Search alternatives:
image » images (Expand Search)
Showing 41 - 60 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 41
  2. 42

    Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning by CAI Jun, HUANG Tianqiang, ZHENG Aokun, YE Feng, XU Chao

    Published 2025-02-01
    “…The meta-learning attack module enabled precise makeup processing, by which the target face's features were embedded into the makeup to create adversarial makeup images. …”
    Get full text
    Article
  3. 43

    FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM by Kobozeva A.A., Melnik M.A.

    Published 2013-04-01
    “…The main mathematical tool is a matrix analysis. As the container is considered a digital image. …”
    Get full text
    Article
  4. 44

    Effective defense against physically embedded backdoor attacks via clustering-based filtering by Mohammed Kutbi

    Published 2025-04-01
    “…Abstract Backdoor attacks pose a severe threat to the integrity of machine learning models, especially in real-world image classification tasks. …”
    Get full text
    Article
  5. 45

    Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach by Bambang Krismono Triwijoyo, Ahmat Adil, Muhammad Zulfikri

    Published 2025-01-01
    “…The next step is the image analysis process, which involves extracting retinal blood vessels using the Otsu segmentation algorithm. …”
    Get full text
    Article
  6. 46

    Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal

    Published 2025-01-01
    “…Robustness analysis was conducted on various image quality variation scenarios that includes compression level, resolution and noise tolerance. …”
    Get full text
    Article
  7. 47

    A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses by Chian Hui Lee, King Hann Lim, Sivaraman Eswaran

    Published 2025-04-01
    “…It demonstrates HE’s versatility in securing electronic health records (EHRs), enabling privacy-preserving genomic data analysis, protecting medical imaging, facilitating privacy-preserving machine learning (ML), supporting secure federated learning, ensuring confidentiality in clinical trials, and enhancing remote monitoring and telehealth services. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50

    Salient object detection dataset with adversarial attacks for genetic programming and neural networksMendeley Data by Matthieu Olague, Gustavo Olague, Roberto Pineda, Gerardo Ibarra-Vazquez

    Published 2024-12-01
    “…Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers' attacks. This dataset is an image repository containing five different image databases to evaluate adversarial robustness by introducing 12 adversarial examples, each leveraging a known adversarial attack or noise perturbation. …”
    Get full text
    Article
  11. 51
  12. 52

    Distinguishing stroke from transient ischemic attack using plaque characteristics and arterial transit artifacts by Ling Li, Peichun Pan, Na Zhang, Yu Wen, Min Tang, Kai Ai, Xiaoling Zhang, Xiaoyan Lei, Xuejiao Yan

    Published 2025-03-01
    “…PurposeWe aimed to investigate the differences in plaque characteristics and hemodynamics in patients with ischemic stroke and transient ischemic attack (TIA), comparing the diagnostic abilities of high-resolution magnetic resonance imaging (HRMRI) and arterial spin labeling (ASL) for ischemic stroke.MethodsThis retrospective analysis included patients who underwent HRMRI and ASL between October 2020 and December 2023. …”
    Get full text
    Article
  13. 53
  14. 54

    Three-Dimensional Image Analysis and Training Method of Action Characteristics of Sanda Whip Leg Technique Based on Wavelet Transform by Lei Song

    Published 2022-01-01
    “…Based on this, this paper attempts to use the three-dimensional image analysis system and surface electromyography acquisition system from the perspective of wavelet transform to collect the speed of the attacking leg movement and the parameters related to muscle discharge and to quantitatively analyze and evaluate its movements. …”
    Get full text
    Article
  15. 55
  16. 56
  17. 57

    Artificial Intelligence on Journalism: Algorithmic Power Targeting the Crack in Memory in the Example of ‘Religious Wave’ Terrorist Attacks by Fikriye Çelik

    Published 2024-11-01
    “…In this study, which aims to point out the risks of AI news in the context of memory distortion, the ‘religious wave’ terrorist attacks are taken into consideration. Critical discourse analysis was used in this research conducted on a sample of the ChatGPT’s news regarding 9/11, 7/7, 2015 Paris and Christchurch attacks. …”
    Get full text
    Article
  18. 58

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The hybrid model was tested and evaluated based on open-source Sunburst attacks. The results demonstrate the effectiveness and robustness of the suggested hybrid DNN model. …”
    Get full text
    Article
  19. 59

    Multiple color images security by SPN over the residue classes of Gaussian integer $$\:Z{\left[i\right]}_{h}$$ by Muhammad Sajjad, Tariq Shah, Rafik Hamza, Bander Almutairi, Robinson Julian Serna

    Published 2025-02-01
    “…The analysis of outcomes proves the efficiency of the developed method; the viability of its application for multi-image encryption with high entropy, low correlation and increased resistance to a variety of attacks. …”
    Get full text
    Article
  20. 60

    A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD by Musrrat Ali, Chang Wook Ahn, Millie Pant, Patrick Siarry

    Published 2016-01-01
    “…To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. …”
    Get full text
    Article