Search alternatives:
image » images (Expand Search)
Showing 181 - 200 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 181

    Hardware Trojan vulnerability assessment in digital integrated circuits using learnable classifiers by Hadi Jahanirad, Mohammad Fathi

    Published 2024-07-01
    “…Abstract- In the current distributed integrated circuits (IC) industry, the possibility of adversarial hardware attacks cannot be ignored. Hardware Trojans (HT) attacks may lead to information leakage or failure in security-critical systems. …”
    Get full text
    Article
  2. 182
  3. 183

    Classification and identification of pest, diseases and nutrient deficiency in paddy using layer based EMD phase features with decision tree by A. Pushpa Athisaya Sakila Rani, N. Suresh Singh

    Published 2025-06-01
    “…Multiple layers are then constructed on the leaf image through which features are extracted. The Gray Level Co-occurrence Matrix (GLCM) algorithm and Principal Component Analysis (PCA) are used to extract the global texture features of the leaf image. …”
    Get full text
    Article
  4. 184

    Jasmonic acid-mediated cell wall biosynthesis pathway involved in pepper (Capsicum annuum) defense response to Ralstonia solanacearum by Xinwei Jiang, Xinyi Liu, Bin Chen, Xiaofen Zhang, Yihao Wang, Ting Wang, Sansheng Geng, Biao Zhu, Heshan Du

    Published 2025-07-01
    “…Phytohormone signaling pathways, including those mediated by jasmonic acid (JA), are crucial to plant defense responses against pathogen attacks. Nevertheless, the function of JA in the resistance response of pepper to R. solanacearum is unclear. …”
    Get full text
    Article
  5. 185

    Terror films: The socio-cultural reconstruction of trauma in contemporary Israeli cinema by Yael Ben-Moshe, Tobias Ebbrecht-Hartmann

    Published 2019-06-01
    “… Ben-Moshe Yael, Ebbrecht-Hartmann Tobias, Terror films: The socio-cultural reconstruction of trauma in contemporary Israeli cinema. “Images” vol. XXV, no. 34. Poznań 2019. Adam Mickiewicz University Press. …”
    Get full text
    Article
  6. 186

    Dessiner pour agir : graphisme et politique dans l’espace public by Francesca Cozzolino

    Published 2021-02-01
    “…Starting from an ethnography analysis of series of workshops on graphic creation, initiated following the attacks of January 2015, the text seeks to retrace the origins of the alliance between graphics and politics, embodied in the sixties in France by the collective "Grapus" and the international productions of political murals. …”
    Get full text
    Article
  7. 187
  8. 188

    Higher limbic and basal ganglia volumes in surviving COVID-negative patients and the relations to fatigue by Rakibul Hafiz, Tapan Kumar Gandhi, Sapna Mishra, Alok Prasad, Vidur Mahajan, Xin Di, Benjamin H. Natelson, Bharat B. Biswal

    Published 2022-06-01
    “…Background: Among systemic abnormalities caused by the novel coronavirus, little is known about the critical attack on the central nervous system (CNS). Few studies have shown cerebrovascular pathologies that indicate CNS involvement in acute patients. …”
    Get full text
    Article
  9. 189

    Predicting symptomatic carotid artery plaques with radiomics-based carotid perivascular adipose tissue characteristics: a multicenter, multiclassifier study by Ting Zhao, Guihan Lin, Weiyue Chen, Jianhua Wu, Weiming Hu, Lei Xu, Yongjun Chen, Yang Jing, Lin Shen, Shuiwei Xia, Chenying Lu, Minjiang Chen, Jiansong Ji, Weiqian Chen

    Published 2025-08-01
    “…Methods Patients were categorized into symptomatic and asymptomatic groups based on the presence or absence of acute ischemic stroke or transient ischemic attack in the anterior cerebral circulation within two weeks prior to the CTA examination. …”
    Get full text
    Article
  10. 190

    Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition by Shyamala Devi M, Sundaravadivazhagan Balasubaramanian, Balasubramaniam S, Mohd Asif Shah

    Published 2025-04-01
    “…The RBMCV Flower images are trained with SRB-VGG FCL model, SRB-VGG Dense model and the performance analysis was done. …”
    Get full text
    Article
  11. 191

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  12. 192

    Visual explanation method for reversible neural networks by Xinying MU, Bingbing SONG, Fanxiao LI, Yisen ZHENG, Wei ZHOU, Yunyun DONG

