Visible to the public Biblio

Found 101 results

Filters: Keyword is Stability analysis  [Clear All Filters]
2023-02-02
Zhang, Yanjun, Zhao, Peng, Han, Ziyang, Yang, Luyu, Chen, Junrui.  2022.  Low Frequency Oscillation Mode Identification Algorithm Based on VMD Noise Reduction and Stochastic Subspace Method. 2022 Power System and Green Energy Conference (PSGEC). :848–852.
Low-frequency oscillation (LFO) is a security and stability issue that the power system focuses on, measurement data play an important role in online monitoring and analysis of low-frequency oscillation parameters. Aiming at the problem that the measurement data containing noise affects the accuracy of modal parameter identification, a VMD-SSI modal identification algorithm is proposed, which uses the variational modal decomposition algorithm (VMD) for noise reduction combined with the stochastic subspace algorithm for identification. The VMD algorithm decomposes and reconstructs the initial signal with certain noise, and filters out the noise signal. Then, the optimized signal is input into stochastic subspace identification algorithm(SSI), the modal parameters is obtained. Simulation of a three-machine ninenode system verifies that the VMD-SSI mode identification algorithm has good anti-noise performance.
2022-12-09
He, Song, Shi, Xiaohong, Huang, Yan, Chen, Gong, Tang, Huihui.  2022.  Design of Information System Security Evaluation Management System based on Artificial Intelligence. 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI). :967—970.
In today's society, with the continuous development of artificial intelligence, artificial intelligence technology plays an increasingly important role in social and economic development, and hass become the fastest growing, most widely used and most influential high-tech in the world today one. However, at the same time, information technology has also brought threats to network security to the entire network world, which makes information systems also face huge and severe challenges, which will affect the stability and development of society to a certain extent. Therefore, comprehensive analysis and research on information system security is a very necessary and urgent task. Through the security assessment of the information system, we can discover the key hidden dangers and loopholes that are hidden in the information source or potentially threaten user data and confidential files, so as to effectively prevent these risks from occurring and provide effective solutions; at the same time To a certain extent, prevent virus invasion, malicious program attacks and network hackers' intrusive behaviors. This article adopts the experimental analysis method to explore how to apply the most practical, advanced and efficient artificial intelligence theory to the information system security assessment management, so as to further realize the optimal design of the information system security assessment management system, which will protect our country the information security has very important meaning and practical value. According to the research results, the function of the experimental test system is complete and available, and the security is good, which can meet the requirements of multi-user operation for security evaluation of the information system.
2022-12-01
Chandwani, Ashwin, Dey, Saikat, Mallik, Ayan.  2022.  Parameter-Variation-Tolerant Robust Current Sensorless Control of a Single-Phase Boost PFC. IEEE Journal of Emerging and Selected Topics in Industrial Electronics. 3:933—945.

With the objective to eliminate the input current sensor in a totem-pole boost power factor corrector (PFC) for its low-cost design, a novel discretized sampling-based robust control scheme is proposed in this work. The proposed control methodology proves to be beneficial due to its ease of implementation and its ability to support high-frequency operation, while being able to eliminate one sensor and, thus, enhancing reliability and cost-effectiveness. In addition, detailed closed-loop stability analysis is carried out for the controller in discrete domain to ascertain brisk dynamic operation when subjected to sudden load fluctuations. To establish the robustness of the proposed control scheme, a detailed sensitivity analysis of the closed-loop performance metrics with respect to undesired changes and inherent uncertainty in system parameters is presented in this article. A comparison with the state-of-the-art (SOA) methods is provided, and conclusive results in terms of better dynamic performance are also established. To verify and elaborate on the specifics of the proposed scheme, a detailed simulation study is conducted, and the results show 25% reduction in response time as compared to SOA approaches. A 500-W boost PFC prototype is developed and tested with the proposed control scheme to evaluate and benchmark the system steady-state and dynamic performance. A total harmonic distortion of 1.68% is obtained at the rated load with a resultant power factor of 0.998 (lag), which proves the effectiveness and superiority of the proposed control scheme.

