scispace - formally typeset
Search or ask a question
Author

Yuan Hong Song

Bio: Yuan Hong Song is an academic researcher. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
Proceedings ArticleDOI
01 May 2022
TL;DR: This work proposes four theoretic models for characterizing the attacker $\mathcal{A}$’s best distinguishing strategies, and develops the corresponding honeyword-generation method for each type of attackers, by using various representative probabilistic password guessing models.
Abstract: Honeywords are decoy passwords associated with each user account to timely detect password leakage. The key issue lies in how to generate honeywords that are hard to be differentiated from real passwords. This security mechanism was first introduced by Juels and Rivest at CCS’13, and has been covered by hundreds of media and adopted in dozens of research domains. Existing research deals with honeywords primarily in an ad hoc manner, and it is challenging to develop a secure honeyword-generation method and well evaluate (attack) it. In this work, we tackle this problem in a principled approach. We first propose four theoretic models for characterizing the attacker $\mathcal{A}$’s best distinguishing strategies, with each model based on a different combination of information available to $\mathcal{A}$ (e.g., public datasets, the victim’s personal information and registration order). These theories guide us to design effective experiments with real-world password datasets to evaluate the goodness (flatness) of a given honeyword-generation method.Armed with the four best attacking theories, we develop the corresponding honeyword-generation method for each type of attackers, by using various representative probabilistic password guessing models. Through a series of exploratory investigations, we show the use of these password models is not straightforward, but requires creative and significant efforts. Both empirical experiments and user-study results demonstrate that our methods significantly outperform prior art. Besides, we manage to resolve several previously unexplored challenges that arise in the practical deployment of a honeyword method. We believe this work pushes the honeyword research towards statistical rigor.

11 citations

Journal ArticleDOI
TL;DR: In this article , a probability undetermined scenario-based sizing model (PUSS model) is proposed for stand-alone hybrid renewable energy system configuration optimization and a multi-objective evolutionary algorithm is used as the problem solver.
Abstract: In recent years, technologies for renewable energy utilization have been booming. Hybrid renewable energy systems (HRESs), integrating multiple energy sources to mitigate the unstable, unpredictable, and intermittent characteristics of a single renewable energy source, have become increasingly popular. However, due to the inherent intermittency and uncertainty of renewable energies, the impact of uncertain factors on the capacity optimization of HRESs needs to be considered. In the traditional scenario-based planning method, when dealing with uncertain factors, the probability corresponding to the scenario is difficult to determine. Furthermore, when applying the robust optimization method, it is difficult to fully use existing data to describe uncertain parameters in the form of intervals. To tackle these difficulties, this study proposes a probability undetermined scenario-based sizing model (PUSS model) for stand-alone HRES configuration optimization and a multi-objective evolutionary algorithm as the problem solver. The solution set obtained by the method covers multiple possible values of scenario probability combinations and can provide decision-makers with an overview of alternatives for HRES sizing under different power supply pressures. Based on the real environment data and load data of a certain place, the proposed model and algorithm are applied to sizing a typical HRES comprising wind generators, solar photovoltaic panels, energy-storage devices, and diesel generators. The experimental results show that the proposed PUSS method is both effective and efficient.

2 citations

Journal ArticleDOI
TL;DR: In this paper, a cat well in Mahudang of Burma on anticline structure zone encountered narrow formation pressure window stratum in the process of drilling with the problem that loss of filtration is serious and the speed of air cutting rises rapidly.
Abstract: As a cat well in Mahudang of Burma on anticline structure zone, YH-1 encountered narrow formation pressure window stratum in the process of drilling with the problem that loss of filtration is serious and the speed of air cutting rises rapidly. Application of drilling liner hanger into cementation, combined with expansive slurry system in well YH-1 has met cementing requirements. Well sections are qualified and sealing sections of high quality amount to 49.4 percent. The field application results display that the usage of drilling liner hanger in narrow formation pressure window well section, associated with appropriate slurry system are able to satisfy well cementation requirements.

