-
101
Detecting Black-Box Model Probing Attacks Through Probability Scores
Published 2025-01-01“…To facilitate further studies on the black-box model probing attack, we collected the probability score sequences generated by 6 different black-box model probing attacks and released them as an open dataset: <uri>https://www.kaggle.com/datasets/drvoyager/model-probing-attack-dataset</uri>.…”
Get full text
Article -
102
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01“…However, most existing attacks in sentiment analysis have applied a generalized approach to input modifications, without considering the characteristics and objectives of the different analysis levels. …”
Get full text
Article -
103
Stealthy Adversarial Attacks on Machine Learning-Based Classifiers of Wireless Signals
Published 2024-01-01“…We gradually reduce the attacker’s knowledge and study five attack scenarios that represent different amounts of information at the attacker. …”
Get full text
Article -
104
An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network
Published 2015-10-01“…Wireless sensor network is vulnerable to malicious attacks because of the broadcast nature of wireless signal. …”
Get full text
Article -
105
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01“…Aiming at the problem that sybil attack has great harm to block chain technology,a method to improve the PBFT algorithm in the alliance chain to defend against sybil attacks was proposed.Firstly,using the idea of consensus algorithm based on proof of rights and interests,a reputation model was established,the reputation value of each node accorded to the behavior of each node in the consensus process was calculated,and different discourse rights accorded to the size of the reputation value was given.Then pre-commit phase was added to the PBFT algorithm to reduce the number of communication between nodes.The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain,but also make the performance of the blockchain system in terms of TPS and block generation delay.…”
Get full text
Article -
106
Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks
Published 2016-08-01Get full text
Article -
107
A New QIM-Based Watermarking Method Robust to Gain Attack
Published 2014-01-01“…The superiority of the proposed method has been confirmed for different types of popular attacks.…”
Get full text
Article -
108
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
109
STUDY ON FLOW CHARACTERISTICS OF WAVE-SHAPED RODS WITH SPATIAL ANGLE OF ATTACK
Published 2021-01-01Get full text
Article -
110
A Puzzle of Vestibular Physiology in a Meniere’s Disease Acute Attack
Published 2015-01-01“…The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere’s disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere’s disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. …”
Get full text
Article -
111
Pilot spoofing attack detection and channel estimation for secure massive MIMO
Published 2024-11-01“…Abstract Pilot spoofing attack (PSA) is an active eavesdropping attack in massive multiple‐input multiple‐output systems, where the eavesdroppers transmit the same pilot sequence as the legitimate user does to the base station to confuse the normal channel estimation during the uplink channel training phase. …”
Get full text
Article -
112
Durability to Chemical Attack by Acids of Epoxy Microconcretes by Comparison to Cementitious Ones
Published 2016-01-01“…The results show that both microepoxy polymer concretes exhibit better mechanical properties and highest resistance to chemical attack than the microcement concrete.…”
Get full text
Article -
113
An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection
Published 2025-05-01“…Several studies applied different learning methods to detect botnet attacks. …”
Get full text
Article -
114
Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience
Published 2025-07-01“…In contrast to traditional methods, our proposed IDS is highly effective and performs well in identifying DoS and DDoS attacks in VN. …”
Get full text
Article -
115
Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees
Published 2025-03-01“…One of the biggest threats to an organization is the credulity of phishing attacks for its employees. To prevent attacks, employees must maintain cyber security hygiene and increase their awareness of the cyberattack landscape. …”
Get full text
Article -
116
A Survey on Secure WiFi Sensing Technology: Attacks and Defenses
Published 2025-03-01“…Then, we introduce the concept of the core topic of this survey and provide a taxonomy to distinguish different kinds of attack and defense techniques, respectively, that is, active and passive attack techniques as well as active and passive defense techniques. …”
Get full text
Article -
117
Clinical and psychophysiological analysis of panic attacks in patients with various mental diseases
Published 2011-03-01“…The fact that the unilateral approach to studying panic attacks (PA) is unsound has presently become evident in the context of one specialty - neurology or psychiatry.Subjects and methods. …”
Get full text
Article -
118
Adversarial attacks dataset for low light image enhancementMendeley Data
Published 2025-06-01“…This image repository dataset evaluates adversarial robustness by introducing 12 examples, each leveraging a known adversarial attack or noise perturbation. The repository contains a total of 4970 digital images through the application of adversarial examples to five different image databases (i.e., MEF, LIME, LOLv1, LOLv2-R, LOLv2-S) that include pictures of landscapes, objects, or locations with low, normal, or high illumination conditions. …”
Get full text
Article -
119
Presentation Attack Detection using iris periocular visual spectrum images
Published 2024-12-01“…The analysis was carried out by evaluating the performance of five Convolutional Neural Networks (CNN) using both facial and periocular iris images for PAD with two different attack instruments. Additionally, we improved the CNN results by integrating the ArcFace loss function instead of the traditional categorical cross-entropy loss, highlighting that the ArcFace function enhances the performance of the models for both regions of interest, facial and iris periocular areas. …”
Get full text
Article -
120
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Get full text
Article