Conference Name: IEEE Journal of Emerging and Selected Topics in Industrial Electronics

2022-08-26
Xia, Hongbing, Bao, Jinzhou, Guo, Ping.  2021.  Asymptotically Stable Fault Tolerant Control for Nonlinear Systems Through Differential Game Theory. 2021 17th International Conference on Computational Intelligence and Security (CIS). :262—266.
This paper investigates an asymptotically stable fault tolerant control (FTC) method for nonlinear continuous-time systems (NCTS) with actuator failures via differential game theory (DGT). Based on DGT, the FTC problem can be regarded as a two-player differential game problem with control player and fault player, which is solved by utilizing adaptive dynamic programming technique. Using a critic-only neural network, the cost function is approximated to obtain the solution of the Hamilton-Jacobi-Isaacs equation (HJIE). Then, the FTC strategy can be obtained based on the saddle point of HJIE, and ensures the satisfactory control performance for NCTS. Furthermore, the closed-loop NCTS can be guaranteed to be asymptotically stable, rather than ultimately uniformly bounded in corresponding existing methods. Finally, a simulation example is provided to verify the safe and reliable fault tolerance performance of the designed control method.
Yang, Qi, Chen, Qunbin, Zhang, Pai.  2021.  Strong Stability of Optimal Design for a Time-varying Dynamic System in Batch Culture. 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC). :836–841.
In this study, we prove strong stability for a typical time-varying nonlinear dynamic system in batch culture, which is hard to obtain analytical solutions and equilibrium points. To this end, firstly, we construct a linear variational system to the nonlinear dynamic system. Secondly, we give a proof that the fundamental matrix solution to this dynamic system is bounded. Combined with the above two points, the strong stability for the nonlinear dynamic system is proved.
U, Shriya, S, Veena H.  2021.  Increasing Grid Power Transmission Using PV-STATCOM. 2021 6th International Conference for Convergence in Technology (I2CT). :1–5.
Renewable energy resource plays an important role due to increasing energy claim. Power generation by PV technology is one of the fastest growing renewable energy sources due to its clean, economical and sustainable property. Grid integrated PV systems plays an important role in power generation sector. As the energy demand is increasing day by day, the power transfer capability of transmission line is increasing which leads various problems like stability, increase in fault current, congestion etc. To overcome the problem, we can use either FACTS device or battery storage or construct additional lines which is cost effective. This paper deals with grid connected PV system, which functions as PV-STATCOM. Voltage and damping control are used to elevate the power transfer capacity and to achieve regulated voltage within the limits at the point of common coupling (PCC). The studies are performed on SMIB and the simulation is carried out in MATLAB/SIMULINK environment.
2022-07-13
Yakymenko, Igor, Kasianchuk, Mykhailo, Yatskiv, Vasyl, Shevchuk, Ruslan, Koval, Vasyl, Yatskiv, Solomiya.  2021.  Sustainability and Time Complexity Estimation of Сryptographic Algorithms Main Operations on Elliptic Curves. 2021 11th International Conference on Advanced Computer Information Technologies (ACIT). :494—498.
This paper presents the time complexity estimates for the methods of points exponentiation, which are basic for encrypting information flows in computer systems. As a result of numerical experiments, it is determined that the method of doubling-addition-subtraction has the lowest complexity. Mathematical models for determining the execution time of each considered algorithm for points exponentiation on elliptic curves were developed, which allowed to conduct in-depth analysis of their performance and resistance to special attacks, in particular timing analysis attack. The dependences of the cryptographic operations execution time on the key length and the sustainability of each method on the Hamming weight are investigated. It is proved that under certain conditions the highest sustainability of the system is achieved by the doubling-addition-subtraction algorithm. This allows to justify the choice of algorithm and its parameters for the implementation of cryptographic information security, which is resistant to special attacks.
2022-07-01
Rahimi, Farshad.  2021.  Distributed Control for Nonlinear Multi-Agent Systems Subject to Communication Delays and Cyber-Attacks: Applied to One-Link Manipulators. 2021 9th RSI International Conference on Robotics and Mechatronics (ICRoM). :24–29.