2 citations

Journal ArticleDOI
TL;DR: Zhang et al. as discussed by the authors developed a novel eHMI concept that aimed to support pedestrians' risk evaluation by displaying predicted real-time risk levels, and measured pedestrians' road-crossing behavior when they encountered AVs with this e-HMI and manual-driven vehicles (MVs) in the same lane.
Book ChapterDOI
TL;DR: In this article , the authors identify typical pedestrian-vehicle interaction (PVI) scenarios and analyze their constituent elements, and provide a practical method to generate PVI scenarios to support the development and evaluation of eHMI concepts.
Abstract: The emergence of autonomous vehicles has brought new challenges for pedestrian-vehicle interaction (PVI). To facilitate such interactions, many external human-machine interface (eHMI) concepts have been proposed. However, the development and evaluation of these eHMIs should be based on representative PVI scenarios in daily life, which have not been systematically constructed. The goal of this study is to: 1) Identify typical PVI scenarios and analyze their constituent elements; 2) Provide a practical method to generate PVI scenarios to support the development and evaluation of eHMIs. With a literature review and a focus group interview, we concluded four typical sets of PVI scenarios: street-crossing scenarios, starting scenarios, parking scenarios, and following scenarios. After analyzing key elements of these scenarios, we constructed, from the perspective of the human-machine-environment system, a three-dimension scenario analysis framework that consisted of pedestrian, vehicle, and environmental variables. We then used our framework to generate several common or challenging PVI scenarios where eHMIs can play a role and needs to be evaluated. Our work contributes to the development and evaluation of eHMIs in both academia and industry.

Cited by
More filters
Journal ArticleDOI
TL;DR: In this article , the authors proposed a model inversion method that can reconstruct representative samples of the target model's training data based only on the output labels, which requires the least information to succeed and therefore has the best applicability.
Abstract: In a model inversion attack, an adversary attempts to reconstruct the training data records of a target model using only the model’s output. In launching a contemporary model inversion attack, the strategies discussed are generally based on either predicted confidence score vectors, i.e., black-box attacks, or the parameters of a target model, i.e., white-box attacks. However, in the real world, model owners usually only give out the predicted labels; the confidence score vectors and model parameters are hidden as a defense mechanism to prevent such attacks. Unfortunately, we have found a model inversion method that can reconstruct representative samples of the target model’s training data based only on the output labels. We believe this attack requires the least information to succeed and, therefore, has the best applicability. The key idea is to exploit the error rate of the target model to compute the median distance from a set of data records to the decision boundary of the target model. The distance is then used to generate confidence score vectors which are adopted to train an attack model to reconstruct the representative samples. The experimental results show that highly recognizable representative samples can be reconstructed with far less information than existing methods.

3 citations

Journal ArticleDOI
TL;DR: In this article , the authors proposed an optimization approach for sizing a grid-connected hybrid renewable energy system (HRES) that includes photovoltaic, biomass, biogas, and a battery.
Abstract: Adopting hybrid power systems to provide access to clean, reliable, and inexpensive energy is necessary for countries like India to accomplish their goals of sustainable development. This work proposes an optimization approach for sizing a grid‐connected hybrid renewable energy system (HRES) that includes photovoltaic, biomass, biogas, and a battery. In this research, a recently developed Aquila optimization algorithm is utilized to evaluate the optimal size of HRES for a cluster of villages near Sarai Jairam, Agra district, Uttar Pradesh, India using the MATLAB software package. The goal of this optimization approach is to reduce the net present cost for HRES while satisfying the operational constraints, including the reliability of the power supply and maximum utilization of the photovoltaic, biomass, and biogas complementary properties. Initially, three HRES configurations in the off‐grid mode were optimized using the suggested Aquila optimization technique. To confirm the findings, the optimization results for the same models of off‐grid HRES were obtained using the harmony search (HS) and particle swarm optimization (PSO) algorithms. The same algorithms were also used to optimize the grid‐connected SPV/biomass/biogas with the battery model of HRES. Finally, the outcomes from the off‐grid models presented above were compared to the grid‐linked model. The grid‐connected configuration which is obtained by the Aquila optimization approach provides an optimal solution with the least net present cos t (NPC) and minimum cost of energy (COE) when compared with HS and PSO. The optimal grid‐connected HRES includes 235 kW of PV, a 10 kW biogas generator, a 64 kW biomass generator, and a 50.40 kWh battery bank. The overall net present cost and the COE are found to be $547 670 and $0.0768/kWh, respectively.

