-
21
Randomized Purifier Based on Low Adversarial Transferability for Adversarial Defense
Published 2024-01-01“…However, since they require a great number of diffusion steps or sampling steps in purifying attacked images, their computational cost is burdensome. …”
Get full text
Article -
22
Study on the spatiotemporal evolution and prediction of internal porosity in concrete specimens under sulfate attack based on machine learning models
Published 2024-12-01“…The results demonstrated that CT scan analysis and image processing techniques can effectively visualize internal porosity and its spatiotemporal evolution. …”
Get full text
Article -
23
Siamese Denoising Autoencoders for Enhancing Adversarial Robustness in Medical Image Analysis
Published 2025-01-01Get full text
Article -
24
An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis
Published 2020-12-01“…In this paper, a secure deep learning scheme called Metamorphosed Learning (MpLe) is proposed to protect the privacy of images in medical image analysis. An augmented convolutional layer and image morphing are two main components of MpLe scheme. …”
Get full text
Article -
25
Multimodal framework for phishing attack detection and mitigation through behavior analysis using EM-BERT and SPCA-BASED EAI-SC-LSTM
Published 2025-07-01“…Simultaneously, the CSS files and images are obtained from the URL dataset. Then, by utilizing Spherical Principal Component Analysis (SPCA), the features are extracted. …”
Get full text
Article -
26
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
Get full text
Article -
27
-
28
-
29
Implementation of MS Circle Map in Digital Image Encryption
Published 2025-06-01“…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
Get full text
Article -
30
Enhanced Laplace integral transform based image encryption technique and its analysis
Published 2025-08-01Get full text
Article -
31
A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map
Published 2025-06-01“…Abstract Intelligent transport systems (ITS) extensively employ traffic images for traffic flow analysis, accident detection and other tasks. …”
Get full text
Article -
32
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Published 2020-01-01“…In this paper, the security analysis of a color image encryption algorithm based on Hopfield chaotic neural network is given. …”
Get full text
Article -
33
An image encryption algorithm based on multi-layered chaotic maps and its security analysis
Published 2024-12-01“…The efficacy of the method is underlined by its dependence on both original images and secret keys, rendering it resilient against brute force and differential attacks. …”
Get full text
Article -
34
A Backdoor Attack Against LSTM-Based Text Classification Systems
Published 2019-01-01“…Existed research mainly focuses on backdoor attacks in image classification based on CNN, little attention has been paid to the backdoor attacks in RNN. …”
Get full text
Article -
35
Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain
Published 2025-01-01“…Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks. Despite extensive studies on their effects on image classification, adversarial attacks remain largely unexplored in object detection. …”
Get full text
Article -
36
Accuracy is not enough: a heterogeneous ensemble model versus FGSM attack
Published 2024-08-01“…Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). …”
Get full text
Article -
37
ANALYSIS OF NEW CHAOTIC MAP AND PERFORMANCE EVALUATION IN ITS APPLICATION TO DIGITAL COLOR IMAGE ENCRYPTION
Published 2023-09-01“…The results of the encryption and decryption processes were evaluated by several tests such as key sensitivity analysis, histogram analysis, correlation analysis, and image quality analysis. …”
Get full text
Article -
38
Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks
Published 2025-04-01“…We provide a detailed analysis of the photopic conditions required to keep the attacking light source invisible to human observers while effectively disrupting the image, thereby deceiving the DNN. …”
Get full text
Article -
39
Prior Anticoagulation and Risk of Hemorrhagic Transformation in Acute Stroke: A Post Hoc Analysis of the PRODAST Study
Published 2025-02-01“…Still, a considerable number of patients have an acute ischemic stroke or transient ischemic attack despite anticoagulation. In this study, we investigated the association of prior antithrombotic regimens with stroke severity, volume, and hemorrhagic transformation. …”
Get full text
Article -
40
Anterior Lens Curvature Matters in the Course of Primary Angle Closure: An Analysis Based on Ultrasound Biomicroscopic Imaging
Published 2022-01-01“…All patients underwent thorough ophthalmic exams including applanation tonometry, gonioscopy, low-coherence interferometry, and ultrasound biomicroscopic imaging. Based on the panoramic anterior segment images from ultrasound biomicroscopic imaging measurements, the radius of anterior lens curvature (ALR) was calculated using the least-squares curve fitting technique. …”
Get full text
Article