This note addresses the problem of distributed control for a class of nonlinear multi-agent systems over a communication graph. In many real practical systems, owing to communication limits and the vulnerability of communication networks to be overheard and modified by the adversary, consideration of communication delays and cyber-attacks in designing of the controller is important. To consider these challenges, in the presented approach, a distributed controller for a group of one-link flexible joint manipulators is provided which are connected via data delaying communication network in the presence of cyber-attacks. Sufficient conditions are provided to guarantee that the closed-loop system is stable with prescribed disturbance attenuation, and the parameter of the control law can be obtained by solving a set of linear matrix inequities (LMIs). Eventually, simulations results of four single-link manipulators are provided to demonstrate the performance of the introduced method.
2022-06-08
Giehl, Alexander, Heinl, Michael P., Busch, Maximilian.  2021.  Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain. 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). :2023–2028.
Big data continues to grow in the manufacturing domain due to increasing interconnectivity on the shop floor in the course of the fourth industrial revolution. The optimization of machines based on either real-time or historical machine data provides benefits to both machine producers and operators. In order to be able to make use of these opportunities, it is necessary to access the machine data, which can include sensitive information such as intellectual property. Employing the use case of machine tools, this paper presents a solution enabling industrial data sharing and cloud collaboration while protecting sensitive information. It employs the edge computing paradigm to apply differential privacy to machine data in order to protect sensitive information and simultaneously allow machine producers to perform the necessary calculations and analyses using this data.
2022-05-20
Chattopadhyay, Abhiroop, Valdes, Alfonso, Sauer, Peter W., Nuqui, Reynaldo.  2021.  A Cyber Threat Mitigation Approach For Wide Area Control of SVCs using Stability Monitoring. 2021 IEEE Madrid PowerTech. :1–6.
We propose a stability monitoring approach for the mitigation of cyber threats directed at the wide area control (WAC) system used for coordinated control of Flexible AC Transmission Systems (FACTS) used for power oscillation damping (POD) of active power flow on inter-area tie lines. The approach involves monitoring the modes of the active power oscillation on an inter-area tie line using the Matrix Pencil (MP) method. We use the stability characteristics of the observed modes as a proxy for the presence of destabilizing cyber threats. We monitor the system modes to determine whether any destabilizing modes appear after the WAC system engages to control the POD. If the WAC signal exacerbates the POD performance, the FACTS falls back to POD using local measurements. The proposed approach does not require an expansive system-wide view of the network. We simulate replay, control integrity, and timing attacks for a test system and present results that demonstrate the performance of the SM approach for mitigation.
2022-05-10
Li, Hongrui, Zhou, Lili, Xing, Mingming, Taha, Hafsah binti.  2021.  Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method. 2021 International Symposium on Computer Technology and Information Science (ISCTIS). :24–27.
The security of Internet of Things (IoT) devices has become a matter of great concern in recent years. The existence of security holes in the executable programs in the IoT devices has resulted in difficult to estimate security risks. For a long time, vulnerability detection is mainly completed by manual debugging and analysis, and the detection efficiency is low and the accuracy is difficult to guarantee. In this paper, the mainstream automated vulnerability analysis methods in recent years are studied, and a vulnerability detection algorithm based on symbol execution is presented. The detection algorithm is suitable for lightweight applications in small and medium-sized IoT devices. It realizes three functions: buffer overflow vulnerability detection, encryption reliability detection and protection state detection. The robustness of the detection algorithm was tested in the experiment, and the detection of overflow vulnerability program was completed within 2.75 seconds, and the detection of encryption reliability was completed within 1.79 seconds. Repeating the test with multiple sets of data showed a small difference of less than 6.4 milliseconds. The results show that the symbol execution detection algorithm presented in this paper has high detection efficiency and more robust accuracy and robustness.
2022-05-05
Xue, Nan, Wu, Xiaofan, Gumussoy, Suat, Muenz, Ulrich, Mesanovic, Amer, Dong, Zerui, Bharati, Guna, Chakraborty, Sudipta, Electric, Hawaiian.  2021.  Dynamic Security Optimization for N-1 Secure Operation of Power Systems with 100% Non-Synchronous Generation: First experiences from Hawai'i Island. 2021 IEEE Power Energy Society General Meeting (PESGM). :1—5.

