190 research outputs found

    Adaversarial Issue of Machine Learning Approaches Applied in Smart Grid: A Survey

    Full text link
    The machine learning (ML) sees an increasing prevalence of being used in the internet-of-things enabled smart grid. However, the trustworthiness of ML is a severe issue that must be addressed to accommodate the trend of ML-based smart grid applications (MLsgAPPs). The adversarial distortion injected into the power signal will greatly affect the system's normal control and operation. Therefore, it is imperative to conduct vulnerability assessment for MLsgAPPs applied in the context of safety-critical power systems. In this paper, we provide a comprehensive review of the recent progress in designing attack and defense methods for MLsgAPPs. Unlike the traditional survey about ML security, this is the first review work about the security of MLsgAPPs that focuses on the characteristics of power systems. The survey is organized from the aspects of adversarial assumptions, targeted applications, evaluation metrics, defending approaches, physics-related constraints, and applied datasets. We also highlight future directions on this topic to encourage more researchers to conduct further research on adversarial attacks and defending approaches for MLsgAPPs

    A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse

    Full text link
    Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the virtual-physical traceability that tracking a malicious player in the physical world via his avatars in virtual space. In this paper, we propose a two-factor authentication framework based on chameleon signature and biometric-based authentication. First, aiming at disguise in virtual space, we propose a chameleon collision signature algorithm to achieve the verifiability of the avatar's virtual identity. Second, facing at impersonation in physical world, we construct an avatar's identity model based on the player's biometric template and the chameleon key to realize the verifiability of the avatar's physical identity. Finally, we design two decentralized authentication protocols based on the avatar's identity model to ensure the consistency of the avatar's virtual and physical identities. Security analysis indicates that the proposed authentication framework guarantees the consistency and traceability of avatar's identity. Simulation experiments show that the framework not only completes the decentralized authentication between avatars but also achieves the virtual-physical tracking.Comment: 12 pages, 9 figure

    Efficacy and safety of weekly versus triweekly cisplatin treatment concomitant with radiotherapy for locally advanced nasopharyngeal carcinoma: A systematic review and pooled analysis

    Get PDF
    Background: Most nasopharyngeal carcinoma cases are diagnosed at an advanced stage due to their hidden anatomical structure and atypical clinical symptoms and often require chemoradiotherapy. Here, we present a systematic review and pooled analysis to synthesize existing research on the efficacy and adverse effects of weekly versus triweekly cisplatin chemotherapy concomitant with radiotherapy for locally advanced nasopharyngeal carcinoma (LANPC).Methods: We searched the PubMed, Embase, and Cochrane Library databases from inception to 1 September 2021, for relevant original research articles published in English. The literature search and data extraction were done independently by two investigators. We used random-effects models to provide point estimates [95% confidence interval (CI)] of overall response rate (ORR), overall survival (OS), progression-free survival (PFS), locoregional recurrence-free survival (LRFS), distant metastasis-free survival (DMFS) and the incidence rate of adverse effects (AEs) and with subgroup analysis according to each study type. The primary endpoints were ORR, OS, and PFS; LRFS, DMFS, and grade ≥3 acute AEs were secondary endpoints.Results: In total, 2,305 patients of eight studies were included in this review. We found that patients who were administered cisplatin weekly or triweekly had no differences in ORR, OS, PFS, DMFS, LRFS, severe mucositis, dermatitis, nausea/vomiting or nephrotoxicity. Patients who were administered weekly cisplatin were at a higher risk of hematological toxicity compared with patients who received the chemotherapy triweekly.Conclusion: Our findings suggest that both regimens could be recommended as the standard of care for the chemoradiotherapy treatment of LANPC, the perceived benefit of lower toxicity with weekly cisplatin could not be established

    Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

    Full text link
    The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication Consideratio

    Transcriptome profiling reveals the underlying mechanism of grape post-harvest pathogen Penicillium olsonii against the metabolites of Bacillus velezensis

    Get PDF
    IntroductionPathogen infection influences the post-harvest shelf life of grape berries. In a preliminary study, metabolites produced by Bacillus velezensis significantly inhibited the growth of the grape postharvest pathogen Penicillium olsonii.MethodsTo investigate the mechanism of interaction between B. velezensis and P. olsonii, a draft genome was generated for P. olsonii WHG5 using the Illumina NovaSeq platform, and the transcriptomic changes in WHG5 were analyzed in response to the exposure to B. velezensis metabolites (10% v/v).ResultsThe expression levels of genes associated with sporulation, including GCY1, brlA, and abaA, were down-regulated compared with those of the control. In addition, spore deformation and abnormal swelling of the conidiophore were observed. The expression of crucial enzymes, including fructose 2,6-bisphosphate and mannitol-2-dehydrogenase, was down-regulated, indicating that the glycolytic pathway of WHG5 was adversely affected by B. velezensis metabolites. The KEGG pathway enrichment analysis revealed that glutathione metabolism and the antioxidant enzyme system were involved in the response to B. velezensis metabolites. The down-regulation of the pathogenesis-related genes, PG1 and POT1, suggested that B. velezensis metabolites decreased the pathogenicity of P. olsonii. B. velezensis metabolites disrupted the homeostasis of reactive oxygen species in P. olsonii by affecting glucose metabolism, resulting in spore deformation and disruption of growth. In addition, the expression of key pathogenesis-related genes was down-regulated, thereby reducing the pathogenicity of P. olsonii.DisscusionThis study provides insights into the responses of P. olsonii to B. velezensis metabolites and identifies potential target genes that may be useful in biocontrol strategies for the suppression of post-harvest spoilage in grapes

