Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200203-9.doi: 10.11896/jsjkx.241200203
• Interdiscipline & Application • Previous Articles Next Articles
MENG Dongyue1,2, HUANG Yuchuan1,2,3, HAN Guoxiang1,2, LI Hongchen1, WANG Pengfei1
CLC Number:
| [1]HE D J,DU X,QIAO Y R.A Survey on Cyber Security of Unmanned Aerial Vehicles[J].Chinese Journal of Computer,2029,42(5):1076-1074. [2]GUO L,YU X,ZHANG X,et al.Safety control system techno-logies for UAVs:review and prospect[J].Scientia Sinica Informationis,2020,50(2):184-194. [3]JAHAN F,SUN W,NIYAZ Q,et al.Security modeling of auto-nomous systems:a survey[J].ACM Computing Surveys,2019,52(5):1-34. [4]WANG Z H,ZHOU C H,PAN Y W,.et al.Overview of Unmanned Aerial Vehicle Systems Security[J].Computer Science,2024,51(S1):876-881. [5]BAO S G,YAO Q C,WANG Y W.Research on the application of fire fighting UAV in high-rise buildings [J].Fire Industry(Electronic Version),2024,10(15):31-33. [6]LIU Y,NING P,REITER M K.False data injection attacks against state estimation in electric power grids[J].ACM Transactions on Information and System Security,2011,14(1):1-33. [7]LIANG G Q,ZHAO J H,LUO F J.A review of false data injection attacks against modern power systems[J].IEEE Transactions on Smart Grid,2017,8(4):1630-1638. [8]QIN J H,LI M L,SHI L.Optimal denial-of-service attackscheduling with energy constraint over packet-dropping networks[J].IEEE Transactions on Automatic Control,2018,63(6):1648-1663. [9]RAHMAN M A,MOHSENIAN-RAD H.False data injectionattacks with incompleteinformation against smart power grids[C]//IEEE Global Communications Conference(GLOBECOM).2012. [10]LIU X,BAO Z,LU D.Modeling of localfalse data injection attacks with reduced network information[J].IEEE Transactions on Smart Grid,2017,6(4):1686-1696. [11]LIU X,LI Z Y.False data attacks against AC state estimation with incomplete network information[J].IEEE Transactions on Smart Grid,2017,8(5):2239-2248. [12]ESMALIFALAK M,NGUYEN H,ZHENG R,et al.Stealthfalse data injection usingindependent component analysis in smart grid[C]//IEEE International Conference on Smart Grid Communications.2011. [13]LIU W,FENG B W,WENG J.Survey on research of mini-drones security[J].Chinese Journal of Network and Information Security,2016,2(3):39-45. [14]HE D J,D X,Q Y R,et al.A Survey on cyber security of unmanned aerial vehicles[J].Chinese Journal of Computers,2019,42(5):1076-1094. [15]BHATTI J,HUMPHREYS T E.Hostile control of ships viafalse GPS signal:demonstration and detection[J].Journal of the Institute of Navigation,2017,64:51-66. [16]KERNS A J,SHEPARE D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636. [17]PSIAKI M L,HUMPHREYS T E.GNSS spoofing and detection[J].Proceedings of the IEEE,2016,104(6):1258-1270. [18]LIU X Y,JIA J.Safety analysis method of small shipboard fixed wing UAV[J].Command Control and Simulation,2019,41(1):109-111. [19]CHEN P Z,WU H Y,CHEN Y.Path planning for microquadrotor UAVs based on dynamic movement primitives[J].Chinese High Technology Letters,2016(2):186-194. [20]XU J,CAI CX,LI YQ,et al.Dual-loop path tracking and control for quad-rotor miniature unmanned aerial vehicles[J].Control Theory & Applications,2015,32(10):1335-1342. [21]LIU J Y,JIA W F,LAI J Z,et al.Multi-information Nonlinear Fusion Technology of Micro Quadrotor Aircraft[J].Journal of Nanjing University of Aeronautics & Astronautics,2013,45(5):575-582. [22]WU C F,LIU X Q,YUAN X.Modeling and PID control for a quadrotor[J].Electronic Design Engineering,2012(16):68-70. [23]CHEN Z Q,CHEN Y,SUN M W,et al.Surveys on Theory and Engineering Applications for Linear Active Disturbance Rejection Control[J].Information and Control,2017(3):257-266. [24]GAO J,WANG P,HOU Z X.UAV velocity control based onimproved PID algorithm[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015(S1):1-5. [25]HAN Z Q.Auto-disturbances-rejection Controller and Its Applications[J].Control and Decision,1998(1):19-23. [26]SONG W G.Theory,methods and algorithms of robot mechanical systems[M].Beijing:China Machine Press,2007. [27]CAI Z X.Robotics[M].Beijing:Tsinghua University Press,2000. [28]LIU R.Robotics,Machine Vision and Control—Fundamentals of MATLAB Algorithms[M].Beijing:Publishing House of Electronics Industry,2020. [29]GUO H,GUO X H.Local path planning algorithm for UAV based on improved velocity obstacle method[J].Acta Aeronauticaet Astronautica Sinica,2023,44(11):327586-327586. [30]ZHAI L,ZHANG X Y,ZHANG X,et al.Local Dynamic Obstacle Avoidance Path Planning Algorithm for Unmanned Vehicles Based on Potential Field Method[J].Transactions of Beijing Institute of Technology,2022,42(7):696-705. [31]ZHANG Q,SONG B Y,ZHAO H D.Discretization of Fractional Order Differentiator and Integrator with Different Fractional Orders[J].Intelligent Control and Automation,2017(8):75-85.