-
41
Estimation for filtering attacks on QIM watermarks
Published 2007-01-01“…A scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context was presented.Quantization-based watermarking schemes are not robust against linear time invariant(LTI) filtering attacks,on which a multi-band amplitude scaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank was concentrated.First the probability density function(PDF) of the attacked signal was derived.Second,using a simplified approximation of the PDF model,a maximum likelihood(ML) procedure for estimating two-band amplitude scaling factor was proposed.Finally,experiments were performed with synthetic audio signals showing the good performance of the proposed estimation technique under realistic conditions.…”
Get full text
Article -
42
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: “…network attack and defense…”
Get full text
Article -
43
-
44
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Subjects: Get full text
Article -
45
Relieve Adversarial Attacks Based on Multimodal Training
Published 2025-01-01“…This paper explores the role of multimodal training in mitigating the problems caused by adversarial attacks, building on the foundations of deep learning. …”
Get full text
Article -
46
-
47
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack; Concrete; Damage; Finite Element Method; Porous Media.…”
Get full text
Article -
48
Securing guarantee of the blockchain network:attacks and countermeasures
Published 2021-01-01“…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
Get full text
Article -
49
-
50
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: Get full text
Article -
51
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack…”
Get full text
Article -
52
Moving target defense against adversarial attacks
Published 2021-02-01“…Deep neural network has been successfully applied to image classification, but recent research work shows that deep neural network is vulnerable to adversarial attacks.A moving target defense method was proposed by means of dynamic switching model with a Bayes-Stackelberg game strategy, which could prevent an attacker from continuously obtaining consistent information and thus blocked its construction of adversarial examples.To improve the defense effect of the proposed method, the gradient consistency among the member models was taken as a measure to construct a new loss function in training for improving the difference among the member models.Experimental results show that the proposed method can improve the moving target defense performance of the image classification system and significantly reduce the attack success rate against the adversarial examples.…”
Get full text
Article -
53
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
54
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Subjects: Get full text
Article -
55
Impact of Defending Strategy Decision on DDoS Attack
Published 2021-01-01“…Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. …”
Get full text
Article -
56
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…Social engineering is a psychological attack targeting individuals' vulnerabilities, often aimed at employees of targeted organizations. …”
Get full text
Article -
57
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: Get full text
Article -
58
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
59
Survey on adversarial attacks and defenses for object detection
Published 2023-11-01Subjects: Get full text
Article -
60
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article