-
81
Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play
Published 2025-01-01“…Variables analyzed included team performance, attack and defensive performance, goals saved above average (GSAA), goals and possession value (PV), expected goals (xG), and xG on target (xGOT) for attack and defensive phases. …”
Get full text
Article -
82
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. …”
Get full text
Article -
83
Altered Effective Connectivity of the Primary Motor Cortex in Transient Ischemic Attack
Published 2022-01-01“…This study is aimed at exploring alteration in motor-related effective connectivity in individuals with transient ischemic attack (TIA). Methods. A total of 48 individuals with TIA and 41 age-matched and sex-matched healthy controls (HCs) were recruited for this study. …”
Get full text
Article -
84
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: “…adversarial attacks…”
Get full text
Article -
85
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Published 2013-08-01“…Furthermore, we design two attacker-aware protocols to reroute victim nodes' packets by avoiding the attackers. …”
Get full text
Article -
86
Distribution of Corrosion Attack in Chloride Exposed Concrete – Summary of Field Observations
Published 2024-12-01Subjects: Get full text
Article -
87
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
88
Higher P-Wave Dispersion in Migraine Patients with Higher Number of Attacks
Published 2012-01-01“…P WD was positively correlated with P max (P<0.01). Attacks number per month and male gender were the factors related to the P WD (P<0.01). …”
Get full text
Article -
89
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. …”
Get full text
Article -
90
Pixel‐wise supervision for presentation attack detection on identity document cards
Published 2022-09-01“…In this paper, a pixel‐wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. …”
Get full text
Article -
91
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. …”
Get full text
Article -
92
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article -
93
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
94
APDL: an adaptive step size method for white-box adversarial attacks
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
95
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01“… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
Get full text
Article -
96
Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects
Published 2022-01-01“…However, AT usually decreases the model’s accuracy on clean samples and could overfit to a specific attack, inhibiting its ability to generalize to new attacks. …”
Get full text
Article -
97
Dual-Targeted adversarial example in evasion attack on graph neural networks
Published 2025-01-01Subjects: Get full text
Article -
98
Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks
Published 2020-01-01“…We consider an optimal decision problem of the service providers in public mail service systems subject to virus attacks. Two scenarios, i.e., free service systems and payment systems, are investigated in the paper. …”
Get full text
Article -
99
Face presentation attack detection. A comprehensive evaluation of the generalisation problem
Published 2021-07-01“…However, it still needs to increase robustness against imposter attacks. In this regard, face Presentation Attack Detection (face‐PAD) is a key component in providing trustable facial access to digital devices. …”
Get full text
Article -
100
Suspected Transient Ischemic Attack Related to Dysfunctional Quadricuspid Aortic Valve
Published 2025-01-01“…We describe a 30-year-old Caribbean-Black woman with a clinical presentation suggestive of a transient ischemic attack (TIA) with no conventional cerebrovascular risk factors, albeit with a newly diagnosed quadricuspid aortic valve (QAV) with moderate aortic regurgitation (AR). …”
Get full text
Article