    Plant growth, salt removal capacity, and forage nutritive value of the annual euhalophyte Suaeda salsa irrigated with saline water

    Get PDF
    Sustainable agricultural development in semiarid and arid regions is severely restricted by soil and water salinization. Cultivation of the representative halophyte Suaeda salsa, which can be irrigated with saline water and cultivated on saline soils, is considered to be a potential solution to the issues of freshwater scarcity, soil salinization, and fodder shortage. However, the salt removal capacity and differences in the forage nutritive value of S. salsa under different saline water treatments remain unknown. Using the methods of field trials and randomized blocks design, we quantified salt accumulation in the aboveground biomass, and the biochemical and nutritive value of field-cultivated S. salsa in arid northwestern China under irrigation with water of different salinities [i.e., freshwater or water containing10, 20, 30, or 40 g/L NaCl). The fresh and dry weights of S. salsa increased, then decreased, with increase in salinity. The salt content of the plant’s aboveground biomass increased to a constant range and, thus, the salt extraction of S. salsa was relatively stable under different salinities of irrigation water. Under the experimental conditions, the crude protein content significantly increased to 9.45% dry weight (DW) and then decreased to 6.85% DW, with an increase in salinity (p < 0.05). The neutral detergent fiber (42.93%–50.00% DW) and acid detergent fiber (34.76%–39.70% DW) contents were suitable for forage. The contents of trace elements, such as copper and zinc, were significantly increased after irrigation with saline water (p < 0.05). The forage of S. salsa is of high nutritive value for livestock, and contains low concentrations of anti-nutrients. Therefore, S. salsa can be considered for cultivation in saline soils irrigated with saline water. In addition, it provides a viable additional source of fodder in arid regions, where the availability of freshwater and non-saline arable land is limited

    The triggering process of an X-class solar flare on a small quadrupolar active region

    Full text link
    The occurrence of X-class solar flares and their potential impact on the space weather often receive great attention than other flares. But predicting when and where an X-class flare will occur is still a challenge. With the multi-wavelength observation from the Solar Dynamics Observatory and FengYun- 3E satellite, we investigate the triggering of a GOES X1.0 flare occurring in the NOAA active region (AR) 12887. Our results show that this unique X-class flare is bred in a relatively small but complex quadrupolar AR. Before the X-class flare, two filaments (F1 and F2) exist below a null-point topology of the quadrupolar AR. Magnetic field extrapolation and observation reveal that F1 and F2 correspond to two magnetic flux ropes with the same chirality and their adjacent feet rooted at nonconjugated opposite polarities, respectively. Interestingly, these two polarities collide rapidly, accompanied by photospheric magnetic flux emergence, cancellation and shear motion in the AR center. Above this site, F1 and F2 subsequently intersect and merge to a longer filament (F3) via a tether-cutting-like reconnection process. As a result, the F3 rises and erupts, involving the large-scale arcades overlying filament and the quadrupolar magnetic field above the AR, and eventually leads to the eruption of the X-class flare with a quasi-X-shaped flare ribbon and a coronal mass ejection. It suggests that the rapid collision of nonconjugated opposite polarities provides a key condition for the triggering of this X-class flare, and also provides a featured case for flare trigger mechanism and space weather forecasting.Comment: 24 pages, 7 figures, accepted for publication in Ap

    Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

    Full text link
    Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment of MTD, it is still possible for the attacker to launch stealthy FDI attacks generated with former branch susceptances. In this paper, we prove that, an MTD has the capability to thwart all FDI attacks constructed with former branch susceptances only if (i) the number of branches ll in the power system is not less than twice that of the system states nn (i.e., l≥2nl \geq 2n, where n+1n + 1 is the number of buses); (ii) the susceptances of more than nn branches, which cover all buses, are perturbed. Moreover, we prove that the state variable of a bus that is only connected by a single branch (no matter it is perturbed or not) can always be modified by the attacker. Nevertheless, in order to reduce the attack opportunities of potential attackers, we first exploit the impact of the susceptance perturbation magnitude on the dimension of the \emph{stealthy attack space}, in which the attack vector is constructed with former branch susceptances. Then, we propose that, by perturbing an appropriate set of branches, we can minimize the dimension of the \emph{stealthy attack space} and maximize the number of covered buses. Besides, we consider the increasing operation cost caused by the activation of MTD. Finally, we conduct extensive simulations to illustrate our findings with IEEE standard test power systems

    High Altitude test of RPCs for the ARGO-YBJ experiment

    Get PDF
    A 50 m**2 RPC carpet was operated at the YangBaJing Cosmic Ray Laboratory (Tibet) located 4300 m a.s.l. The performance of RPCs in detecting Extensive Air Showers was studied. Efficiency and time resolution measurements at the pressure and temperature conditions typical of high mountain laboratories, are reported.Comment: 16 pages, 10 figures, submitted to Nucl. Instr. Met
    • …
    corecore