Showing 281 - 300 results of 2,541 for search 'different attack', query time: 0.12s Refine Results
  1. 281

    A comprehensive analysis of model poisoning attacks in federated learning for autonomous vehicles: A benchmark study by Suzan Almutairi, Ahmed Barnawi

    Published 2024-12-01
    “…The research objectives are: (1) to assess the vulnerability of Byzantine-robust aggregations against model poisoning attacks; (2) to evaluate the impact of model poisoning attacks using different practical scenarios involving changing the vector perturbations and data distributions across diverse datasets; and (3) to understand the scale of degradation in performance and efficacy during attacks involving malicious clients. …”
    Get full text
    Article
  2. 282

    Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks by Zhiguo SUN, Zhao WANG, Zengmao CHEN, Rongchen SUN

    Published 2023-12-01
    “…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
    Get full text
    Article
  3. 283

    A quantization-coding scheme with variable data rates for cyber-physical systems under DoS attacks by Fang Jin, Long Ma, Chenming Zhao, Qingquan Liu

    Published 2024-12-01
    “…For the different communication status, the information on the plant state is transmitted to the controller by employing a different data rate in order to mitigate the influence of DoS attacks. …”
    Get full text
    Article
  4. 284

    Damage prediction of recycled aggregate concrete under a sulfate attack using the seasonal ARIMA model by Ting Du, Pengyu Qu, Qian Chen, Yue Cheng, Jinghao Chen, Yidong Gan, Benyi Xie

    Published 2025-07-01
    “…The findings indicated that the damage value of RAC defined by the loss of compressive strength under sulfate attack decreased as the fly ash content increased. …”
    Get full text
    Article
  5. 285

    MAS-PD: Transferable Adversarial Attack Against Vision-Transformers-Based SAR Image Classification Task by Boshi Zheng, Jiabin Liu, Yunjie Li, Yan Li, Zhen Qin

    Published 2025-01-01
    “…We compare our method with four traditional adversarial attack techniques across different model architectures, including CNNs and ViTs, using the publicly available MSTAR SAR dataset. …”
    Get full text
    Article
  6. 286
  7. 287

    Improvement of Sybil Attack Detection in Vehicular Ad-Hoc Networks Using Cross-layer and Fuzzy Logic by Mohamadreza Karimi, Rasool Sadeghi

    Published 2024-02-01
    “…In this paper, a cross-layer approach and fuzzy logic method are used to detect the Sybil attacks. The proposed fuzzy logic method has four inputs form different OSI layers: entry time to the network, a number of neighbors, buffer size and signal to noise ratio. …”
    Get full text
    Article
  8. 288

    Molecular Dynamics Simulation of Reinforcing Steel Corrosion when Subjected to Both Chloride Attack and Mechanical Loading by Yidong XU, Jianke FANG, Jiansheng SHEN, Wei CHEN, Ruoyu JIN, Yingying ZHENG, Jianghong MAO, Weiliang JIN

    Published 2020-02-01
    “…This paper describes the corrosion process of reinforcing steel under both chloride attack and mechanical loading. Molecular dynamics simulation is adopted to investigate the evolution process of passive film and oxidation process of reinforcement. …”
    Get full text
    Article
  9. 289

    Systematic Review of Current Approaches and Innovative Solutions for Combating Zero-Day Vulnerabilities and Zero-Day Attacks by Kubra Nilgun Karaca, Aydin Cetin

    Published 2025-01-01
    “…This paper presents a systematic review that focuses on combating zero-day vulnerabilities and zero-day attacks. First, we established a taxonomy of current approaches and solutions for combating security vulnerabilities and cyberattacks. …”
    Get full text
    Article
  10. 290

    Characteristics of Cells from Five Exotic Bamboos after Drywood Termites Incisitermes minor (Hagen) Attack by Niken Subekti, Tsuyoshi Yoshimura

    Published 2015-09-01
    “…These results suggest that all the cellulose microfibrils in five bamboos different characteristics of cell function after drywood termite attack.…”
    Get full text
    Article
  11. 291
  12. 292

    The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers by Hannah Greß, Björn Krüger, Elmar Tischhauser

    Published 2025-03-01
    “…For most of the trackers, the manufacturers put different security measures in place. These include short and user-initiated visibility and connectivity or app-level authentication to limit the attack surface. …”
    Get full text
    Article
  13. 293

    Crack Growth of Aluminum Alloy Sheets Used in Aircraft Wings, Taking into Consideration the Critical Angles of Attack by Shahad Nashat, Fathi Alshamma

    Published 2025-06-01
    “… This study examines the behavior of fatigue crack propagation in aluminum alloy sheets used in aircraft wings, with a particular focus on critical angles of attack (AOA). The widely utilized aluminum alloys 2024-T3 and 7075-T6 were analyzed to determine the effects of varying AOAs, representing normal flight (5°) and takeoff/landing (10°) on crack growth rates. …”
    Get full text
    Article
  14. 294

    Load Probability Density Forecasting Under FDI Attacks Based on Double-Layer LSTM Quantile Regression by Pei Zhao, Jie Zhang, Guang Ling

    Published 2024-12-01
    “…To acquire predicted values under diverse conditional quartiles, the FDI-attacked data of different types were first simulated and then utilized as the training set for the QR-DL-LSTM model. …”
    Get full text
    Article
  15. 295

    Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review by Lanka Chris Sejaphala, Vusimuzi Malele, Francis Lugayizi

    Published 2024-09-01
    “…However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. …”
    Get full text
    Article
  16. 296

    Defending CNN Against FGSM Attacks Using Beta-Based Personalized Activation Functions and Adversarial Training by Hanen Issaoui, Asma Eladel, Ahmed Zouinkhi, Mourad Zaied, Lazhar Khriji, Sarvar Hussain Nengroo

    Published 2024-01-01
    “…However, these models are vulnerable to different types of attacks like adversarial ones, which require attention to the model security and confidentiality. …”
    Get full text
    Article
  17. 297

    Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach by Sultan H. Almotiri

    Published 2024-11-01
    “…This paper adopts the Multi-Criteria Decision Making (MCDM) approach, utilising a fuzzy TOPSIS-based method, with the objective of systematically evaluating resilience in network security, especially against DDoS attacks. The research assesses different security attributes and vulnerabilities to offer actionable insights on how best to strengthen organizational cybersecurity frameworks. …”
    Get full text
    Article
  18. 298

    Beamforming for the Cooperative Non-Orthogonal Multiple Access Transmission with Full-Duplex Relaying with Application to Security Attack by Duckdong Hwang, Sung Sik Nam, Janghoon Yang, Hyoung-Kyu Song

    Published 2025-02-01
    “…In addition to the pure CNOMA relay channel, the proposed beamforming schemes are applied to the security attack case as well, where an unauthorized eavesdropper tries to overhear the CNOMA transmission. …”
    Get full text
    Article
  19. 299

    PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. …”
    Get full text
    Article
  20. 300

    Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments by Seleem Ahmad, Yasmine Elmenshawy, Yasser Osman El Gammal, Hamees Mohamad El-Sheikh, Mohamed Moawad, Ahmed A. Elshami, Mohamed A.R. Elmahdy

    Published 2024-11-01
    “…On the other hand, empirical data from the field indicates that concrete exposed to sulfates may exhibit physical attack-induced surface scaling above. This study aims to study the two different types of local bacteria, (BS) and (BM), with content of 0%, 0.25%, 1%, 2.50%, and 5.00% by cement weight used in this work under curing in sulfate to examine the efficiency of bacterial self-healing of cracks for sustainable concrete in aggressive sulfate attack environments. …”
    Get full text
    Article