-
281
A comprehensive analysis of model poisoning attacks in federated learning for autonomous vehicles: A benchmark study
Published 2024-12-01“…The research objectives are: (1) to assess the vulnerability of Byzantine-robust aggregations against model poisoning attacks; (2) to evaluate the impact of model poisoning attacks using different practical scenarios involving changing the vector perturbations and data distributions across diverse datasets; and (3) to understand the scale of degradation in performance and efficacy during attacks involving malicious clients. …”
Get full text
Article -
282
Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks
Published 2023-12-01“…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
Get full text
Article -
283
A quantization-coding scheme with variable data rates for cyber-physical systems under DoS attacks
Published 2024-12-01“…For the different communication status, the information on the plant state is transmitted to the controller by employing a different data rate in order to mitigate the influence of DoS attacks. …”
Get full text
Article -
284
Damage prediction of recycled aggregate concrete under a sulfate attack using the seasonal ARIMA model
Published 2025-07-01“…The findings indicated that the damage value of RAC defined by the loss of compressive strength under sulfate attack decreased as the fly ash content increased. …”
Get full text
Article -
285
MAS-PD: Transferable Adversarial Attack Against Vision-Transformers-Based SAR Image Classification Task
Published 2025-01-01“…We compare our method with four traditional adversarial attack techniques across different model architectures, including CNNs and ViTs, using the publicly available MSTAR SAR dataset. …”
Get full text
Article -
286
Weaving a new web: gregarious parasitism in Idris Förster (Hymenoptera: Scelionidae) attacking spider eggs.
Published 2025-01-01Get full text
Article -
287
Improvement of Sybil Attack Detection in Vehicular Ad-Hoc Networks Using Cross-layer and Fuzzy Logic
Published 2024-02-01“…In this paper, a cross-layer approach and fuzzy logic method are used to detect the Sybil attacks. The proposed fuzzy logic method has four inputs form different OSI layers: entry time to the network, a number of neighbors, buffer size and signal to noise ratio. …”
Get full text
Article -
288
Molecular Dynamics Simulation of Reinforcing Steel Corrosion when Subjected to Both Chloride Attack and Mechanical Loading
Published 2020-02-01“…This paper describes the corrosion process of reinforcing steel under both chloride attack and mechanical loading. Molecular dynamics simulation is adopted to investigate the evolution process of passive film and oxidation process of reinforcement. …”
Get full text
Article -
289
Systematic Review of Current Approaches and Innovative Solutions for Combating Zero-Day Vulnerabilities and Zero-Day Attacks
Published 2025-01-01“…This paper presents a systematic review that focuses on combating zero-day vulnerabilities and zero-day attacks. First, we established a taxonomy of current approaches and solutions for combating security vulnerabilities and cyberattacks. …”
Get full text
Article -
290
Characteristics of Cells from Five Exotic Bamboos after Drywood Termites Incisitermes minor (Hagen) Attack
Published 2015-09-01“…These results suggest that all the cellulose microfibrils in five bamboos different characteristics of cell function after drywood termite attack.…”
Get full text
Article -
291
-
292
The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers
Published 2025-03-01“…For most of the trackers, the manufacturers put different security measures in place. These include short and user-initiated visibility and connectivity or app-level authentication to limit the attack surface. …”
Get full text
Article -
293
Crack Growth of Aluminum Alloy Sheets Used in Aircraft Wings, Taking into Consideration the Critical Angles of Attack
Published 2025-06-01“… This study examines the behavior of fatigue crack propagation in aluminum alloy sheets used in aircraft wings, with a particular focus on critical angles of attack (AOA). The widely utilized aluminum alloys 2024-T3 and 7075-T6 were analyzed to determine the effects of varying AOAs, representing normal flight (5°) and takeoff/landing (10°) on crack growth rates. …”
Get full text
Article -
294
Load Probability Density Forecasting Under FDI Attacks Based on Double-Layer LSTM Quantile Regression
Published 2024-12-01“…To acquire predicted values under diverse conditional quartiles, the FDI-attacked data of different types were first simulated and then utilized as the training set for the QR-DL-LSTM model. …”
Get full text
Article -
295
Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review
Published 2024-09-01“…However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. …”
Get full text
Article -
296
Defending CNN Against FGSM Attacks Using Beta-Based Personalized Activation Functions and Adversarial Training
Published 2024-01-01“…However, these models are vulnerable to different types of attacks like adversarial ones, which require attention to the model security and confidentiality. …”
Get full text
Article -
297
Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach
Published 2024-11-01“…This paper adopts the Multi-Criteria Decision Making (MCDM) approach, utilising a fuzzy TOPSIS-based method, with the objective of systematically evaluating resilience in network security, especially against DDoS attacks. The research assesses different security attributes and vulnerabilities to offer actionable insights on how best to strengthen organizational cybersecurity frameworks. …”
Get full text
Article -
298
Beamforming for the Cooperative Non-Orthogonal Multiple Access Transmission with Full-Duplex Relaying with Application to Security Attack
Published 2025-02-01“…In addition to the pure CNOMA relay channel, the proposed beamforming schemes are applied to the security attack case as well, where an unauthorized eavesdropper tries to overhear the CNOMA transmission. …”
Get full text
Article -
299
PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation
Published 2025-01-01“…Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. …”
Get full text
Article -
300
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2024-11-01“…On the other hand, empirical data from the field indicates that concrete exposed to sulfates may exhibit physical attack-induced surface scaling above. This study aims to study the two different types of local bacteria, (BS) and (BM), with content of 0%, 0.25%, 1%, 2.50%, and 5.00% by cement weight used in this work under curing in sulfate to examine the efficiency of bacterial self-healing of cracks for sustainable concrete in aggressive sulfate attack environments. …”
Get full text
Article