Showing 41 - 60 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 41

    Estimation for filtering attacks on QIM watermarks by WANG Jin-shen, DAI Yue-wei, WANG Zhi-quan

    Published 2007-01-01
    “…A scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context was presented.Quantization-based watermarking schemes are not robust against linear time invariant(LTI) filtering attacks,on which a multi-band amplitude scaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank was concentrated.First the probability density function(PDF) of the attacked signal was derived.Second,using a simplified approximation of the PDF model,a maximum likelihood(ML) procedure for estimating two-band amplitude scaling factor was proposed.Finally,experiments were performed with synthetic audio signals showing the good performance of the proposed estimation technique under realistic conditions.…”
    Get full text
    Article
  2. 42

    Mechanism and implementation of Rootkit attack and defense by Fujuan LI, Qun WANG

    Published 2018-12-01
    Subjects: “…network attack and defense…”
    Get full text
    Article
  3. 43
  4. 44
  5. 45

    Relieve Adversarial Attacks Based on Multimodal Training by Lai Hongjie

    Published 2025-01-01
    “…This paper explores the role of multimodal training in mitigating the problems caused by adversarial attacks, building on the foundations of deep learning. …”
    Get full text
    Article
  6. 46
  7. 47

    Damage modelling in concrete subject to sulfate attack by N. Cefis, C. Comi

    Published 2014-07-01
    Subjects: “…Sulfate attack; Concrete; Damage; Finite Element Method; Porous Media.…”
    Get full text
    Article
  8. 48

    Securing guarantee of the blockchain network:attacks and countermeasures by Peipei JIANG, Qian WANG, Yanjiao CHEN, Qi LI, Chao SHEN

    Published 2021-01-01
    “…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
    Get full text
    Article
  9. 49
  10. 50
  11. 51

    Damage modelling in concrete subject to sulfate attack by N. Cefis, C. Comi

    Published 2014-07-01
    Subjects: “…Sulfate attack…”
    Get full text
    Article
  12. 52

    Moving target defense against adversarial attacks by Bin WANG, Liang CHEN, Yaguan QIAN, Yankai GUO, Qiqi SHAO, Jiamin WANG

    Published 2021-02-01
    “…Deep neural network has been successfully applied to image classification, but recent research work shows that deep neural network is vulnerable to adversarial attacks.A moving target defense method was proposed by means of dynamic switching model with a Bayes-Stackelberg game strategy, which could prevent an attacker from continuously obtaining consistent information and thus blocked its construction of adversarial examples.To improve the defense effect of the proposed method, the gradient consistency among the member models was taken as a measure to construct a new loss function in training for improving the difference among the member models.Experimental results show that the proposed method can improve the moving target defense performance of the image classification system and significantly reduce the attack success rate against the adversarial examples.…”
    Get full text
    Article
  13. 53

    Template attack of Crypto chip based on clustering by Zhen WU, Zhibo DU, Min WANG, Chunling XIANG

    Published 2018-08-01
    Subjects: “…side channel attack…”
    Get full text
    Article
  14. 54
  15. 55

    Impact of Defending Strategy Decision on DDoS Attack by Chunming Zhang

    Published 2021-01-01
    “…Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. …”
    Get full text
    Article
  16. 56

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…Social engineering is a psychological attack targeting individuals' vulnerabilities, often aimed at employees of targeted organizations. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59
  20. 60

    Research progress in code reuse attacking and defending by Xiangdong QIAO, Rongxiao GUO, Yong ZHAO

    Published 2018-03-01
    “…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
    Get full text
    Article