Showing 101 - 120 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 101

    Detecting Black-Box Model Probing Attacks Through Probability Scores by Yongzhi Wang, Ahsan Habib, Likhitha Reddy Kesara, Brahmarshi Jasti, Renjie Hu, Tejasv Singh

    Published 2025-01-01
    “…To facilitate further studies on the black-box model probing attack, we collected the probability score sequences generated by 6 different black-box model probing attacks and released them as an open dataset: <uri>https://www.kaggle.com/datasets/drvoyager/model-probing-attack-dataset</uri>.…”
    Get full text
    Article
  2. 102

    Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models by Monserrat Vázquez-Hernández, Ignacio Algredo-Badillo, Luis Villaseñor-Pineda, Mariana Lobato-Báez, Juan Carlos Lopez-Pimentel, Luis Alberto Morales-Rosales

    Published 2025-01-01
    “…However, most existing attacks in sentiment analysis have applied a generalized approach to input modifications, without considering the characteristics and objectives of the different analysis levels. …”
    Get full text
    Article
  3. 103

    Stealthy Adversarial Attacks on Machine Learning-Based Classifiers of Wireless Signals by Wenhan Zhang, Marwan Krunz, Gregory Ditzler

    Published 2024-01-01
    “…We gradually reduce the attacker&#x2019;s knowledge and study five attack scenarios that represent different amounts of information at the attacker. …”
    Get full text
    Article
  4. 104

    An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network by Yu Jiang, Jie Huang

    Published 2015-10-01
    “…Wireless sensor network is vulnerable to malicious attacks because of the broadcast nature of wireless signal. …”
    Get full text
    Article
  5. 105

    Research on sybil attack in defense blockchain based on improved PBFT algorithm by Yingxu LAI, Zunxu BO, Jing LIU

    Published 2020-09-01
    “…Aiming at the problem that sybil attack has great harm to block chain technology,a method to improve the PBFT algorithm in the alliance chain to defend against sybil attacks was proposed.Firstly,using the idea of consensus algorithm based on proof of rights and interests,a reputation model was established,the reputation value of each node accorded to the behavior of each node in the consensus process was calculated,and different discourse rights accorded to the size of the reputation value was given.Then pre-commit phase was added to the PBFT algorithm to reduce the number of communication between nodes.The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain,but also make the performance of the blockchain system in terms of TPS and block generation delay.…”
    Get full text
    Article
  6. 106
  7. 107

    A New QIM-Based Watermarking Method Robust to Gain Attack by Yevhen Zolotavkin, Martti Juhola

    Published 2014-01-01
    “…The superiority of the proposed method has been confirmed for different types of popular attacks.…”
    Get full text
    Article
  8. 108

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception by Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG

    Published 2022-11-01
    “…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
    Get full text
    Article
  9. 109
  10. 110

    A Puzzle of Vestibular Physiology in a Meniere’s Disease Acute Attack by Marta Martinez-Lopez, Raquel Manrique-Huarte, Nicolas Perez-Fernandez

    Published 2015-01-01
    “…The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere’s disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere’s disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. …”
    Get full text
    Article
  11. 111

    Pilot spoofing attack detection and channel estimation for secure massive MIMO by Delong Liu, Wei Wang, Yang Huang

    Published 2024-11-01
    “…Abstract Pilot spoofing attack (PSA) is an active eavesdropping attack in massive multiple‐input multiple‐output systems, where the eavesdroppers transmit the same pilot sequence as the legitimate user does to the base station to confuse the normal channel estimation during the uplink channel training phase. …”
    Get full text
    Article
  12. 112

    Durability to Chemical Attack by Acids of Epoxy Microconcretes by Comparison to Cementitious Ones by Elhem Ghorbel, Murhaf Haidar

    Published 2016-01-01
    “…The results show that both microepoxy polymer concretes exhibit better mechanical properties and highest resistance to chemical attack than the microcement concrete.…”
    Get full text
    Article
  13. 113

    An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection by G. Suneetha, D.H. Priya

    Published 2025-05-01
    “…Several studies applied different learning methods to detect botnet attacks. …”
    Get full text
    Article
  14. 114

    Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience by Ahmad M. Nagm, Mamdouh Gomaa, Rabih Sbera, Darin Shafek, Ahmed A El-Douh, Ahmed Abdelhafeez, Ahmed E Fakhry

    Published 2025-07-01
    “…In contrast to traditional methods, our proposed IDS is highly effective and performs well in identifying DoS and DDoS attacks in VN. …”
    Get full text
    Article
  15. 115

    Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees by Justinas Rastenis, Simona Ramanauskaitė, Antanas Čenys, Pavel Stefanovič, Asta Radzevičienė

    Published 2025-03-01
    “…One of the biggest threats to an organization is the credulity of phishing attacks for its employees. To prevent attacks, employees must maintain cyber security hygiene and increase their awareness of the cyberattack landscape. …”
    Get full text
    Article
  16. 116

    A Survey on Secure WiFi Sensing Technology: Attacks and Defenses by Xingyu Liu, Xin Meng, Hancong Duan, Ze Hu, Min Wang

    Published 2025-03-01
    “…Then, we introduce the concept of the core topic of this survey and provide a taxonomy to distinguish different kinds of attack and defense techniques, respectively, that is, active and passive attack techniques as well as active and passive defense techniques. …”
    Get full text
    Article
  17. 117

    Clinical and psychophysiological analysis of panic attacks in patients with various mental diseases by N. V. Tuter, N. A. Tyuvina

    Published 2011-03-01
    “…The fact that the unilateral approach to studying panic attacks (PA) is unsound has presently become evident in the context of one specialty - neurology or psychiatry.Subjects and methods. …”
    Get full text
    Article
  18. 118

    Adversarial attacks dataset for low light image enhancementMendeley Data by Axel Martinez, Matthieu Olague, Gustavo Olague, Emilio Hernandez, Julio Cesar Lopez-Arredondo

    Published 2025-06-01
    “…This image repository dataset evaluates adversarial robustness by introducing 12 examples, each leveraging a known adversarial attack or noise perturbation. The repository contains a total of 4970 digital images through the application of adversarial examples to five different image databases (i.e., MEF, LIME, LOLv1, LOLv2-R, LOLv2-S) that include pictures of landscapes, objects, or locations with low, normal, or high illumination conditions. …”
    Get full text
    Article
  19. 119

    Presentation Attack Detection using iris periocular visual spectrum images by Andrés Valenzuela, Juan E. Tapia, Violeta Chang, Christoph Busch

    Published 2024-12-01
    “…The analysis was carried out by evaluating the performance of five Convolutional Neural Networks (CNN) using both facial and periocular iris images for PAD with two different attack instruments. Additionally, we improved the CNN results by integrating the ArcFace loss function instead of the traditional categorical cross-entropy loss, highlighting that the ArcFace function enhances the performance of the models for both regions of interest, facial and iris periocular areas. …”
    Get full text
    Article
  20. 120