Showing 1 - 20 results of 36 for search 'batch attack', query time: 0.07s Refine Results
  1. 1

    D-BADGE: Decision-Based Adversarial Batch Attack With Directional Gradient Estimation by Geunhyeok Yu, Minwoo Jeon, Hyoseok Hwang

    Published 2024-01-01
    “…Experimental validation across multiple victim models demonstrates that the D-BADGE outperforms existing attack methods, even image-specific and score-based attacks. …”
    Get full text
    Article
  2. 2

    Construction of the content extraction signature scheme based on the thought of the batch scheme by Zixin TANG, Xinyi HUANG

    Published 2018-12-01
    “…The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.…”
    Get full text
    Article
  3. 3

    Research on pairing-free certificateless batch anonymous authentication scheme for VANET by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-11-01
    “…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
    Get full text
    Article
  4. 4

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  5. 5

    Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT by Yonas Kibret Beshah, Surafel Lemma Abebe, Henock Mulugeta Melaku

    Published 2025-01-01
    “…The existing defence technique primarily focuses on batch learning- based DDoS attack detection systems, that are not equipped to handle multiple and unknown adversarial attacks in real time. …”
    Get full text
    Article
  6. 6

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
    Get full text
    Article
  7. 7

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
    Get full text
    Article
  8. 8

    Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach by Yanhan Zhu, Yong Li, Tianyi Wei

    Published 2024-11-01
    “…Experimental results in a white-box environment show that, compared with the traditional JSMA method, BPNT-JSMA not only maintains a high attack success rate but also enhances attack efficiency and improves the stealthiness of the adversarial samples.…”
    Get full text
    Article
  9. 9

    Defending CNN Against FGSM Attacks Using Beta-Based Personalized Activation Functions and Adversarial Training by Hanen Issaoui, Asma Eladel, Ahmed Zouinkhi, Mourad Zaied, Lazhar Khriji, Sarvar Hussain Nengroo

    Published 2024-01-01
    “…This study proposes a defense strategy to improve the insurance of white-box models while minimizing adversarial attacks against Fast Gradient Sign Method (FGSM)-based attacks and tackling the issue of adversarial training to improve their robustness. …”
    Get full text
    Article
  10. 10

    Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2 by SU Binting, FANG He, XU Li

    Published 2025-06-01
    “…To validate the protocol's performance, tests of the batch authentication algorithm were conducted on a QT platform based on the Fedora system, with the batch authentication efficiency for 10, 20, 40, ⋯, 320 vehicles being evaluated. …”
    Get full text
    Article
  11. 11

    Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model by Victoria A. O'Brien, Vittal S. Rao, Rodrigo D. Trevizan

    Published 2024-01-01
    “…Throughout the batch simulations, the CUSUM algorithm detected attacks, with no false positives, in 99.83% of cases, identified the corrupted sensor in 97% of cases, and determined if the attack was positively or negatively biased in 97% of cases.…”
    Get full text
    Article
  12. 12

    A lattice-based anti-quantum privacy-preserving scheme for smart meter by Shaomin Zhang, Tao Li, Yun Sun, Baoyi Wang

    Published 2025-05-01
    “…Moreover, taking advantage of the fact that the lattice-based hard problems cannot be solved in quantum computers, the lattice-based encryption and signature are designed in the scheme to resist quantum attacks. Furthermore, batch verification is designed in the scheme to improve the efficiency of verifying signatures, and multiplication and addition are used in matrices and vectors to reduce the scheme’s computational overhead. …”
    Get full text
    Article
  13. 13

    Two improved content extraction signature schemes by Min WANG, Jin-hua MA, Jiang-hua LIU, Wei WU

    Published 2017-04-01
    “…Motivated by the idea of batch signatures,two variants of content extraction signature schemes based on commit vector and RSA respectively were presented.In the proposed schemes,the efficiency of signing and verification were improved by unifying certain message.The analysis show that the proposed schemes are existentially unforgeable under chosen message attacks in the random oracle model.…”
    Get full text
    Article
  14. 14

    QCAE-QOC-SVM: A hybrid quantum machine learning model for DoS and Fuzzy attack detection on autonomous vehicle CAN bus by Meghana R, Sowmyashree Sakrepatna Ramesha, Adwitiya Mukhopadhyay

    Published 2025-12-01
    “…Results from the experiments show that the QCAE-QOC-SVM model performs better than conventional machine learning (ML), deep learning (DL), and other quantum machine learning (QML) models with an F1 score of 99.43 % when the batches-to-batch size ratio is 7741:31. These findings indicate the possibility of quantum machine learning to significantly improve strong defense mechanisms against cyber-attacks for intelligent transportation systems. …”
    Get full text
    Article
  15. 15

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…By integrating the Federated Learning (FL) framework with cryptographic optimization techniques, FEXGBIDS addresses data silo and security challenges in the vehicular network environment. We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
    Get full text
    Article
  16. 16

    Provably secure certificateless aggregate signature scheme in wireless roaming authentication by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-07-01
    “…Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .…”
    Get full text
    Article
  17. 17

    Provably secure certificateless aggregate signature scheme in wireless roaming authentication by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-07-01
    “…Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .…”
    Get full text
    Article
  18. 18

    Block Encryption LAyer (BELA): Zero-Trust Defense Against Model Inversion Attacks for Federated Learning in 5G/6G Systems by Sunder A. Khowaja, Parus Khuwaja, Kapal Dev, Keshav Singh, Xingwang Li, Nikolaos Bartzoudis, Ciprian R. Comsa

    Published 2025-01-01
    “…This paper proposes a zero-trust based Block Encryption LAyer (BELA) module that provides defense against the model inversion attacks in FL settings. The BELA module mimics the Batch normalization (BN) layer in the deep neural network architecture that considers the random sequence. …”
    Get full text
    Article
  19. 19

    New certificateless aggregate signature scheme with universal designated verifier by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-11-01
    “…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
    Get full text
    Article
  20. 20