This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi...This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method.展开更多
Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the hab...Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena.展开更多
A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in ...A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in range dimension,the velocity of the range gate pull-off,and the number of the decoy targets in velocity dimension and the velocity of the Doppler frequency pull-off.Also,the steps to design these parameters are brought out.The rules and design procedure discussed in this paper have important meaning for the choice of the reasonable jamming parameters in the practical applications,which can help to obtain good jamming effect.展开更多
We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency inc...We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency increment across elements. Due to the coupling between the angle and range, a mismatch between the test angle and physical angle occurs when the slant range on which the beam focuses is not equal to the slant range of the real target. In addition, the range of the target can be extracted by sum-difference beam except for time-delay testing, because the beam provides a range resolution in the FDA that cannot be deceived by traditional deceptive jamming. A strategy of using FDA to transmit two pulses with zero and nonzero frequency increments, respectively, is proposed to ensure that the angle of a target can be obtained by FDA. Moreover, the lo- calization performance is examined by analyzing the Cramer-Rao lower bound and detection probability. Effectiveness of the proposed method is confirmed by simulation results.展开更多
In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s decep...In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s deceptive behavior into account which often occurs in RTS game scenarios,resulting in poor recognition results.In order to solve this problem,this paper proposes goal recognition for deceptive agent,which is an extended goal recognition method applying the deductive reason method(from general to special)to model the deceptive agent’s behavioral strategy.First of all,the general deceptive behavior model is proposed to abstract features of deception,and then these features are applied to construct a behavior strategy that best matches the deceiver’s historical behavior data by the inverse reinforcement learning(IRL)method.Final,to interfere with the deceptive behavior implementation,we construct a game model to describe the confrontation scenario and the most effective interference measures.展开更多
Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simpl...Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simple genetic operators. The past two decades saw a lot of successful industrial cases of GA application, and also revealed the urgency of practical theoretic guidance. This paper sets focus on the evolution dynamics of GA based on schema theorem and building block hypothesis (Schema Theory), which we thought would form the basis of profound theory of GA. The deceptive-ness of GA in solving multi-modal optimization problems encoded on {0,1} was probed in detail. First, a series of new concepts are defined mathematically as the schemata containment, schemata compe-tence. Then, we defined the schema deceptiveness and GA deceptive problems based on primary schemata competence, including fully deceptive problem, consistently deceptive problem, chronically deceptive problem, and fundamentally deceptive problem. Meanwhile, some novel propositions are formed on the basis of primary schemata competence. Finally, we use the trap function, a kind of bit unitation function, and a NiH function (needle-in-a-haystack) newly designed by the authors, to dis-play the affections of schema deceptiveness on the searching behavior of GA.展开更多
In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extractin...In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations.展开更多
Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text re...Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text representation called DCWord (Deep Context representation by Word vectors) to deceptive review identification.The basic idea is that since deceptive reviews and truthful reviews are composed by writers without and with real experience on using the online purchased goods or services,there should be different contextual information of words between them.Unlike state-of-the-art techniques in seeking best linguistic features for representation,we use word vectors to characterize contextual information of words in deceptive and truthful reviews automatically.The average-pooling strategy (called DCWord-A) and maxpooling strategy (called DCWord-M) are used to produce review vectors from word vectors.Experimental results on the Spam dataset and the Deception dataset demonstrate that the DCWord-M representation with LR (Logistic Regression) produces the best performances and outperforms state-of-the-art techniques on deceptive review identification.Moreover,the DCWord-M strategy outperforms the DCWord-A strategy in review representation for deceptive review identification.The outcome of this study provides potential implications for online review management and business intelligence of deceptive review identification.展开更多
Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA i...Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA is range-angle-time-dependent transmit beampattern and its underlying properties are continuously revealed in the research.The formulation and exploitation of the transmit diversity with a frequency increment is the fundamental principle,which brings extra degrees-of-freedom(DOFs)in the transmit dimension.As the FDA radar carries additional information in range,it provides more flexibility in signal processing and also brings in new technical issues.This article overviews the state-of-the-art in FDA radar area and its applications,mainly based on the progress in our group.There are two main catalogs in FDA radar area,namely coherent FDA and FDA-MIMO(multiple-input multiple-output)radars.Potential applications including target parameter estimation,ambiguous clutter suppression,and deceptive jammer suppression are discussed.展开更多
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network elem...This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.展开更多
