Results: In total, 2,305 patients of eight studies were included in this review. We found that patients who were administered cisplatin weekly or triweekly had no differences in ORR, OS, PFS, DMFS, LRFS, severe mucositis, dermatitis, nausea/vomiting or nephrotoxicity. Patients who were administered weekly cisplatin were at a higher risk of hematological toxicity compared with patients who received the chemotherapy triweekly.Conclusion: Our findings suggest that both regimens could be recommended as the standard of care for the chemoradiotherapy treatment of LANPC, the perceived benefit of lower toxicity with weekly cisplatin could not be established
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
The rapid development of information and communications technology has
enabled the use of digital-controlled and software-driven distributed energy
resources (DERs) to improve the flexibility and efficiency of power supply, and
support grid operations. However, this evolution also exposes
geographically-dispersed DERs to cyber threats, including hardware and software
vulnerabilities, communication issues, and personnel errors, etc. Therefore,
enhancing the cyber-resiliency of DER-based smart grid - the ability to survive
successful cyber intrusions - is becoming increasingly vital and has garnered
significant attention from both industry and academia. In this survey, we aim
to provide a systematical and comprehensive review regarding the
cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an
integrated threat modeling method is tailored for the hierarchical DER-based
smart grid with special emphasis on vulnerability identification and impact
analysis. Then, the defense-in-depth strategies encompassing prevention,
detection, mitigation, and recovery are comprehensively surveyed,
systematically classified, and rigorously compared. A CRE framework is
subsequently proposed to incorporate the five key resiliency enablers. Finally,
challenges and future directions are discussed in details. The overall aim of
this survey is to demonstrate the development trend of CRE methods and motivate
further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication
Consideratio
Recommended from our members
Sub-surface characterization and three dimensional profiling of semiconductors by magnetic resonance force microscopy
This is the final report of a two-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The project successfully developed a magnetic resonance force microscope (MRFM) instrument to mechanically detect magnetic resonance signals. This technique provides an intrinsically subsurface, chemical-species-specific probe of structure, constituent density and other properties of materials. As in conventional magnetic resonance imaging (MRI), an applied magnetic field gradient selects a well defined volume of the sample for study. However mechanical detection allows much greater sensitivity, and this in turn allows the reduction of the size of the minimum resolvable volume. This requires building an instrument designed to achieve nanometer-scale resolution at buried semiconductor interfaces. High-resolution, three-dimensional depth profiling of semiconductors is critical in the development and fabrication of semiconductor devices. Currently, there is no capability for direct, high-resolution observation and characterization of dopant density, and other critical features of semiconductors. The successful development of MRFM in conjunction with modifications to improve resolution will enable for the first time detailed structural and electronic studies in doped semiconductors and multilayered nanoelectronic devices, greatly accelerating the current pace of research and development
Transcriptome profiling reveals the underlying mechanism of grape post-harvest pathogen Penicillium olsonii against the metabolites of Bacillus velezensis
IntroductionPathogen infection influences the post-harvest shelf life of grape berries. In a preliminary study, metabolites produced by Bacillus velezensis significantly inhibited the growth of the grape postharvest pathogen Penicillium olsonii.MethodsTo investigate the mechanism of interaction between B. velezensis and P. olsonii, a draft genome was generated for P. olsonii WHG5 using the Illumina NovaSeq platform, and the transcriptomic changes in WHG5 were analyzed in response to the exposure to B. velezensis metabolites (10% v/v).ResultsThe expression levels of genes associated with sporulation, including GCY1, brlA, and abaA, were down-regulated compared with those of the control. In addition, spore deformation and abnormal swelling of the conidiophore were observed. The expression of crucial enzymes, including fructose 2,6-bisphosphate and mannitol-2-dehydrogenase, was down-regulated, indicating that the glycolytic pathway of WHG5 was adversely affected by B. velezensis metabolites. The KEGG pathway enrichment analysis revealed that glutathione metabolism and the antioxidant enzyme system were involved in the response to B. velezensis metabolites. The down-regulation of the pathogenesis-related genes, PG1 and POT1, suggested that B. velezensis metabolites decreased the pathogenicity of P. olsonii. B. velezensis metabolites disrupted the homeostasis of reactive oxygen species in P. olsonii by affecting glucose metabolism, resulting in spore deformation and disruption of growth. In addition, the expression of key pathogenesis-related genes was down-regulated, thereby reducing the pathogenicity of P. olsonii.DisscusionThis study provides insights into the responses of P. olsonii to B. velezensis metabolites and identifies potential target genes that may be useful in biocontrol strategies for the suppression of post-harvest spoilage in grapes