    Published 2023-12-01
    “…The issue of model explainability has gained significant attention in understanding the vulnerabilities and anonymous decision-making processes inherent in deep neural networks (DNN).While there has been considerable research on explainability for traditional DNN, there is a lack of exploration on the operation mechanism and explainability of reversible neural networks (RevNN).Additionally, the existing explanation methods for traditional DNN are not suitable for RevNN and suffer from issues such as excessive noise and gradient saturation.To address these limitations, a visual explanation method called visual explanation method for reversible neural network (VERN) was proposed for RevNN.VERN leverages the reversible property of RevNN and is based on the class-activation mapping mechanism.The correspondence between the feature map and the input image was explored by VERN, allowing for the mapping of classification weights of regional feature maps to the corresponding regions of the input image.The importance of each region for model decision-making was revealed through this process, which generates a basis for model decision-making.Experimental comparisons with other explanation methods on generalized datasets demonstrate that VERN achieves a more focused visual effect, surpassing suboptimal methods with up to 7.80% improvement in average drop (AD) metrics and up to 6.05% improvement in average increase (AI) metrics in recognition tasks.VERN also exhibits an 82.00% level of localization for the maximum point of the heat value.Furthermore, VERN can be applied to explain traditional DNN and exhibits good scalability, improving the performance of other methods in explaining RevNN.Furthermore, through adversarial attack analysis experiments, it is observed that adversarial attacks alter the decision basis of the model.This is reflected in the misalignment of the model’s attention regions, thereby aiding in the exploration of the operation mechanism of adversarial attacks.…”
    Get full text
    Article
  13. 193

    Cellular porosity in dentin exhibits complex network characteristics with spatio-temporal fluctuations. by Lucas Chatelain, Nicolas Tremblay, Elsa Vennat, Elisabeth Dursun, David Rousseau, Aurélien Gourrier

    Published 2025-01-01
    “…Residual errors were classified in 4 topological classes related to fluorescence staining and confocal detection efficiency, instrumental resolution and image processing. Their relative importance was estimated using statistical and physical graph attack simulations in a broad experimental range. …”
    Get full text
    Article
  14. 194

    The Phenomenon of Psychological Operations as a Concept and Discourse (Based on Security Linguistic Cultures of the NATO and the Russian Federation) by Лариса Компанцева

    Published 2020-04-01
    “…To achieve the most plausible results, the following integrated methods have been used: semantic and cognitive analysis – to study deep semantic connotations, which are fundamentally different in the linguistic cultures of the NATO and the Russian Federation; concept analysis – to study the regulatory role of the concept PSYCHOLOGICAL OPERATIONS in interstate relations;discourse analysis – to study the consistently situational institutional discourse of psychological operations as a tool for constructing social reality. …”
    Get full text
    Article
  15. 195

    Phenotypic and genetic characteristics of retinal vascular parameters and their association with diseases by Sofía Ortín Vela, Michael J. Beyeler, Olga Trofimova, Ilaria Iuliani, Jose D. Vargas Quiros, Victor A. de Vries, Ilenia Meloni, Adham Elwakil, Florence Hoogewoud, Bart Liefers, David Presby, Wishal D. Ramdas, Mattia Tomasoni, Reinier Schlingemann, Caroline C. W. Klaver, Sven Bergmann

    Published 2024-11-01
    “…Our analyses provide evidence that large-scale analysis of image-derived vascular phenotypes has sufficient power for obtaining functional and causal insights into the processes modulating the retinal vasculature.…”
    Get full text
    Article
  16. 196
  17. 197

    Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection by Ilhan Firat Kilincer

    Published 2025-06-01
    “…This study proposes the creation of a Comprehensive Layer 2 − IDS (CL2-IDS) dataset for the development of IDS systems utilised in the local network structures of organisations, in conjunction with a hybrid deep learning (DL) model for the detection of attack vectors in the proposed dataset. The proposed hybrid model is obtained by using CNN (Convolutional Neural Networks) and Bi-LSTM (Bidirectional Long Short-Term Memory) models, which are widely used in areas such as image analysis and time series data. …”
    Get full text
    Article
  18. 198

    Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT by Fang Guo, Yulong Gao, Jian Jiang, Xueting Chen, Xiubo Chen, Zhengtao Jiang

    Published 2025-06-01
    “…In addition, it also can resist the double spending attack with the linking user’s signature. Lastly, we provide a security analysis, and it is proven that our ring signature scheme satisfies correctness, anonymity, unforgeability and linkability. …”
    Get full text
    Article
  19. 199

    Preventing Terrorism by Strengthening Community Based Ecosystem in Bali Province by Firstyarinda Valentina Indraswari, Wishnu Mahendra Wiswayana, Arief Setiawan, Krisda Thezza Lourencya Siahaan, Ni Putu Rianti Sukma Nanda

    Published 2022-05-01
    “…It has devastated more than 200 people lives and damage the overall image of Bali as the paradise site in the world and Indonesia as a secure state. …”
    Get full text
    Article
  20. 200