-
161
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01“…WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. …”
Get full text
Article -
162
Query recovery attacks against conjunctive keyword searchable encryption
Published 2024-08-01Subjects: Get full text
Article -
163
Generalized Grad-CAM attacking method based on adversarial patch
Published 2021-03-01“…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
Get full text
Article -
164
Dental Trauma following Animal Attack: A Case Report
Published 2025-01-01“…Animal attacks are a common cause of human injuries worldwide, with human-leopard encounters frequently reported in India. …”
Get full text
Article -
165
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01“…If no specific detection mechanisms are established, the attacker could lead many insidious attacks. In this work, we first introduce a new hierarchical distributed algorithm for detecting node replication attacks using a Bloom filter mechanism and a cluster head selection (see also Znaidi et al. (2009)). …”
Get full text
Article -
166
My Pine Is Under Attack—What Should I Do?
Published 2016-05-01“… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
Get full text
Article -
167
Gender differentiation in tactical options in defense and attack on beach handball
Published 2018-12-01“…The aim of the study was to investigate and compare tactical options in both defense and attack between men and women. In 16 games from 2017 European Beach Handball Championship, 1074 attacks and defense situations were analyzed, in order to examine different attack and defense tactics. …”
Get full text
Article -
168
Research of power preprocessing optimization-based template attack on LED
Published 2014-03-01Subjects: Get full text
Article -
169
CAN bus flood attack detection based on communication characteristics
Published 2020-02-01“…CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In order to effectively detect whether the CAN bus is attacked,and to filter malicious messages when subjected to flooding attacks.The characteristics of vehicle CAN bus message communication were analyzed,and an intrusion detection method was proposed,which could effectively perform intrusion detection and malicious message filtering.Through experimental verification,the method can detect whether the CAN bus is attacked by 100%,and the accuracy of malicious packet filtering can reach over 99%.…”
Get full text
Article -
170
An Unusual Cause of Transient Ischemic Attack in a Patient with Pacemaker
Published 2014-01-01“…We present a 77-year-old man with history of atrial fibrillation and pacemaker placement who was admitted for transient ischemic attack. He was on aspirin, beta blocker, and warfarin with subtherapeutic international normalized ratio. …”
Get full text
Article -
171
A survey of attack and defense on human-computer interaction security
Published 2019-10-01Subjects: Get full text
Article -
172
Double adversarial attack against license plate recognition system
Published 2023-06-01Subjects: Get full text
Article -
173
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
Published 2006-01-01Get full text
Article -
174
PCA-based membership inference attack for machine learning models
Published 2022-01-01Subjects: Get full text
Article -
175
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01Subjects: Get full text
Article -
176
Real-time DDoS attack detection based on deep learning
Published 2017-07-01“…Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method included two stages:feature processing and model detection:feature extraction,format conversion and dimension reconstruction of the input data packet was performed in feature processing stage;in the model detection stage,the processed features were input to the depth learning network model to detect whether the input data packets was DDoS attack packet.The model was trained by the ISCX2012 dataset,and the model was validated by real-time DDoS attack.The experimental results show that DDoS attack detection method based on deep learning has high detection precision,little dependency on hardware and software equipment,and the model of depth learning network is easy to update.…”
Get full text
Article -
177
A Method to Attack the FHE Schemes Based on the Hardness of PACDP
Published 2013-03-01Get full text
Article -
178
Importance of Video-EEG Monitoring in the Diagnosis of Refractory Panic Attacks
Published 2013-01-01“…Partial seizures can be misdiagnosed as panic attacks. There is considerable overlap of symptoms between temporal lobe seizures and panic attacks making the diagnosis extremely challenging. …”
Get full text
Article -
179
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
180
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). …”
Get full text
Article