This paper presents some of our first experiences and findings in the ARPA-E project ReNew100, which is to develop an operator support system to enable stable operation of power system with 100% non-synchronous (NS) generation. The key to 100% NS system, as found in many recent studies, is to establish the grid frequency reference using grid-forming (GFM) inverters. In this paper, we demonstrate in Electro-Magnetic-Transient (EMT) simulations, based on Hawai'i big island system with 100% NS capacity, that a system can be operated stably with the help of GFM inverters and appropriate controller parameters for the inverters. The dynamic security optimization (DSO) is introduced for optimizing the inverter control parameters to improve stability of the system towards N-1 contingencies. DSO is verified for five critical N-1 contingencies of big island system identified by Hawaiian Electric. The simulation results show significant stability improvement from DSO. The results in this paper share some insight, and provide a promising solution for operating grid in general with high penetration or 100% of NS generation.

Han, Weiheng, Cai, Weiwei, Zhang, Guangjia, Yu, Weiguo, Pan, Junjun, Xiang, Longyun, Ning, Tao.  2021.  Cyclic Verification Method of Security Control System Strategy Table Based on Constraint Conditions and Whole Process Dynamic Simulation. 2021 IEEE/IAS Industrial and Commercial Power System Asia (I CPS Asia). :698—703.

The correctness of security control system strategy is very important to ensure the stability of power system. Aiming at the problem that the current security control strategy verification method is not enough to match the increasingly complex large power grid, this paper proposes a cyclic verification method of security control system strategy table based on constraints and whole process dynamic simulation. Firstly, the method is improved based on the traditional security control strategy model to make the strategy model meet certain generalization ability; And on the basis of this model, the cyclic dynamic verification of the strategy table is realized based on the constraint conditions and the whole process dynamic simulation, which not only ensures the high accuracy of strategy verification for the security control strategy of complex large power grid, but also ensures that the power system is stable and controllable. Finally, based on a certain regional power system, the optimal verification of strategy table verification experiment is realized. The experimental results show that the average processing time of the proposed method is 10.32s, and it can effectively guarantee the controllability and stability of power grid.

Raab, Alexander, Mehlmann, Gert, Luther, Matthias, Sennewald, Tom, Schlegel, Steffen, Westermann, Dirk.  2021.  Steady-State and Dynamic Security Assessment for System Operation. 2021 International Conference on Smart Energy Systems and Technologies (SEST). :1—6.

This contribution provides the implementation of a holistic operational security assessment process for both steady-state security and dynamic stability. The merging of steady-state and dynamic security assessment as a sequential process is presented. A steady-state and dynamic modeling of a VSC-HVDC was performed including curative and stabilizing measures as remedial actions. The assessment process was validated by a case study on a modified version of the Nordic 32 system. Simulation results showed that measure selection based on purely steady-state contingency analysis can lead to loss of stability in time domain. A subsequent selection of measures on the basis of the dynamic security assessment was able to guarantee the operational security for the stationary N-1 scenario as well as the power system stability.

2022-04-26
Li, Jun, Zhang, Wei, Chen, Xuehong, Yang, Shuaifeng, Zhang, Xueying, Zhou, Hao, Li, Yun.  2021.  A Novel Incentive Mechanism Based on Repeated Game in Fog Computing. 2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC). :112–119.

