Search alternatives:
image » images (Expand Search)
Showing 21 - 40 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 21

    Randomized Purifier Based on Low Adversarial Transferability for Adversarial Defense by Sangjin Park, Yoojin Jung, Byung Cheol Song

    Published 2024-01-01
    “…However, since they require a great number of diffusion steps or sampling steps in purifying attacked images, their computational cost is burdensome. …”
    Get full text
    Article
  2. 22

    Study on the spatiotemporal evolution and prediction of internal porosity in concrete specimens under sulfate attack based on machine learning models by Chun Gong, Dunwen Liu, Kunpeng Cao, Yinghua Jian

    Published 2024-12-01
    “…The results demonstrated that CT scan analysis and image processing techniques can effectively visualize internal porosity and its spatiotemporal evolution. …”
    Get full text
    Article
  3. 23
  4. 24

    An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis by J. Andrew Onesimu, J Karthikeyan

    Published 2020-12-01
    “…In this paper, a secure deep learning scheme called Metamorphosed Learning (MpLe) is proposed to protect the privacy of images in medical image analysis. An augmented convolutional layer and image morphing are two main components of MpLe scheme. …”
    Get full text
    Article
  5. 25

    Multimodal framework for phishing attack detection and mitigation through behavior analysis using EM-BERT and SPCA-BASED EAI-SC-LSTM by Mahmoud Murhej, G. Nallasivan

    Published 2025-07-01
    “…Simultaneously, the CSS files and images are obtained from the URL dataset. Then, by utilizing Spherical Principal Component Analysis (SPCA), the features are extracted. …”
    Get full text
    Article
  6. 26

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Implementation of MS Circle Map in Digital Image Encryption by Ichsani Mursidah, Suryadi MT, Sarifuddin Madenda, Suryadi Harmanto

    Published 2025-06-01
    “…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
    Get full text
    Article
  10. 30
  11. 31

    A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map by Tingyu An, Tao Gao, Ting Chen, Donghua Jiang

    Published 2025-06-01
    “…Abstract Intelligent transport systems (ITS) extensively employ traffic images for traffic flow analysis, accident detection and other tasks. …”
    Get full text
    Article
  12. 32

    On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm by Yingchun Hu, Simin Yu, Zeqing Zhang

    Published 2020-01-01
    “…In this paper, the security analysis of a color image encryption algorithm based on Hopfield chaotic neural network is given. …”
    Get full text
    Article
  13. 33

    An image encryption algorithm based on multi-layered chaotic maps and its security analysis by Erdal Güvenoğlu

    Published 2024-12-01
    “…The efficacy of the method is underlined by its dependence on both original images and secret keys, rendering it resilient against brute force and differential attacks. …”
    Get full text
    Article
  14. 34

    A Backdoor Attack Against LSTM-Based Text Classification Systems by Jiazhu Dai, Chuanshuai Chen, Yufeng Li

    Published 2019-01-01
    “…Existed research mainly focuses on backdoor attacks in image classification based on CNN, little attention has been paid to the backdoor attacks in RNN. …”
    Get full text
    Article
  15. 35

    Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain by Phornphawit Manasut, Md Saleh Ibtasham, Zeynep Yaradanakul, Sepinoud Azimi, Sebastien Lafond, Bogdan Iancu

    Published 2025-01-01
    “…Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks. Despite extensive studies on their effects on image classification, adversarial attacks remain largely unexplored in object detection. …”
    Get full text
    Article
  16. 36

    Accuracy is not enough: a heterogeneous ensemble model versus FGSM attack by Reham A. Elsheikh, M. A. Mohamed, Ahmed Mohamed Abou-Taleb, Mohamed Maher Ata

    Published 2024-08-01
    “…Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). …”
    Get full text
    Article
  17. 37

    ANALYSIS OF NEW CHAOTIC MAP AND PERFORMANCE EVALUATION IN ITS APPLICATION TO DIGITAL COLOR IMAGE ENCRYPTION by Ita Mar'atu Solihat, Suryadi MT, Yudi Satria

    Published 2023-09-01
    “…The results of the encryption and decryption processes were evaluated by several tests such as key sensitivity analysis, histogram analysis, correlation analysis, and image quality analysis. …”
    Get full text
    Article
  18. 38

    Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks by Zvi Stein, Adir Hazan, Adrian Stern

    Published 2025-04-01
    “…We provide a detailed analysis of the photopic conditions required to keep the attacking light source invisible to human observers while effectively disrupting the image, thereby deceiving the DNN. …”
    Get full text
    Article
  19. 39

    Prior Anticoagulation and Risk of Hemorrhagic Transformation in Acute Stroke: A Post Hoc Analysis of the PRODAST Study by Gerrit M. Grosse, Anika Hüsing, Andreas Stang, Nils Kuklik, Marcus Brinkmann, Martin Grond, Jens D. Rollnik, Lars Marquardt, Andrea Kraft, Eckhard Schlemm, Carsten Eggers, Christoph C. Eschenfelder, Christian Weimar, Hans‐Christoph Diener

    Published 2025-02-01
    “…Still, a considerable number of patients have an acute ischemic stroke or transient ischemic attack despite anticoagulation. In this study, we investigated the association of prior antithrombotic regimens with stroke severity, volume, and hemorrhagic transformation. …”
    Get full text
    Article
  20. 40

    Anterior Lens Curvature Matters in the Course of Primary Angle Closure: An Analysis Based on Ultrasound Biomicroscopic Imaging by Tingting Liu, Mengwei Li, Xiaoxiao Chen, Zhenying Jiang, Xiangmei Li, Xinghuai Sun, Jiajian Wang, Yuhong Chen

    Published 2022-01-01
    “…All patients underwent thorough ophthalmic exams including applanation tonometry, gonioscopy, low-coherence interferometry, and ultrasound biomicroscopic imaging. Based on the panoramic anterior segment images from ultrasound biomicroscopic imaging measurements, the radius of anterior lens curvature (ALR) was calculated using the least-squares curve fitting technique. …”
    Get full text
    Article