Showing 101 - 120 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 101

    Layperson knowledge of heart attacks in the state of Georgia, USA by Shiva Sajja, Thor Stead, Rohan Mangal, Latha Ganti

    Published 2023-09-01
    “…A survey of 200 residents of the state of Georgia, United States was conducted to assess the knowledge of heart attacks. Results depict that Georgia residents have only a basic understanding of heart attack symptoms suggesting the need for medical professionals to spend more time educating their patients on their health in simple terms so that the patients can be knowledgeable on their personal health.…”
    Get full text
    Article
  2. 102
  3. 103

    A Second Preimage Attack on the XOR Hash Combiner by Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang

    Published 2024-01-01
    “…Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.…”
    Get full text
    Article
  4. 104
  5. 105
  6. 106
  7. 107

    RSA-based image recognizable adversarial attack method by Yu ZHANG, Hailiang LI

    Published 2021-10-01
    Subjects: “…adversarial attack…”
    Get full text
    Article
  8. 108
  9. 109
  10. 110

    Blind mask template attacks on masked cryptographic algorithm by Yi WANG, Zhen WU, Bing LIN

    Published 2019-01-01
    Subjects: “…side channel attack…”
    Get full text
    Article
  11. 111
  12. 112

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.…”
    Get full text
    Article
  13. 113
  14. 114
  15. 115

    Intra-Attack Vestibuloocular Reflex Changes in Ménière’s Disease by Dario A. Yacovino, John B. Finlay

    Published 2016-01-01
    “…Ménière’s attack has been shown to temporarily alter the vestibuloocular reflex (VOR). …”
    Get full text
    Article
  16. 116
  17. 117
  18. 118

    Aortic Valve Fibroelastoma Masquerading as Transient Ischaemic Attack by Penelope-Anne Gowland, Ragheb Hasan

    Published 2012-01-01
    “…This patient experienced recurrent transient ischemic attacks (TIAs’). He was taken to theatre on urgent basis to remove the papillary fibroelastoma. …”
    Get full text
    Article
  19. 119

    Differential fault attack on lightweight block cipher Klein by Yong-juan WANG, Quan-yu2 REN, Shi-yi ZHANG

    Published 2016-10-01
    “…As a lightweight block cipher algorithm based on SP structure,Klien has the characteristics of high efficiency and low energy consumption.By analyzing the S-boxes differential propagation path,it was found that under the condi-tion of same input and different difference,the intersection elements were unique,which fall in the intermediate state set corresponds to output difference,and a differential fault attack scheme was proposed.By injecting two different faults in the last round of the algorithm,all the keys of the Klein algorithm can be recovered,and the complexity is negligible.This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure.…”
    Get full text
    Article
  20. 120

    Survey on adversarial attacks and defense of face forgery and detection by Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO

    Published 2023-08-01
    “…Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it is crucial to develop effective detection methods to identify fake videos.In recent years, deep learning technology has made the task of face forgery and detection more accessible.Deep learning-based face forgery methods can generate highly realistic faces, while deep learning-based fake face detection methods demonstrate higher accuracy compared to traditional approaches.However, it has been shown that deep learning models are vulnerable to adversarial examples, which can lead to a degradation in performance.Consequently, games involving adversarial examples have emerged in the field of face forgery and detection, adding complexity to the original task.Both fakers and detectors now need to consider the adversarial security aspect of their methods.The combination of deep learning methods and adversarial examples is thus the future trend in this research field, particularly with a focus on adversarial attack and defense in face forgery and detection.The concept of face forgery and detection and the current mainstream methods were introduced.Classic adversarial attack and defense methods were reviewed.The application of adversarial attack and defense methods in face forgery and detection was described, and the current research trends were analyzed.Moreover, the challenges of adversarial attack and defense for face forgery and detection were summarized, and future development directions were discussed.…”
    Get full text
    Article