Fog computing is a new computing paradigm that utilizes numerous mutually cooperating terminal devices or network edge devices to provide computing, storage, and communication services. Fog computing extends cloud computing services to the edge of the network, making up for the deficiencies of cloud computing in terms of location awareness, mobility support and latency. However, fog nodes are not active enough to perform tasks, and fog nodes recruited by cloud service providers cannot provide stable and continuous resources, which limits the development of fog computing. In the process of cloud service providers using the resources in the fog nodes to provide services to users, the cloud service providers and fog nodes are selfish and committed to maximizing their own payoffs. This situation makes it easy for the fog node to work negatively during the execution of the task. Limited by the low quality of resource provided by fog nodes, the payoff of cloud service providers has been severely affected. In response to this problem, an appropriate incentive mechanism needs to be established in the fog computing environment to solve the core problems faced by both cloud service providers and fog nodes in maximizing their respective utility, in order to achieve the incentive effect. Therefore, this paper proposes an incentive model based on repeated game, and designs a trigger strategy with credible threats, and obtains the conditions for incentive consistency. Under this condition, the fog node will be forced by the deterrence of the trigger strategy to voluntarily choose the strategy of actively executing the task, so as to avoid the loss of subsequent rewards when it is found to perform the task passively. Then, using evolutionary game theory to analyze the stability of the trigger strategy, it proves the dynamic validity of the incentive consistency condition.