Plant growth, salt removal capacity, and forage nutritive value of the annual euhalophyte Suaeda salsa irrigated with saline water
Sustainable agricultural development in semiarid and arid regions is severely restricted by soil and water salinization. Cultivation of the representative halophyte Suaeda salsa, which can be irrigated with saline water and cultivated on saline soils, is considered to be a potential solution to the issues of freshwater scarcity, soil salinization, and fodder shortage. However, the salt removal capacity and differences in the forage nutritive value of S. salsa under different saline water treatments remain unknown. Using the methods of field trials and randomized blocks design, we quantified salt accumulation in the aboveground biomass, and the biochemical and nutritive value of field-cultivated S. salsa in arid northwestern China under irrigation with water of different salinities [i.e., freshwater or water containing10, 20, 30, or 40 g/L NaCl). The fresh and dry weights of S. salsa increased, then decreased, with increase in salinity. The salt content of the plant’s aboveground biomass increased to a constant range and, thus, the salt extraction of S. salsa was relatively stable under different salinities of irrigation water. Under the experimental conditions, the crude protein content significantly increased to 9.45% dry weight (DW) and then decreased to 6.85% DW, with an increase in salinity (p < 0.05). The neutral detergent fiber (42.93%–50.00% DW) and acid detergent fiber (34.76%–39.70% DW) contents were suitable for forage. The contents of trace elements, such as copper and zinc, were significantly increased after irrigation with saline water (p < 0.05). The forage of S. salsa is of high nutritive value for livestock, and contains low concentrations of anti-nutrients. Therefore, S. salsa can be considered for cultivation in saline soils irrigated with saline water. In addition, it provides a viable additional source of fodder in arid regions, where the availability of freshwater and non-saline arable land is limited
The triggering process of an X-class solar flare on a small quadrupolar active region
The occurrence of X-class solar flares and their potential impact on the
space weather often receive great attention than other flares. But predicting
when and where an X-class flare will occur is still a challenge. With the
multi-wavelength observation from the Solar Dynamics Observatory and FengYun-
3E satellite, we investigate the triggering of a GOES X1.0 flare occurring in
the NOAA active region (AR) 12887. Our results show that this unique X-class
flare is bred in a relatively small but complex quadrupolar AR. Before the
X-class flare, two filaments (F1 and F2) exist below a null-point topology of
the quadrupolar AR. Magnetic field extrapolation and observation reveal that F1
and F2 correspond to two magnetic flux ropes with the same chirality and their
adjacent feet rooted at nonconjugated opposite polarities, respectively.
Interestingly, these two polarities collide rapidly, accompanied by
photospheric magnetic flux emergence, cancellation and shear motion in the AR
center. Above this site, F1 and F2 subsequently intersect and merge to a longer
filament (F3) via a tether-cutting-like reconnection process. As a result, the
F3 rises and erupts, involving the large-scale arcades overlying filament and
the quadrupolar magnetic field above the AR, and eventually leads to the
eruption of the X-class flare with a quasi-X-shaped flare ribbon and a coronal
mass ejection. It suggests that the rapid collision of nonconjugated opposite
polarities provides a key condition for the triggering of this X-class flare,
and also provides a featured case for flare trigger mechanism and space weather
forecasting.Comment: 24 pages, 7 figures, accepted for publication in Ap
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
Recent studies have considered thwarting false data injection (FDI) attacks
against state estimation in power grids by proactively perturbing branch
susceptances. This approach is known as moving target defense (MTD). However,
despite of the deployment of MTD, it is still possible for the attacker to
launch stealthy FDI attacks generated with former branch susceptances. In this
paper, we prove that, an MTD has the capability to thwart all FDI attacks
constructed with former branch susceptances only if (i) the number of branches
in the power system is not less than twice that of the system states
(i.e., , where is the number of buses); (ii) the
susceptances of more than branches, which cover all buses, are perturbed.
Moreover, we prove that the state variable of a bus that is only connected by a
single branch (no matter it is perturbed or not) can always be modified by the
attacker. Nevertheless, in order to reduce the attack opportunities of
potential attackers, we first exploit the impact of the susceptance
perturbation magnitude on the dimension of the \emph{stealthy attack space}, in
which the attack vector is constructed with former branch susceptances. Then,
we propose that, by perturbing an appropriate set of branches, we can minimize
the dimension of the \emph{stealthy attack space} and maximize the number of
covered buses. Besides, we consider the increasing operation cost caused by the
activation of MTD. Finally, we conduct extensive simulations to illustrate our
findings with IEEE standard test power systems
High Altitude test of RPCs for the ARGO-YBJ experiment
A 50 m**2 RPC carpet was operated at the YangBaJing Cosmic Ray Laboratory
(Tibet) located 4300 m a.s.l. The performance of RPCs in detecting Extensive
Air Showers was studied. Efficiency and time resolution measurements at the
pressure and temperature conditions typical of high mountain laboratories, are
reported.Comment: 16 pages, 10 figures, submitted to Nucl. Instr. Met
- …