Showing 181 - 200 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 181

    Higher accumulation of mitragynine in Mitragyna speciosa (kratom) leaves affected by insect attack. by Nisa Leksungnoen, Tushar Andriyas, Rossarin Tansawat, Pichaya Pongchaidacha, Piyawadi Khaoiam, Thanundorn Thanusuwannasak, Chatchai Ngernsaengsaruay, Chawatat Thanoosing, Suwimon Uthairatsamee

    Published 2025-01-01
    “…Despite this, there remains considerable uncertainty regarding how herbivory attack affects the chemical composition of kratom's leaf metabolome. …”
    Get full text
    Article
  2. 182

    The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message by Bobok I., Kobozieva A., Sokalsky S.

    Published 2022-11-01
    “…The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. …”
    Get full text
    Article
  3. 183

    The influence of set speed on the attack efficacy of the outside hitter in elite male volleyball by Ricardo Franco Lima, Catarina Morais, Gonçalo Arezes, Rui Resende

    Published 2024-09-01
    “… The purpose of this study was twofold: a) to analyze if the set speed can predict the attack efficacy of the outside hitter; and b) if the team level is a predictor of set speed and attack efficacy. …”
    Get full text
    Article
  4. 184
  5. 185

    Evaluation of PPG Feature Values Toward Biometric Authentication Against Presentation Attacks by Shun Hinatsu, Daisuke Suzuki, Hiroki Ishizuka, Sei Ikeda, Osamu Oshiro

    Published 2022-01-01
    “…Several approaches have been proposed to apply PPG to biometric authentication using a wearable device; however, there may be several attacks against PPG-based authentication. One of the attacks is a “presentation attack” (PA), which utilizes the information leakage originating from the various PPG measurement sites on a body. …”
    Get full text
    Article
  6. 186

    Metaheuristic Optimization of Wind Turbine Airfoils with Maximum-Thickness and Angle-of-Attack Constraints by Jinane Radi, Jesús Enrique Sierra-García, Matilde Santos, Carlos Armenta-Déu, Abdelouahed Djebli

    Published 2024-12-01
    “…Specifically, the glide ratio is maximized to capture maximum energy while ensuring specific design parameters, such as maximum thickness or optimal angle of attack. This methodology can obtain results more quickly and with lower computational cost, in addition to integrating these two design parameters into the optimization process, aspects that have been largely neglected in previous works. …”
    Get full text
    Article
  7. 187

    Risk of Stroke or Heart Attack in Mild Cognitive Impairment and Subjective Cognitive Impairment by Michele Lauriola, Luigi Esposito, Grazia D’Onofrio, Filomena Ciccone, Annamaria la Torre, Filomena Addante, Annagrazia Cocomazzi, Leandro Cascavilla, Olga Ariano, Gaetano Serviddio, Antonio Greco

    Published 2024-11-01
    “…A statistically significant difference in the progression to dementia was shown (SCI 3.75%; aMCI-SD 10.43%; aMCI-MD 37%; <i>p</i>-value < 0.001). …”
    Get full text
    Article
  8. 188

    Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models by Xinxin Yue, Zhiyong Zhang, Junchang Jing, Weiguo Wang

    Published 2025-06-01
    “…Initially, we utilize a pre-trained model based on the transformer architecture and fine-tune it on various tasks to serve as a surrogate model. Subsequently, different levels of adversarial attack algorithms are utilized, and the generated adversarial samples are used as transfer samples. …”
    Get full text
    Article
  9. 189

    Cross-representation transferable adversarial examples generation for audio classification by TIAN Zilin, LONG Yunfei, TIAN Ye, ZHANG Liguo

    Published 2025-04-01
    “…The unique property of transferability enables them to deceive black-box deep neural network models. Transfer-based attack methods for audio classification have recently attracted extensive discussion. …”
    Get full text
    Article
  10. 190

    Qualitative modeling and analysis of attack surface for process multi-variant execution software system by Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI

    Published 2022-10-01
    “…Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.…”
    Get full text
    Article
  11. 191

    Attack and Protection Technology of Intelligent Terminals for New Energy Internet Transmission, Transformation, and Distribution by Shengda Wang, Mingming Zhao, Danni Liu, Weijia Su, Song Zhang

    Published 2022-01-01
    “…In order to improve the ability of the new energy Internet to defend against external attacks, the author proposes a dual Markov chain-based FDIA detection method suitable for the new energy Internet. …”
    Get full text
    Article
  12. 192

    A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things by Lanka Chris Sejaphala, Vusimuzi Malele, Francis Lugayizi

    Published 2025-01-01
    “…However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
    Get full text
    Article
  13. 193

    Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks by Mohammadreza Amini, Ghazal Asemian, Burak Kantarci, Cliff Ellement, Melike Erol-Kantarci

    Published 2025-01-01
    “…With the increasing deployment of 5G networks, the vulnerability to malicious interference, such as jamming attacks, has become a significant concern. Detecting such attacks is crucial to ensuring the reliability and security of 5G communication systems Specifically in CAVs. …”
    Get full text
    Article
  14. 194

    Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks by Qazi Emad ul Haq, Muhammad Hamza Faheem, Iftikhar Ahmad

    Published 2024-11-01
    “…Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites. …”
    Get full text
    Article
  15. 195

    Distillation-Based Cross-Model Transferable Adversarial Attack for Remote Sensing Image Classification by Xiyu Peng, Jingyi Zhou, Xiaofeng Wu

    Published 2025-05-01
    “…The DMFAA framework enables the surrogate model to learn knowledge from Mamba, achieving enhanced black-box attack performance across different model architectures. …”
    Get full text
    Article
  16. 196

    Enhancing Adversarial Transferability With Intermediate Layer Feature Attack on Synthetic Aperture Radar Images by Xuanshen Wan, Wei Liu, Chaoyang Niu, Wanjie Lu, Yuanli Li

    Published 2025-01-01
    “…Existing SAR adversarial attack algorithms require access to the network structure, parameters, and training data, which are often inaccessible in real-world scenarios. …”
    Get full text
    Article
  17. 197

    IoTShield: Defending IoT Systems Against Prevalent Attacks Using Programmable Networks by Mah-Rukh Fida, Azza H. Ahmed, Ameer Shakayb Arsalaan

    Published 2025-01-01
    “…This paper presents <monospace>IoTShield</monospace>, a Software Defined Network (SDN) based dual-stage defensive framework, designed to mitigate different flow-based attacks targeting IoT systems. …”
    Get full text
    Article
  18. 198
  19. 199

    Using Reinforcement Learning to Handle the Unintended Lateral Attack in the Intelligent Connected Vehicle Environment by Luoyi Huang, Wanjing Ma, Ling Wang, Kun An

    Published 2023-01-01
    “…It is widely accepted that an unintended lateral attack is inevitable in the intelligent connected vehicle environment. …”
    Get full text
    Article
  20. 200

    Detection of sybil attacks based on periodic ultra wide band distance information in WSN by Yanzhi ZHANG, Xiaoqin YE

    Published 2016-08-01
    “…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
    Get full text
    Article