-
1001
Le lieutenant Camille Pierre, un passeur des innovations criminalistiques policières dans les pratiques judiciaires des gendarmes à la Belle Époque
Published 2017-11-01“…One of these processes was the attacker’s physical description, also known as the “speaking portrait” expected to enable the police to perfectly identify someone whose face features would have been carefully described through this very process. …”
Get full text
Article -
1002
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…The existing CP-ABPRE schemes were proven secure only in the selective security model, a limited model, which is an unnatural constraint on the attacker. The scheme proved in this model can only be called selectively secure one. …”
Get full text
Article -
1003
One-Time Broadcast Encryption Schemes in Distributed Sensor Networks
Published 2012-03-01“…This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. Furthermore, an attacker in this environment is powerful. He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient. …”
Get full text
Article -
1004
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01“…The proposed scheme is proved through security evaluation and performance analysis to effectively resist various types of attacks such as replay, spoofing, tampering, known key, known specific session temporary information attack, etc., with multiple security attributes, small computation and communication cost.…”
Get full text
Article -
1005
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
Published 2024-01-01“…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
Get full text
Article -
1006
Passive biometric electronic lock via UHF RFID
Published 2021-04-01“…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
Get full text
Article -
1007
Robustness of Big Language Modeling in Finance
Published 2025-01-01“…It is shown that an attacker can trigger the model illusion of a large language model through an adversarial attack to reduce the reliability of the large language model. …”
Get full text
Article -
1008
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01“…However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. …”
Get full text
Article -
1009
Copyright protection algorithm based on differential privacy deep fake fingerprint detection model
Published 2022-09-01“…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
Get full text
Article -
1010
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
1011
Copyright protection of deep image classification models
Published 2023-12-01“…The conducted series of attacks on protected models show that attempts of an attacker to completely remove the watermark will almost inevitably lead to a significant loss in the model prediction quality. …”
Get full text
Article -
1012
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network
Published 2020-01-01“…It is likely to be abused by the malicious attacker to conceal his/her true identity. Existing forensic detection methods are no longer effective for weakly pitch-shifted voice. …”
Get full text
Article -
1013
Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
Published 2022-01-01“…The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. …”
Get full text
Article -
1014
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01“…Finally, the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism. Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
Get full text
Article -
1015
Searchable encryption scheme based on attribute policy hiding in a cloud environment
Published 2022-04-01“…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
Get full text
Article -
1016
Password strength verification based on machine learning algorithms and LSTM recurrent neural networks
Published 2023-08-01“…One of the most commonly used authentication methods in computer systems, password authentication is susceptible to various attacks including brute-force and dictionary attacks. …”
Get full text
Article -
1017
Hybrid Botnet Detection Based on Host and Network Analysis
Published 2020-01-01“…The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. …”
Get full text
Article -
1018
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
1019
University proceedings. Volga region. Social sciences
Published 2024-11-01“…Therefore, the aim of the study was to find new approaches to organizing and conducting classes on tactical and spe-cial training of the personnel of the Internal Affairs Directorate, including abandoning the principle of causing the least harm to the attacker, in the event of an armed attack on a In-ternal Affairs Directorate facility, taking into account, within the framework of tactical and special training, certain training elements used in the Armed Forces. …”
Article -
1020
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. …”
Get full text
Article