• Publications
  • Influence
SUPERT: Towards New Frontiers in Unsupervised Evaluation Metrics for Multi-Document Summarization
TLDR
This work proposes SUPERT, which rates the quality of a summary by measuring its semantic similarity with a pseudo reference summary, i.e. selected salient sentences from the source documents, using contextualized embeddings and soft token alignment techniques.
Security Analysis on Cyber-physical System Using Attack Tree
TLDR
A risk assessment idea for CPS with the use of attack tree is proposed, which presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat andulnerability vector.
Analysis of security threats and vulnerability for cyber-physical systems
TLDR
This paper presents the security threats in the three layers and lists the vulnerabilities of cyber-physical systems from the three aspects of management and policy, platform and network, and provides some security measures and recommendations for the security threatened in each section.
The Eval4NLP Shared Task on Explainable Quality Estimation: Overview and Results
TLDR
This paper presents the data, annotation guidelines and evaluation setup of the shared task, describes the six participating systems, and analyzes the results of the first shared task on explainable NLP evaluation metrics.
Cyber-physical System Risk Assessment
TLDR
The authors blaze a trail under the new perspective of CPS after breaking the restriction of traditional risk assessment methods and propose a risk assessment idea for CPS.
Integral input-to-state stability for one class of discontinuous dynamical systems
It is well known that integral input-to-state stability (iISS) is weaker than input-to-state stability (ISS). In this paper, iISS problems for one class of discontinuous dynamical systems are
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks
TLDR
A comprehensive description of the wireless sensor network (WSN) and the research on ICS in Europe, focusing on the most important report issued by ENISA, and the efforts of ICS security management in China are described.
Security Testing Methods and Techniques of Industrial Control Devices
TLDR
This paper focuses on security testing of industrial control devices and reviews the existing security certifications in this area, and describes theexisting security standards in this areas.
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges
TLDR
The security evaluation standards for industrial control devices are analyzed, and the corresponding several certifications are compared, and several key testing technologies are proposed.
...
...