-
101
Layperson knowledge of heart attacks in the state of Georgia, USA
Published 2023-09-01“…A survey of 200 residents of the state of Georgia, United States was conducted to assess the knowledge of heart attacks. Results depict that Georgia residents have only a basic understanding of heart attack symptoms suggesting the need for medical professionals to spend more time educating their patients on their health in simple terms so that the patients can be knowledgeable on their personal health.…”
Get full text
Article -
102
Grey evaluation model and algorithm of network attack effectiveness
Published 2009-01-01Subjects: “…attack effectiveness…”
Get full text
Article -
103
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.…”
Get full text
Article -
104
Chosen message attacks method against ECC implementations
Published 2014-05-01Subjects: Get full text
Article -
105
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: Get full text
Article -
106
Phishing attacks discovery based on HTML layout similarity
Published 2016-10-01Subjects: Get full text
Article -
107
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: “…adversarial attack…”
Get full text
Article -
108
Optimal path identification to defend against DDoS attacks
Published 2008-01-01Subjects: Get full text
Article -
109
Survey of attack graph based network security metric
Published 2018-09-01Subjects: Get full text
Article -
110
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01Subjects: “…side channel attack…”
Get full text
Article -
111
Improved Cache trace driven attack on AES and CLEFIA
Published 2011-01-01Subjects: Get full text
Article -
112
Attacks on One Designated Verifier Proxy Signature Scheme
Published 2012-01-01“…But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.…”
Get full text
Article -
113
Chosen-key extracting attack to random LSB steganography
Published 2010-01-01Subjects: Get full text
Article -
114
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: Get full text
Article -
115
Intra-Attack Vestibuloocular Reflex Changes in Ménière’s Disease
Published 2016-01-01“…Ménière’s attack has been shown to temporarily alter the vestibuloocular reflex (VOR). …”
Get full text
Article -
116
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
117
Research on the risk adjacency matrix based on attack graphs
Published 2011-01-01Subjects: Get full text
Article -
118
Aortic Valve Fibroelastoma Masquerading as Transient Ischaemic Attack
Published 2012-01-01“…This patient experienced recurrent transient ischemic attacks (TIAs’). He was taken to theatre on urgent basis to remove the papillary fibroelastoma. …”
Get full text
Article -
119
Differential fault attack on lightweight block cipher Klein
Published 2016-10-01“…As a lightweight block cipher algorithm based on SP structure,Klien has the characteristics of high efficiency and low energy consumption.By analyzing the S-boxes differential propagation path,it was found that under the condi-tion of same input and different difference,the intersection elements were unique,which fall in the intermediate state set corresponds to output difference,and a differential fault attack scheme was proposed.By injecting two different faults in the last round of the algorithm,all the keys of the Klein algorithm can be recovered,and the complexity is negligible.This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure.…”
Get full text
Article -
120
Survey on adversarial attacks and defense of face forgery and detection
Published 2023-08-01“…Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it is crucial to develop effective detection methods to identify fake videos.In recent years, deep learning technology has made the task of face forgery and detection more accessible.Deep learning-based face forgery methods can generate highly realistic faces, while deep learning-based fake face detection methods demonstrate higher accuracy compared to traditional approaches.However, it has been shown that deep learning models are vulnerable to adversarial examples, which can lead to a degradation in performance.Consequently, games involving adversarial examples have emerged in the field of face forgery and detection, adding complexity to the original task.Both fakers and detectors now need to consider the adversarial security aspect of their methods.The combination of deep learning methods and adversarial examples is thus the future trend in this research field, particularly with a focus on adversarial attack and defense in face forgery and detection.The concept of face forgery and detection and the current mainstream methods were introduced.Classic adversarial attack and defense methods were reviewed.The application of adversarial attack and defense methods in face forgery and detection was described, and the current research trends were analyzed.Moreover, the challenges of adversarial attack and defense for face forgery and detection were summarized, and future development directions were discussed.…”
Get full text
Article