-
241
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: “…adversarial attacks…”
Get full text
Article -
242
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Published 2013-08-01“…Furthermore, we design two attacker-aware protocols to reroute victim nodes' packets by avoiding the attackers. …”
Get full text
Article -
243
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01“…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
Get full text
Article -
244
Distribution of Corrosion Attack in Chloride Exposed Concrete – Summary of Field Observations
Published 2024-12-01Subjects: Get full text
Article -
245
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
246
Higher P-Wave Dispersion in Migraine Patients with Higher Number of Attacks
Published 2012-01-01“…P WD was positively correlated with P max (P<0.01). Attacks number per month and male gender were the factors related to the P WD (P<0.01). …”
Get full text
Article -
247
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. …”
Get full text
Article -
248
Pixel‐wise supervision for presentation attack detection on identity document cards
Published 2022-09-01“…In this paper, a pixel‐wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. …”
Get full text
Article -
249
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01Subjects: “…low-rate denial of service attack…”
Get full text
Article -
250
Power analysis attack of dynamic password token based on SM3
Published 2017-03-01Subjects: Get full text
Article -
251
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. …”
Get full text
Article -
252
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article -
253
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
254
New related-key rectangle attack on 42-round SHACAL-2
Published 2009-01-01Subjects: Get full text
Article -
255
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01Subjects: Get full text
Article -
256
Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies
Published 2025-01-01Get full text
Article -
257
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
258
DAGUARD: distributed backdoor attack defense scheme under federated learning
Published 2023-05-01Subjects: Get full text
Article -
259
APDL: an adaptive step size method for white-box adversarial attacks
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
260
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01Subjects: Get full text
Article