Showing 401 - 420 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 401

    Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data by Donik Vrsnak, Marko Subasic, Sven Loncaric

    Published 2025-01-01
    “…These methods target different areas, such as computer vision (CV), natural language processing (NLP), and thus utilize different assumptions about the nature of the input data and the type of backdoor trigger used in the attack. …”
    Get full text
    Article
  2. 402

    Differential parasitism by four species of phorid flies when attacking three worker castes of the leaf-cutting ant Atta laevigata (Smith, 1858). by Maria Lucimar O Souza, Rafael J Oliveira, Danival J Souza, Richard I Samuels, Marcos A L Bragança

    Published 2021-01-01
    “…Certain species of parasitic flies belonging to the Phoridae are known to attack Atta spp. workers foraging along trails, near nest openings used by the ants to supply the colony with plant material, and in the areas where the ants are actively cutting plant material. …”
    Get full text
    Article
  3. 403

    Optical Characteristics of Halogen Lamp for Coronavirus, Tumors, Thrombus and Toothache Treatment by Adi Al A’assam, M. W. Alhamd

    Published 2023-03-01
    “…The effect of reducing the damaged organ cell number and size in different areas of the human body (in case of carcinomas, cerebral thrombosis, heart attacks, damaged chest and cervical vertebrae areas, in case of coronavirus and dental pulpitis) was studied using a halogen lamp. …”
    Get full text
    Article
  4. 404
  5. 405

    Resilience characterization and evaluation model of field area network for the power distribution network by Fang XIAO, Shuyan YANG, Bo WEN, Xiaorong ZHU

    Published 2022-09-01
    “…To analyze the robustness and reliability of field area network (FAN) in the power distribution network, a quantifiable network resilience characterization and evaluation model was proposed.The elasticity indicator was defined from network connectivity, robustness and redundancy, and the total network elasticity was calculated by the weighted sum.The resilience performance of FAN was evaluated by simulating random failures and malicious attacks.A single node failure was simulated and tested to evaluate the difference in network resilience a affected by different node failures and find the weak points of resilience in the network.The elastic characterization and evaluation model was extended to general network topologies, and simulation experiments were carried out using BA scale-free network and ER random network.The experimental results demonstrate the universality of the model.…”
    Get full text
    Article
  6. 406

    Adversarial sample generation algorithm for vertical federated learning by Xiaolin CHEN, Daoguang ZAN, Bingchao WU, Bei GUAN, Yongji WANG

    Published 2023-08-01
    “…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
    Get full text
    Article
  7. 407

    A Blockchain-based federated learning framework for secure aggregation and fair incentives by XiaoHui Yang, TianChang Li

    Published 2024-12-01
    “…However, challenges such as poisoning attacks and free rider attacks underscore the need for advanced security measures. …”
    Get full text
    Article
  8. 408

    CASE OF CORONARY ARTERY SPASM WITH FATAL OUTCOME IN THE EARLY PERIOD AFTER PERCUTANEOUS TRANSLUMINAL CORONARY ANGIOPLASTY OF THE RIGHT CORONARY ARTERY WITH IMPLANTATION OF BARE MET... by Z. G. Tatarintseva, E. D. Kosmacheva, N. E. Tripolskaya

    Published 2021-03-01
    “…On the evening of discharge, the man developed a severe pain attack in the epigastric region and turned to the hospital. …”
    Get full text
    Article
  9. 409

    A Review on the Security of IoT Networks: From Network Layer’s Perspective by Asma Jahangeer, Sibghat Ullah Bazai, Saad Aslam, Shah Marjan, Muhammad Anas, Sayed Habibullah Hashemi

    Published 2023-01-01
    “…RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. …”
    Get full text
    Article
  10. 410

    Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation by Jiaming Wu, Olivia Dizon-Paradis, Sazadur Rahman, Damon L. Woodard, Domenic Forte

    Published 2025-01-01
    “…In previous research, the dynamically obfuscated scan chain (DOSC) was introduced to protect logic-locking keys from scan-based attacks by obscuring test patterns and responses. …”
    Get full text
    Article
  11. 411
  12. 412

