Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

100results about How to "Enhanced confrontation ability" patented technology

Imperceptible adversarial patch generation method and application

The invention belongs to the technical field of artificial intelligence security, and discloses a high-strength adversarial patch sample generation method and application, and the method comprises thesteps: firstly calculating an area, which greatly affects a CNNs classification decision, in an image through Grad-CAM, and using the area as a feature contribution area (CFRs) of the image; and positioning the region by using a mask mechanism so that scrambling can be completed in the determined feature contribution area. According to the method, a loss function is redefined to serve as an optimized objective function, then a stochastic gradient descent optimization algorithm is utilized, hyper-parameters are introduced to search for efficient disturbance, and then the adversarial sample based on CFRs can be obtained. According to the method, good balance between countermeasure strength and imperceptibility is realized by only scrambling in a feature contribution area and limiting a disturbance range within a micro range which is difficult to perceive by human eyes, and experimental verification is performed on CIFAR-10 and ILSVRC2012 data sets. The adversarial sample generated by the method is applied to adversarial training, and the deep learning defense capability can be effectively improved.
Owner:ZHEJIANG UNIVERSITY OF SCIENCE AND TECHNOLOGY

Tactical communication network countermeasure method based on signal recognition and network reconnaissance

The invention provides a tactical communication network countermeasure method based on signal recognition and network reconnaissance. The method comprises the steps of tactical communication network comprehensive situation awareness, tactical communication target attribute recognition based on time-frequency-space characteristics, detection of the specific tactical communication target based on synchronization characteristics, time-division multi-target jamming based on network key information and tactical communication network countermeasure based on synchronization decoy. The core of the method is to recognize the target attributes, locate the network node, analyze the traffic type and perform statistics of the traffic volume by using the signal time-frequency spatial domain characteristic and network characteristic information so as to realize communication signal recognition and network comprehensive situation analysis under the complex battlefield electromagnetic environment. Time-sharing jamming is performed by using the sparsity of the network key information for different target networks to improve the multi-target jamming capacity, and synchronization decoy jamming is performed by using the vulnerability of the synchronization mechanism to effectively counter the ad hoc encrypted communication network characterized by multi-hop routing and forwarding and high-speed frequency hopping.
Owner:BEIJING HAIGE SHENZHOU COMM TECH

Traditional Chinese medicine composition for relieving itching and diminishing swelling after mosquito bites and preparation method thereof

The invention discloses a traditional Chinese medicine composition for relieving itching and diminishing swelling after mosquito bites and a preparation method thereof. The composition is prepared from the following medicinal raw materials in parts by weight: 30-80 parts of astragalus membranaceus, 1-10 parts of calculus bovis, 20-60 parts of scutellariae barbatae, 30-60 parts of licorice roots, 30-70 parts of fructus kochiae, 20-60 parts of sophora flavescens, 30-60 parts of cinnamon and 20-60 parts of clove. The traditional Chinese medicine composition is scientific in prescription; and traditional Chinese medicine preparations and floral water prepared from the traditional Chinese medicine composition do not have toxic or side effect, are prepared by using purely natural formulae, and have strong pertinence. The floral water and other preparations prepared from the traditional Chinese medicine composition have a total effective rate of 95 percent, can be used for eliminating itching and heat-pain symptoms caused by mosquito bites after being applied for 5 minutes on average and eliminating swelling after 30 minutes, have reliable and rapid curative effect, can be used by adults and children, and are safe and reliable.
Owner:雷允上药业集团有限公司

Laser shoot vehicle, and countermeasure system and countermeasure method based on vehicle