With the continuous development of e-commerce,consumers show increasing interest in posting comments on consumption experience and quality of commodities.Meanwhile,people make purchasing decisions relying on other com...With the continuous development of e-commerce,consumers show increasing interest in posting comments on consumption experience and quality of commodities.Meanwhile,people make purchasing decisions relying on other comments much more than ever before.So the reliability of commodity comments has a significant impact on ensuring consumers’equity and building a fair internet-trade-environment.However,some unscrupulous online-sellers write fake praiseful reviews for themselves and malicious comments for their business counterparts to maximize their profits.Those improper ways of self-profiting have severely ruined the entire online shopping industry.Aiming to detect and prevent these deceptive comments effectively,we construct a model of Multi-Filters Convolutional Neural Network(MFCNN)for opinion spam detection.MFCNN is designed with a fixed-length sequence input and an improved activation function to avoid the gradient vanishing problem in spam opinion detection.Moreover,convolution filters with different widths are used in MFCNN to represent the sentences and documents.Our experimental results show that MFCNN outperforms current state-of-the-art methods on standard spam detection benchmarks.展开更多
Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the ...Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the receiver or through the lack of response of the receiver. Reviewing selected examples, I discuss some of the difficulties in ascribing a model for the mimic. I also discuss how a single animal can have multiple ploys in its armoury of deceptive signals, thus belonging within two or more categories of deceptive signalling. In addition to aggressive mimicry, these may include crypsis or camouflage, mas- querade (mimicry of inanimate objects), and Batesian or protective mimicry. Each of these examples of deception has multiple evolutionary pathways, and some deceptive signals may be more costly to receivers than others, but no single organism is subject to a single selection pressure, leading to the reality that many evolutionary pathways contribute to the diversity we see around us. New technologies are opening new channels of investigation into deceptive signaling in many different sensory modalities, and this is reflected in the recent increase in studies investigating the structure and function of deceptive signals. In turn, these studies are beginning to expose the fascinating complexity of deceptive signaling systems, allowing us to discover the myriad, non-mutually exclusive, solutions that can be selected for to obtain prey展开更多
文摘This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method.
文摘Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena.
基金Sponsored by National Basic Research Program of China (6139001012)
文摘A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in range dimension,the velocity of the range gate pull-off,and the number of the decoy targets in velocity dimension and the velocity of the Doppler frequency pull-off.Also,the steps to design these parameters are brought out.The rules and design procedure discussed in this paper have important meaning for the choice of the reasonable jamming parameters in the practical applications,which can help to obtain good jamming effect.
文摘We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency increment across elements. Due to the coupling between the angle and range, a mismatch between the test angle and physical angle occurs when the slant range on which the beam focuses is not equal to the slant range of the real target. In addition, the range of the target can be extracted by sum-difference beam except for time-delay testing, because the beam provides a range resolution in the FDA that cannot be deceived by traditional deceptive jamming. A strategy of using FDA to transmit two pulses with zero and nonzero frequency increments, respectively, is proposed to ensure that the angle of a target can be obtained by FDA. Moreover, the lo- calization performance is examined by analyzing the Cramer-Rao lower bound and detection probability. Effectiveness of the proposed method is confirmed by simulation results.
文摘In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s deceptive behavior into account which often occurs in RTS game scenarios,resulting in poor recognition results.In order to solve this problem,this paper proposes goal recognition for deceptive agent,which is an extended goal recognition method applying the deductive reason method(from general to special)to model the deceptive agent’s behavioral strategy.First of all,the general deceptive behavior model is proposed to abstract features of deception,and then these features are applied to construct a behavior strategy that best matches the deceiver’s historical behavior data by the inverse reinforcement learning(IRL)method.Final,to interfere with the deceptive behavior implementation,we construct a game model to describe the confrontation scenario and the most effective interference measures.
基金funded by the grant 327-2018-Australian Orchid Foundation-Climate and habitat condition controls on orchid populations-research outcomes associated with a citizen science program.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 69974026).
文摘Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simple genetic operators. The past two decades saw a lot of successful industrial cases of GA application, and also revealed the urgency of practical theoretic guidance. This paper sets focus on the evolution dynamics of GA based on schema theorem and building block hypothesis (Schema Theory), which we thought would form the basis of profound theory of GA. The deceptive-ness of GA in solving multi-modal optimization problems encoded on {0,1} was probed in detail. First, a series of new concepts are defined mathematically as the schemata containment, schemata compe-tence. Then, we defined the schema deceptiveness and GA deceptive problems based on primary schemata competence, including fully deceptive problem, consistently deceptive problem, chronically deceptive problem, and fundamentally deceptive problem. Meanwhile, some novel propositions are formed on the basis of primary schemata competence. Finally, we use the trap function, a kind of bit unitation function, and a NiH function (needle-in-a-haystack) newly designed by the authors, to dis-play the affections of schema deceptiveness on the searching behavior of GA.