2022-04-19
Luo, Jing, Xu, Guoqing.  2021.  XSS Attack Detection Methods Based on XLNet and GRU. 2021 4th International Conference on Robotics, Control and Automation Engineering (RCAE). :171–175.
With the progress of science and technology and the development of Internet technology, Internet technology has penetrated into various industries in today’s society. But this explosive growth is also troubling information security. Among them, XSS (cross-site scripting vulnerability) is one of the most influential vulnerabilities in Internet applications in recent years. Traditional network security detection technology is becoming more and more weak in the new network environment, and deep learning methods such as CNN and RNN can only learn the spatial or timing characteristics of data samples in a single way. In this paper, a generalized self-regression pretraining model XLNet and GRU XSS attack detection method is proposed, the self-regression pretrained model XLNet is introduced and combined with GRU to learn the time series and spatial characteristics of the data, and the generalization capability of the model is improved by using dropout. Faced with the increasingly complex and ever-changing XSS payload, this paper refers to the character-level convolution to establish a dictionary to encode the data samples, thus preserving the characteristics of the original data and improving the overall efficiency, and then transforming it into a two-dimensional spatial matrix to meet XLNet’s input requirements. The experimental results on the Github data set show that the accuracy of this method is 99.92 percent, the false positive rate is 0.02 percent, the accuracy rate is 11.09 percent higher than that of the DNN method, the false positive rate is 3.95 percent lower, and other evaluation indicators are better than GRU, CNN and other comparative methods, which can improve the detection accuracy and system stability of the whole detection system. This multi-model fusion method can make full use of the advantages of each model to improve the accuracy of system detection, on the other hand, it can also enhance the stability of the system.
Gharib, Anastassia, Ibnkahla, Mohamed.  2021.  Security Aware Cluster Head Selection with Coverage and Energy Optimization in WSNs for IoT. ICC 2021 - IEEE International Conference on Communications. :1–6.
Nodes in wireless Internet of Things (IoT) sensor networks are heterogeneous in nature. This heterogeneity can come from energy and security resources available at the node level. Besides, these resources are usually limited. Efficient cluster head (CH) selection in rounds is the key to preserving energy resources of sensor nodes. However, energy and security resources are contradictory to one another. Therefore, it is challenging to ensure CH selection with appropriate security resources without decreasing energy efficiency. Coverage and energy optimization subject to a required security level can form a solution to the aforementioned trade-off. This paper proposes a security level aware CH selection algorithm in wireless sensor networks for IoT. The proposed method considers energy and security level updates for nodes and coverage provided by associated CHs. The proposed method performs CH selection in rounds and in a centralized parallel processing way, making it applicable to the IoT scenario. The proposed algorithm is compared to existing traditional and emerging CH selection algorithms that apply security mechanisms in terms of energy and security efficiencies.
Wu, Haiwei, Wu, Hanling.  2021.  Research on Computer Network Information Security Problems and Prevention Based on Wireless Sensor Network. 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). :1015–1018.
With the continuous improvement of China's scientific and technological level, computer network has become an indispensable part of people's daily life. It can not only effectively improve the efficiency of production and life, and shorten the distance between people, but also further promote the speed of China's social and economic development, which has a positive impact on the realization of China's modernization. Under the new information security demand environment at present, we should pay attention to the related information security work and formulate effective security measures and strategies. In order to effectively prevent these information security problems, people should actively adopt firewall technology, encryption technology, network access control technology and network virus prevention technology for effective protection. This paper analyzes the security problems in the application of wireless sensor networks and explores the mechanism of defending information security, hoping to strengthen the security and stability of wireless sensor networks through effective measures, so that people can better enjoy the convenience brought by the network age.
2022-03-23
Yaning, Guo, Qianwen, Wang.  2021.  Analysis of Collaborative Co-Governance Path of Public Crisis Emergency Management in An All-Media Environment: —Theoretical Research Based on Multi-Agent. 2021 International Conference on Management Science and Software Engineering (ICMSSE). :235–238.
Multi-Agent system has the advantages of information sharing, knowledge accumulation and system stability, which is consistent with the concept of collaborative co-governance of public crisis management, and provides support for dealing with sudden public crises. Based on the background of the all-media environment, this study introduces the Internet-driven mass data management (“ crowdsourcing” crisis management) as a part of the crisis response system to improve the quality of information resource sharing. Crowdsourcing crisis management and Multi-Agent collaborative co-governance mechanism are combined with each other, so as to achieve a higher level of joint prevention and control mechanism, and explore how to effectively share information resources and emergency management resources across regions and departments in public crisis events.
Li, Zhong, Xie, Yan, Han, Qi, Zhang, Ao, Tian, Sheng.  2021.  Group Consensus of Second-order Multi-agent Systems via Intermittent Sampled Control. 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC). :185–189.
This article considers the group consistency of second-order MAS with directly connected spanning tree communication topology. Because the MAS is divided into several groups, we proposed a group consistency control method based on intermittent control, and the range of parameters is given when the system achieves consensus. The protocol can realize periodic control and reduce the working hours of the controller in period. Furthermore, the group consistency of MAS is turn to the stability analysis of error, and a group consistency protocol of MAS with time-delays is designed. Finally, two examples are used for verify the theory.