The invention discloses a laser shoot vehicle, and a countermeasure system and a countermeasure method based on the vehicle, which belongs to the field of automatic control fire countermeasure robots, and aims at solving the problems of single functions and poor countermeasure in the existing intelligent vehicle. The laser shoot vehicle comprises a vehicle body, a shoot device, a walking device, a rotation device, a sensing device, a sound-light alarming device and a control device, wherein the outer wall of the front side of the vehicle body is distributed with sensors for detecting obstacles and other laser shoot vehicles in front of the vehicle body; the top part of the vehicle body is provided with a shot area and a light sensor; signals acquired by the sensing device are sent to the control device; and the control device controls the shoot device, the walking device, the rotation device and the sound-light alarming device. The laser shoot vehicle countermeasure method comprises steps: a control instruction is inputted manually to drive the laser shoot vehicle to perform moving, rotation and shooting actions or an instruction is generated through automatic operation to complete all actions. A network management module can be used for playing a role of judgment. The laser shoot vehicle, the system and the method are used in intelligent vehicle countermeasure.
Owner:HEILONGJIANG UNIV

Multi-agent confrontation method and system based on dynamic graph neural network

The invention belongs to the field of reinforcement learning of a multi-agent system, particularly relates to a multi-agent confrontation method and system based on a dynamic graph neural network, and aims at solving the problems that an existing multi-agent model based on the graph neural network is low in training speed and low in efficiency, and much manual intervention is needed in graph construction. The method comprises the following steps: obtaining an observation vector of each agent, and carrying out linear transformation to obtain an observation feature vector; calculating a connection relationship between adjacent agents, and constructing a graph structure between the agents; carrying out embedded representation on a graph structure between the intelligent agents in combination with the observation feature vectors; performing network space-time parallel training on the action prediction result of the action network and the evaluation of the evaluation network by using the embedded representation; and performing action prediction and action evaluation in multi-agent confrontation through the trained network. According to the method, a more real graph relationship is established through pruning, space-time parallel training is realized by utilizing the full-connection neural network and position coding, the training efficiency is high, and the effect is good.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI +1

Racing vehicle entertainment competition system based on Internet of Vehicles

ActiveCN111298401AAdjust driving statusAdd funAmusementsSport apparatusMotorsportsIn vehicle
The application discloses a racing vehicle entertainment competition system based on the Internet of Vehicles. According to the racing vehicle entertainment competition system, a sensing device, a data transmission unit and a competition control center are arranged on an intelligent racing track. The sensing device is used for acquiring driving information when racing vehicles pass through the sensing range of the sensing device, the data transmission unit is used for sending the driving information to the competition control center, and the competition control center is used for calculating evaluation scores of the corresponding racing vehicles according to the driving information and judging that the racing vehicle with the minimum evaluation score obtains instruction control authority.The racing vehicle comprises a vehicle-mounted unit and an instruction operation unit. The instruction operation unit is used for determining a controlled racing vehicle according to a received effectselection instruction and controlling the competition control center to send a control instruction to a vehicle-mounted unit of the controlled racing vehicle according to the instruction control authority, and the vehicle-mounted unit is used for adjusting the driving state of the racing vehicle according to the received control instruction. According to the technical scheme, through the Internetof Vehicles technology, the interestingness and the resistance of racing vehicle sports are improved.
Owner:HUNAN UNIV

Method and system for detecting Windows malicious programs on KVM virtualization platform

The invention discloses a method and system for detecting a Windows malicious program on a KVM virtualization platform. The method comprises: adopting a Libvmi technology to scan a process linked listand a kernel module linked list in a Windows virtual machine memory, and obtaining any program in the Windows virtual machine process linked list and the kernel module linked list and a disk file path corresponding to a Windows virtual machine process; performing digital signature verification on any program on the KVM host machine; when the digital signature of any program is qualified, judgingwhether the memory image of the Windows virtual machine process is consistent with the disk file content corresponding to the Windows virtual machine process or not on the KVM host machine; and if so,determining that any program is a legal program, otherwise, determining that the program is a malicious program. The system comprises a scanning module, a digital signature verification module and adisk file comparison module. According to the method and the device, the resistance to the malicious programs and the accuracy of malicious program detection can be greatly improved, so that the safety and stability of a virtual machine system are improved.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Game ball system