2 citations

Journal ArticleDOI
TL;DR: In this article , the optimal size of the components of the hybrid energy system is introduced using two methods: the marine predators' algorithm (MPA) and the seagull optimization algorithm (SOA).
Abstract: In this paper, the utility grid is integrated with hybrid photovoltaic (PV)/wind/fuel cells to overcome the unavailability of the grid and the single implementation of renewable energy. The main purpose of this study is smart management of hydrogen storage tanks and power exchange between the hybrid renewable energy and the grid to minimize the total cost of the hybrid system and load uncertainties. PV and wind act as the main renewable energy sources, whereas fuel cells act as auxiliary sources designed to compensate for power variations and to ensure continuous power flow to the load. The grid is considered a backup system that works when hybrid renewable energy and fuel cells are unavailable. In this study, the optimal size of the components of the hybrid energy system is introduced using two methods: the marine predators’ algorithm (MPA) and the seagull optimization algorithm (SOA). The optimal sizing problem is also run accounting for the uncertainty in load demand. The results obtained from the proposed optimization are given with and without uncertainty in load demand. The simulation results of the hybrid system without uncertainty demonstrate the superiority of the MPA compared with SOA. However, in the case of load uncertainty, the simulation results (the uncertainty) are given using the MPA optimization technique with +5%, +10%, and +15% uncertainty in load, which showed that the net present cost and purchase energy are increased with uncertainty.

2 citations

Proceedings ArticleDOI
01 Sep 2022
TL;DR: A new Password hardening (PH) service called PW-Hero is proposed that equips its PH service with an option to terminate its use (i.e., opt-out), and is defined as a suite of protocols that meet desirable properties and build a simple, secure, and efficient instance.
Abstract: As the most dominant authentication mechanism, password-based authentication suffers catastrophic offline password guessing attacks once the authentication server is compromised and the password database is leaked. Password hardening (PH) service, an external/third-party crypto service, has been recently proposed to strengthen password storage and reduce the damage of authentication server compromise. However, all existing schemes are unreliable in that they overlook the important restorable property: PH service opt-out. In existing PH schemes, once the authentication server has subscribed to a PH service, it must adopt this service forever, even if it wants to stop the external/third-party PH service and restore its original password storage (or subscribe to another PH service). To fill the gap, we propose a new PH service called PW-Hero that equips its PH service with an option to terminate its use (i.e., opt-out). In PW-Hero, password authentication is strengthened against offline attacks by adding external secret spices to password records. With the opt-out property, authentication servers can proactively request to end the PH service after successful authentications. Then password records can be securely migrated to their traditional salted hash state, ready for subscription to other PH services. Besides, PW-Hero achieves all existing desirable properties, such as comprehensive verifiability, rate limits against online attacks, and user privacy. We define PW-Hero as a suite of protocols that meet desirable properties and build a simple, secure, and efficient instance. Moreover, we develop a prototype implementation and evaluate its performance, establishing the practicality of our PW-Hero service.

1 citations

Journal Article
TL;DR: The feature of external casing packer and its application in well Tuo 71 is discussed in detail in this article, where five wells were cemented using double setting cement, resulting in low daily production and short period of production.
Abstract: Many Sha 3 and Sha 4 intervals in some faulted blocks of Shengli oil field can be cataloged as high pressure and low permeability reservoir Various completion programs for wells in these reservoir have resulted in different production effects In 8 wells completed in block Tuo 71, five wells were cemented using double setting cement, resulting in low daily production and short period of production Completion with external casing packer features high dally production and long period of production while cementing with filtrate reducing cement slurry system results in medium daily production The feature of external casing packer and its application in well Tuo 71 is discussed in detail in this paper

1 citations