文摘In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations.
基金supported in part by National Natural Science Foundation of China under Grant Nos.71932002,61379046,91318302 and 61432001the Innovation Fund Project of Xi'an Science and Technology Program(Special Series for Xi'an University under Grant No.2016CXWL21).
文摘Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text representation called DCWord (Deep Context representation by Word vectors) to deceptive review identification.The basic idea is that since deceptive reviews and truthful reviews are composed by writers without and with real experience on using the online purchased goods or services,there should be different contextual information of words between them.Unlike state-of-the-art techniques in seeking best linguistic features for representation,we use word vectors to characterize contextual information of words in deceptive and truthful reviews automatically.The average-pooling strategy (called DCWord-A) and maxpooling strategy (called DCWord-M) are used to produce review vectors from word vectors.Experimental results on the Spam dataset and the Deception dataset demonstrate that the DCWord-M representation with LR (Logistic Regression) produces the best performances and outperforms state-of-the-art techniques on deceptive review identification.Moreover,the DCWord-M strategy outperforms the DCWord-A strategy in review representation for deceptive review identification.The outcome of this study provides potential implications for online review management and business intelligence of deceptive review identification.
基金This work was supported in part by the National Natural Science Foundation of China(NSFC)(Nos.61931016,62071344 and 61911530246)the Key Laboratory Equipment Advanced Research Fund(No.6142206200210).
文摘Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA is range-angle-time-dependent transmit beampattern and its underlying properties are continuously revealed in the research.The formulation and exploitation of the transmit diversity with a frequency increment is the fundamental principle,which brings extra degrees-of-freedom(DOFs)in the transmit dimension.As the FDA radar carries additional information in range,it provides more flexibility in signal processing and also brings in new technical issues.This article overviews the state-of-the-art in FDA radar area and its applications,mainly based on the progress in our group.There are two main catalogs in FDA radar area,namely coherent FDA and FDA-MIMO(multiple-input multiple-output)radars.Potential applications including target parameter estimation,ambiguous clutter suppression,and deceptive jammer suppression are discussed.
文摘This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.
基金This work is supported by The National Key Research and Development Program of China(2018YFB1800202,2016YFB1000302,SQ2019ZD090149,2018YFB0204301).
文摘With the continuous development of e-commerce,consumers show increasing interest in posting comments on consumption experience and quality of commodities.Meanwhile,people make purchasing decisions relying on other comments much more than ever before.So the reliability of commodity comments has a significant impact on ensuring consumers’equity and building a fair internet-trade-environment.However,some unscrupulous online-sellers write fake praiseful reviews for themselves and malicious comments for their business counterparts to maximize their profits.Those improper ways of self-profiting have severely ruined the entire online shopping industry.Aiming to detect and prevent these deceptive comments effectively,we construct a model of Multi-Filters Convolutional Neural Network(MFCNN)for opinion spam detection.MFCNN is designed with a fixed-length sequence input and an improved activation function to avoid the gradient vanishing problem in spam opinion detection.Moreover,convolution filters with different widths are used in MFCNN to represent the sentences and documents.Our experimental results show that MFCNN outperforms current state-of-the-art methods on standard spam detection benchmarks.
文摘Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the receiver or through the lack of response of the receiver. Reviewing selected examples, I discuss some of the difficulties in ascribing a model for the mimic. I also discuss how a single animal can have multiple ploys in its armoury of deceptive signals, thus belonging within two or more categories of deceptive signalling. In addition to aggressive mimicry, these may include crypsis or camouflage, mas- querade (mimicry of inanimate objects), and Batesian or protective mimicry. Each of these examples of deception has multiple evolutionary pathways, and some deceptive signals may be more costly to receivers than others, but no single organism is subject to a single selection pressure, leading to the reality that many evolutionary pathways contribute to the diversity we see around us. New technologies are opening new channels of investigation into deceptive signaling in many different sensory modalities, and this is reflected in the recent increase in studies investigating the structure and function of deceptive signals. In turn, these studies are beginning to expose the fascinating complexity of deceptive signaling systems, allowing us to discover the myriad, non-mutually exclusive, solutions that can be selected for to obtain prey