[PDF][PDF] Review on cyber-physical system research and development

J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
… Cyber physical system (CPS) is a complex system including computing, network and
physical entities, known as the next generation network technology. This paper introduces the …

[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… the cause of security issues automatically. We reproduce the latest dynamic automatic …
-searched scenes, respectively, which cause security issues in the CIL and CILRS system's visual …

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… Cyber ranges are key to training the next generation of talent to defend, and potentially attack,
critical infrastructure. China—through the development of its ranges—is providing a venue …

[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …

EB Kania - … ” Warfare,” US-China Economic and Security Review …, 2017 - uscc.gov
… In future combat contingencies, the PLAN’s USVs and UUVs may be used for tasks such as
reconnaissance, tracking, surveillance, target designation, mine detection and hunting, and …

[PDF][PDF] Progress in research on VOC molecule recognition by semiconductor sensors

H Liu, G Meng, Z Deng, M Li, J Chang, T Dai… - Acta Phys.-Chim …, 2020 - scholar.archive.org
… has restricted their potential application in the Internet of Things (IoT) era. In this paper,
progress in the research addressing the selectivity issues of MOS sensors is reviewed, and three …

[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies

C Cheng, MCL Chau, ML Chan - Communications Association of Hong …, 2018 - cahk.hk
… The cybercriminals becomes increasingly accustomed and has adapted to different internet
platforms, extending from traditional social media channels to more specialized network

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Network. Testo disponibile al sito …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge

YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …

[PDF][PDF] Safeguarding socialism

MD Johnson - Sinopsis. China in context and perspective, 2020 - sinopsis.cz
… 道路) meant embracing a new national security concept with both traditional and non-traditional
elements, linking external and internal security issues, raising awareness of risk, and …

[PDF][PDF] Editable blockchain: models, techniques and methods

Y Yong, W Fei-Yue - Acta Automatica Sinica, 2020 - aas.net.cn
… data on blockchains, and discuss some open problems. Our purpose is to provide helpful
reference and guidance for future research and development in this novel area. Key words …