[32]崔凤午,梁怀学.棣莫弗公式在推导倍角公式中的应用[J].松辽学刊(自然科学版),1997(4):64-65. [33]胡寿松.自动控制原理 [M].科学出版社,2007. [34]OSSAREH H R,WISOTZKI S,BUCKLAND S,et al.An Internal Model Control-Based Approach for Characterization and Controller Tuning of Turbocharged Gasoline Engines[J].IEEE transactions on control systems technology:A publication of the IEEE Control Systems Society,2021,29(2):866-875. [35]GUO L.Feedback and uncertainty:Some basic problems and results[J].Annual Review in Control.2020:4927-4936. [36]WU L F,HONG Z,PAN F.Network protocol reverse analysis and application[M].Beijing:National Defense Industry Press,2016. [37]YE Y,ZHANG Z,WANG F,et al.Netplier:probabilistic net-work protocol reverse engineering from message Traces[C]//Network and Distributed System Security Symposium.2021. [38]GENTRY C,WATERS B.Adaptive security in broadcast en-cryption systems(with short ciphertexts)[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.2009:171-188. [39]ZHAO X,ZHANG F.Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority[J].Journal of Systems and Software,2012,85(3):708-716. [40]SHI X L,ZHU Y F,LIU L,et al.Method of encrypted protocol reverse engineering [J].Application Research of Computers,2015,32(1):214-217. [41]GAO J F,ZHANG Y F,LUO S,et al.Research on Taint Back-tracking Reverse Analysis Method of Network Encoding Protocol[J].Netinfo Security,2017(1):68-76. [42]MA R K,ZHENG H,WANG J Y,et al.Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis[J].Frontiers of Information Technology & Electronic Engineering,2022,23(3):351-360. [43]ZHU Y,HAN J,YUAN L,et al.SPFPA:A format parsing approach for unknown security protocols[J].Journal of Computer Research and Development,2015,52(10):2200. [44]HE X D.Security Analysis of Security Protocol Implementations Based on Network Trace [D].Wuhan:South-Central Minzu University,2019. [45]TANG S Y,CHENG G,JIANG B M,et al.Detection and recognition of VPN encrypted traffic based on segmented entropy distribution[J].Cyberspace Security.2020,11(8):23-27,33. [46]XIAO D Q,ZHOU Q,ZHANG H G,et al.Analyzing encryption protocols based on temporal logic[J].Chinese Journal of Computers,2002,25(10):1083-1089. [47]DING S F,ZHU H,XU X Z,et al.Entropy-based fuzzy information measures[J].Chinese Journal of Computers,2012,35(4):796-801. [48]ZHU Y N,HAN J H,YUAN L,et al.Protocol ciphertext field identification by entropy estimating[J].Journal of Electronics & Information Technology,2016,38(8):1865-1871. |
| [1] | TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404. |
| [2] | XIA Zhuoqun, ZHOU Zihao, DENG Bin, KANG Chen. Security Situation Assessment Method for Intelligent Water Resources Network Based on ImprovedD-S Evidence [J]. Computer Science, 2025, 52(6A): 240600051-6. |
| [3] | WU Kun, HU Xiangang. Overview of Research on Post-quantum Cryptography Technology [J]. Computer Science, 2025, 52(2): 8-19. |
| [4] | XIE Zhenjie, LUO Youqiang, ZHAO Fangfang, REN Shuai. Signcryption Scheme Based on SM9 Domestic Cryptographic Algorithm [J]. Computer Science, 2025, 52(11A): 241200049-8. |
| [5] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
| [6] | GUO Chuntong, WU Wenyuan. Verifiable Decryption Scheme Based on MLWE and MSIS [J]. Computer Science, 2024, 51(5): 331-345. |
| [7] | SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13. |
| [8] | LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364. |
| [9] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
| [10] | ZHAO Chenxia, SHU Hui, SHA Zihan. Cross-architecture Cryptographic Algorithm Recognition Based on IR2Vec [J]. Computer Science, 2023, 50(6A): 220100255-7. |
| [11] | REN Gaoke, MO Xiuliang. Network Security Situation Assessment for GA-LightGBM Based on PRF-RFECV Feature Optimization [J]. Computer Science, 2023, 50(6A): 220400151-6. |
| [12] | CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389. |
| [13] | YANG Xin, LI Hui, QUE Jianming, MA Zhentai, LI Gengxin, YAO Yao, WANG Bin, JIANG Fuli. Efficiently Secure Architecture for Future Network [J]. Computer Science, 2023, 50(3): 360-370. |
| [14] | QIN Futong, YUAN Xuejun, ZHOU Chao, FAN Yongwen. Grey Evaluation Method of Network Security Grade Based on Comprehensive Weighting [J]. Computer Science, 2023, 50(11A): 230300144-6. |
| [15] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
|
||