The invention relates to a game ball system. The game ball system comprises a ball and a ball throw ring matched with the ball for use, wherein the ball throw ring is provided with a first sensing device for sensing that whether the ball passes through the ball throw ring or not; the game ball system further comprises a first signal transmitting and receiving device arranged on the ball throw ring, as well as a second signal transmitting and receiving device and a ball integral display device arranged on the ball, when the first sensing device senses that the ball passes through the ball throw ring, the first signal transmitting and receiving device sends a signal to the second signal transmitting and receiving device, and when the second signal transmitting and receiving device receives the signal from the first signal transmitting and receiving device, the ball integral display device displays the ball throw integral. While realizing the functions of the traditional shooting game machine, the game ball system also supports the automatic integration of the playing methods including one ball shooting multiple baskets, multiple balls shooting one basket, and multiple balls shooting multiple baskets, therefore, the interestingness and competition of the game are enhanced, and the diversified entertainment demands of people are satisfied.
Owner:SUZHOU GUYUEFENG INFORMATION TECH CO LTD

Script detection method and device

The invention provides a script detection method and device. The script detection method and device are applied to a security detection engine adopting a reasoning framework. The safety detection engine is pre-loaded with an inference strategy library; the reasoning strategy library comprises a plurality of reasoning strategies used for reasoning confrontation means adopted by confrontation statements used for confrontation detection and contained in the script to be detected. The method comprises the steps of determining whether a target statement to be executed is a suspected adversarial statement or not in a process of running each statement contained in a script to be detected in a simulated running environment; and if the target statement is the suspected adversarial statement, executing an inference strategy in an inference strategy library, and inferring an adversarial means adopted by the target statement to obtain adversarial information used for describing the adversarial means adopted by the target statement. And correcting a target statement based on the confrontation information, executing the corrected target statement, and further determining whether the target statement is a confrontation statement or not based on an execution result.
Owner:ALIBABA CLOUD COMPUTING LTD

Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack

The invention provides a method and device for establishing a malicious IP address threat intelligence library and preventing a malicious attack, and the method comprises the steps: screening out IP address information of which the page view meets a preset condition in a continuous first time period according to IP address information accessed by an enterprise business system; according to the banning/unbanning information of the IP addresses, screening out the IP addresses of which the difference between the banning moment of the same IP address and the banning moment of the next time is smaller than a preset difference; according to the attack logs of the network attack protection devices, screening out IP addresses contained in the attack logs of all the network attack protection devices in a continuous second time period; according to the access log information of the enterprise e-commerce platform and the banning/unbanning information of the IP addresses, screening out the IP addresses of which the access amount exceeds a predetermined amount in a continuous third time period and which have banning history; and establishing a malicious IP address threat intelligence library according to the screened IP addresses. According to the invention, passivity can be changed into active, the network attack resisting capability of enterprises is improved, and the risk is reduced.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Water gun toy and using method thereof

The invention discloses a water gun toy and a using method thereof. The water gun toy comprises a machine body, a first cavity arranged in the machine body and a second cavity arranged in the machinebody, a first rotating shaft which extends front and back and a second rotating shaft which is position on the right side of the first rotating shaft are rotationally arranged in the second cavity, the tail ends of the front side and the rear side of the first rotating shaft penetrate through the front end wall and the rear end wall of the second cavity and extend out of the machine body to be fixedly provided with first rolling wheels, and first belt wheels which are symmetrical front and back are fixedly installed on the outer surface of the second rotating shaft in the second cavity. According to the water gun toy and the using method thereof, the water gun toy is simple in structure and convenient to operate, through pedaling by an operator, the water gun toy is driven to move, meanwhile, a liquid needing to be sprayed is pressurized, so that the purpose of spraying through the water gun is achieved, meanwhile, a large amount of clean water can be carried by the water gun toy in amore labor-saving mode, the countervailing power of the water gun toy is improved, the water gun toy is convenient to move, moreover, all the working procedures cooperate with one another and do not influence one another, and the practical performance of the water gun toy is improved.
Owner:杭州力松电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products