    Admission systolic blood pressure and short-term outcomes after dual antiplatelet therapy in patients with minor ischemic stroke or transient ischemic attack by Federico De Santis, Eleonora De Matteis, Lucio D’Anna, Michele Romoli, Tiziana Tassinari, Valentina Saia, Silvia Cenciarelli, Chiara Bedetti, Chiara Padiglioni, Bruno Censori, Valentina Puglisi, Luisa Vinciguerra, Maria Guarino, Valentina Barone, Marialuisa Zedde, Ilaria Grisendi, Marina Diomedi, Maria Rosaria Bagnato, Marco Petruzzellis, Domenico Maria Mezzapesa, Vincenzo Inchingolo, Manuel Cappellari, Cecilia Zivelonghi, Paolo Candelaresi, Vincenzo Andreone, Giuseppe Rinaldi, Alessandra Bavaro, Anna Cavallini, Stefan Moraru, Maria Grazia Piscaglia, Valeria Terruso, Marina Mannino, Alessandro Pezzini, Giovanni Frisullo, Francesco Muscia, Maurizio Paciaroni, Maria Giulia Mosconi, Andrea Zini, Ruggiero Leone, Carmela Palmieri, Letizia Maria Cupini, Michela Marcon, Rossana Tassi, Enzo Sanzaro, Giulio Papiri, Giovanna Viticchi, Daniele Orsucci, Anne Falcou, Simone Beretta, Roberto Tarletti, Patrizia Nencini, Eugenia Rota, Federica Nicoletta Sepe, Delfina Ferrandi, Luigi Caputi, Gino Volpi, Salvatore La Spada, Mario Beccia, Claudia Rinaldi, Vincenzo Mastrangelo, Francesco Di Blasio, Paolo Invernizzi, Giuseppe Pelliccioni, Maria Vittoria De Angelis, Laura Bonanni, Giampietro Ruzza, Emanuele Alessandro Caggia, Monia Russo, Agnese Tonon, Maria Cristina Acciarri, Chiara Di Fino, Cinzia Roberti, Giovanni Manobianca, Gaspare Scaglione, Francesca Pistoia, Alberto Fortini, Antonella De Boni, Alessandra Sanna, Alberto Chiti, Marcella Caggiula, Maela Masato, Massimo Del Sette, Francesco Passarelli, Maria Roberta Bongioanni, Manuela De Michele, Stefano Ricci, Raffaele Ornello, Simona Sacco, Matteo Foschi

    Published 2025-04-01
    “…Background: Elevated baseline systolic blood pressure (SBP) was associated with poor outcomes following dual antiplatelet therapy (DAPT) in patients with non-cardioembolic minor ischemic stroke (MIS) or high-risk transient ischemic attack (TIA) in clinical trials. Objectives: We aimed to assess the impact of admission SBP on the short-term outcomes after DAPT in patients with non-cardioembolic MIS or high-risk TIA. …”
    Get full text
    Article
  13. 413

    Attack rates assessment of the 2009 pandemic H1N1 influenza A in children and their contacts: a systematic review and meta-analysis. by Aharona Glatman-Freedman, Ian Portelli, Susan K Jacobs, Justin I Mathew, Jonathan E Slutzman, Lewis R Goldfrank, Silas W Smith

    Published 2012-01-01
    “…<h4>Conclusion/significance</h4>The consistently higher attack rates of the 2009 pandemic H1N1 influenza A among children, as compared to adults, as well as the magnitude of the difference is important for understanding the contribution of children to disease burden, for implementation of mitigation strategies directed towards children, as well as more precise mathematical modeling and simulation of future influenza pandemics.…”
    Get full text
    Article
  14. 414

    Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack by Zhengquan Luo, Yunlong Wang, Nianfeng Liu, Zilei Wang

    Published 2022-09-01
    “…Abstract Iris presentation attack detection (PAD) is still an unsolved problem mainly due to the various spoof attack strategies and poor generalisation on unseen attackers. …”
    Get full text
    Article
  15. 415

    Differences in pharmacological migraine treatment across different levels of clinical headache care – a cross-sectional study by Mira Pauline Fitzek, Lucas Hendrik Overeem, Marlene Ulrich, Ja Bin Hong, Carolin Luisa Hoehne, Kristin Sophie Lange, Yones Salim, Uwe Reuter, Bianca Raffaelli

    Published 2025-04-01
    “…This study evaluates differences in pharmacological recommendations for acute and preventive migraine treatments across primary, secondary, and tertiary care settings. …”
    Get full text
    Article
  16. 416
  17. 417

    Effect of herbal medicine (Jodeungsan) on migraine: A double-blind randomized clinical trial by Seyoung Kim, Jihye Seo, Cheol-hyun Kim, Hyun-Kyung Sung, Ho-Yeon Go, Woo Sang Jung, Seungwon Kwon, Minjung Kwak, Sangkwan Lee

    Published 2022-12-01
    “…The number of HADs did not significantly differ between the JDS and placebo groups at the end of the study. …”
    Get full text
    Article
  18. 418

    Quantized <italic>l</italic>&#x2082;-<italic>l</italic>&#x221E; Control for Nonlinear Discrete-Time Systems With DoS Attacks by Ying Tian, Ming-Yang Qiao

    Published 2025-01-01
    “…Unknown DoS attacks are defined and modeled in terms of attack frequency and attack duration. …”
    Get full text
    Article
  19. 419

    A 3D Multipath Planning Method for Guided Vehicles Using Improved A∗ Algorithm Based on Multiple Avoidance Tactics and Terminal Attack Angles by Jun Huang, Pengfei Wu, Xiaobao Li, Yue Liu

    Published 2025-01-01
    “…The criteria used to measure multipath planning effectiveness include path length, path smoothness, avoidance capability, terminal attack angle settablity, and search time. Simulation results in two attack situations, three different degrees of freedom modes and 10 real-world scenarios demonstrate that the improved A∗ search algorithm has higher efficiency and better performance than classical algorithms. …”
    Get full text
    Article
  20. 420

    A Kinematic Analysis of Upper Extremity Joint when Punching by Three Different Methods in Athletes of Different Skill Levels by Morteza Madadi Shad, Nader Farahpour

    Published 2017-03-01
    “…As, a reciprocal effect exist between the factors of different skill level and punching technique.…”
    Get full text
    Article