2022-03-02
Zhang, Deng, Wang, Junkai.  2021.  Research on Security Protection Method of Industrial Control Boundary Network. 2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS). :560–563.
Aiming at the problems of single protection, lack of monitoring and unable to be physically isolated in time under abnormal conditions, an industrial control boundary network security protection method is provided. Realize the real-time monitoring and analysis of the network behavior of the industrial control boundary, realize the in-depth defense of the industrial control boundary, and timely block it in the way of logical link and physical link isolation in case of illegal intrusion, so as to comprehensively improve the protection level of the boundary security of the industrial control system.
Zhao, Younan, Zhu, Fanglai.  2021.  Security Control of Cyber-Physical Systems under Denial-of-Service Sensor Attack: A Switching Approach. 2021 IEEE 10th Data Driven Control and Learning Systems Conference (DDCLS). :1112–1117.
This paper presents an observer-based security control scheme for a Cyber-Physical System (CPS). In the considered system, the feedback channel of the CPS may suffer from Denial-of-Service (DoS). To begin with, a time-delayed switching CPS model is constructed according to two different attack situations. And then, based on the switching model, an observer-based controller is designed in the cyber-layer, Meanwhile, the stability of the closed-loop system is analyzed based on H$ınfty$ stability of switching systems in view of Average Dwell Time (ADT). At last, the performance of the proposed security control scheme is illustrated by an numerical example in Simulation.
2022-02-22
Ouyang, Tinghui, Marco, Vicent Sanz, Isobe, Yoshinao, Asoh, Hideki, Oiwa, Yutaka, Seo, Yoshiki.  2021.  Corner Case Data Description and Detection. 2021 IEEE/ACM 1st Workshop on AI Engineering - Software Engineering for AI (WAIN). :19–26.
As the major factors affecting the safety of deep learning models, corner cases and related detection are crucial in AI quality assurance for constructing safety- and security-critical systems. The generic corner case researches involve two interesting topics. One is to enhance DL models' robustness to corner case data via the adjustment on parameters/structure. The other is to generate new corner cases for model retraining and improvement. However, the complex architecture and the huge amount of parameters make the robust adjustment of DL models not easy, meanwhile it is not possible to generate all real-world corner cases for DL training. Therefore, this paper proposes a simple and novel approach aiming at corner case data detection via a specific metric. This metric is developed on surprise adequacy (SA) which has advantages on capture data behaviors. Furthermore, targeting at characteristics of corner case data, three modifications on distanced-based SA are developed for classification applications in this paper. Consequently, through the experiment analysis on MNIST data and industrial data, the feasibility and usefulness of the proposed method on corner case data detection are verified.
Wang, Mingzhe, Liang, Jie, Zhou, Chijin, Chen, Yuanliang, Wu, Zhiyong, Jiang, Yu.  2021.  Industrial Oriented Evaluation of Fuzzing Techniques. 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST). :306–317.
Fuzzing is a promising method for discovering vulnerabilities. Recently, various techniques are developed to improve the efficiency of fuzzing, and impressive gains are observed in evaluation results. However, evaluation is complex, as many factors affect the results, for example, test suites, baseline and metrics. Even more, most experiment setups are lab-oriented, lacking industrial settings such as large code-base and parallel runs. The correlation between the academic evaluation results and the bug-finding ability in real industrial settings has not been sufficiently studied. In this paper, we test representative fuzzing techniques to reveal their efficiency in industrial settings. First, we apply typical fuzzers on academic widely used small projects from LAVAM suite. We also apply the same fuzzers on large practical projects from Google's fuzzer-test-suite, which is rarely used in academic settings. Both experiments are performed in both single and parallel run. By analyzing the results, we found that most optimizations working well on LAVA-M suite fail to achieve satisfying results on Google's fuzzer-test-suite (e.g. compared to AFL, QSYM detects 82x more synthesized bugs in LAVA-M, but only detects 26% real bugs in Google's fuzzer-test-suite), and the original AFL even outperforms most academic optimization variants in industry widely used parallel runs (e.g. AFL covers 13% more paths than AFLFast). Then, we summarize common pitfalls of those optimizations, analyze the corresponding root causes, and propose potential directions such as orchestrations and synchronization to overcome the problems. For example, when running in parallel on those large practical projects, the proposed horizontal orchestration could cover 36%-82% more paths, and discover 46%-150% more unique crashes or bugs, compared to fuzzers such as AFL, FairFuzz and QSYM.
2022-02-04
Govindan, Thennarasi, Palaniswamy, Sandeep Kumar, Kanagasabai, Malathi, Kumar, Sachin, Rao, T. Rama, Kannappan, Lekha.  2021.  RFID-Band Integrated UWB MIMO Antenna for Wearable Applications. 2021 IEEE International Conference on RFID Technology and Applications (RFID-TA). :199—202.
This manuscript prescribes the design of a four-port ultra-wideband (UWB) diversity antenna combined with 2.4 GHz ISM radio band. The denim-based wearable antenna is intended for use as a radio frequency identification (RFID) tag for tracking and security applications. The unit cells of the antenna are arranged orthogonally to each other to achieve isolation \$\textbackslashtextbackslashgt15\$ dB. The bending analysis of the proposed antenna is performed to ensure its stability. The dimensions of the unit cell and four-port MIMO antenna are \$30 \textbackslashtextbackslashtimes 17 \textbackslashtextbackslashtimes 1\$ cubic millimeter and \$55 \textbackslashtextbackslashtimes 53 \textbackslashtextbackslashtimes 1\$ cubic millimeter, respectively. The proposed antenna’s specific absorption rate (SAR) is researched in order to determine the safer SAR limit set by the Federal Communications Commission (FCC).