Showing 1 - 20 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1
  2. 2

    Unknown presentation attack detection against rational attackers by Ali Khodabakhsh, Zahid Akhtar

    Published 2021-09-01
    “…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
    Get full text
    Article
  3. 3
  4. 4

    Attacking Africa's poverty : experience from the ground /

    Published 2006
    View in OPAC
    Book
  5. 5

    Encrypt, sign, attack : a compact introduction to cryptography / by Manz, Olaf

    Published 2022
    View in OPAC
    Book
  6. 6
  7. 7
  8. 8
  9. 9

    Mites That Attack Humans by P.G. Koehler

    Published 1999-05-01
    “… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
    Get full text
    Article
  10. 10
  11. 11

    G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud by Geng Chen, Zhiwen Zhang, Yuanxi Peng, Chunchao Li, Teng Li

    Published 2025-01-01
    “…Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Study of Row Hammer attack by Wenwei WANG, Peishun LIU

    Published 2018-01-01
    “…The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.…”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Algebraic fault attack on PRESENT by Ke-hui WU, Xin-jie ZHAO, Tao WANG, Shi-ze GUO, Hui-ying LIU

    Published 2012-08-01
    Subjects: “…fault attack…”
    Get full text
    Article
  20. 20