Showing 181 - 200 results of 416 for search 'error attacks', query time: 0.10s Refine Results
  1. 181

    Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems. by Dinh Van Linh, Vu Van Yem, Hoang Thi Phuong Thao

    Published 2025-01-01
    “…The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. …”
    Get full text
    Article
  2. 182

    Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier by Atef Ibrahim, Fayez Gebali

    Published 2025-02-01
    “…The method of implementing field multiplication operation significantly influences the system’s resilience against side-channel attacks; for instance, implementation using unidirectional systolic array structures can provide enhanced error detection capabilities, improving resistance to side-channel attacks compared to traditional bidirectional multipliers. …”
    Get full text
    Article
  3. 183

    Blindfolded Flight: A Novel Approach for Secure Drone Flight by Kazumasa Oida, Tomoya Korezawa, Taiki Yamada, Sojiro Eto

    Published 2025-01-01
    “…The system demonstrates no tendency for prediction error to increase over time during the 360-second flight, regardless of the presence of GPS spoofing attacks.…”
    Get full text
    Article
  4. 184

    Inter-team variability in game play under critical game scenarios: a study in high-level men’s volleyball using social network analysis (Variabilidad entre equipos en el juego baj... by João Bernardo Martins, José Afonso, Ademilson Mendes, Letícia Santos, Isabel Mesquita

    Published 2022-01-01
    “…After one error in attack, most teams presented a game style characterized by strong attacks, although Russia played using exploration of the block. …”
    Get full text
    Article
  5. 185

    Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain by Manish Kumar, Aneesh Sreevallabh Chivukula, Gunjan Barua

    Published 2025-01-01
    “…The robustness against key sensitivity, noise, cropping attacks, and adversarial attacks are shown in Figs. 15–18, 22–23, and 24. …”
    Get full text
    Article
  6. 186

    A Novel Method for Screening the PMU Phase Angle Difference Data Based on Hyperplane Clustering by Ancheng Xue, Shuang Leng, Yecheng Li, Feiyang Xu, Kenneth E. Martin, Jingsong Xu

    Published 2019-01-01
    “…Field data can suffer from errors, such as time synchronization error, transducer error, PMU algorithm error, hardware error or malicious attacks, etc. …”
    Get full text
    Article
  7. 187

    Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection by Rodrigo Eduardo Arevalo-Ancona, Manuel Cedillo-Hernandez

    Published 2025-06-01
    “…Experimental results demonstrate the robustness of the proposed method against geometric distortions, common signal processing attacks, and combined attacks, achieving bit error rates below 0.005 and normalized correlation values close to or equal to 1. …”
    Get full text
    Article
  8. 188

    U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition by Mohammad Mogharen Askarin, Min Wang, Xuefei Yin, Xiuping Jia, Jiankun Hu

    Published 2025-02-01
    “…By applying the proposed method, the fingerprint recognition Equal Error Rate (EER) in experiment A and B improved from 41.32% and 41.97% to 13.96 and 12.49%, respectively, over the public dataset.…”
    Get full text
    Article
  9. 189

    Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities by Mudita Uppal, Yonis Gulzar, Deepali Gupta, Jayant Uppal, Mukesh Kumar, Shilpa Saini

    Published 2025-02-01
    “…Abstract The world is at peak of fifth-generation communication technology and adopting ideas like cloudification or virtualization, but, the most important element is still “security”, since more and more data is connected to the internet. Threat attacks are increasing in recent years, but classic network intrusion detection system has significant limitations that make it challenging to identify new attacks quickly. …”
    Get full text
    Article
  10. 190

    Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images by A. M. Molaei, M. H. Sedaaghi, H. Ebrahimnezhad

    Published 2017-06-01
    “…The simulation results show that the proposed algorithm is also able to retrieve destroyed data by intentional or unintentional attacks such as addition of noise and filtering due to use of the error correction code. …”
    Get full text
    Article
  11. 191

    Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh by Amine Benhfid, El Bachir Ameur, Youssef Taouil

    Published 2020-09-01
    “…Secret data is hidden in the error between the cover and interpolated pixels. …”
    Get full text
    Article
  12. 192

    Semi-local Time sensitive Anonymization of Clinical Data by Freimut Gebhard Herbert Hammer, Mateusz Buglowski, André Stollenwerk

    Published 2024-12-01
    “…The approach protects against linking- and distribution attacks by providing k-anonymity and t-closeness. …”
    Get full text
    Article
  13. 193

    An Extensive Analysis on Optimized 3D Watermarking Using Enhanced Clustering Techniques by G. Julie Sharine, L. Jani Anbarasi

    Published 2024-01-01
    “…To test the robustness of the watermark, common attacks and geometric attacks are applied to the watermarked models. …”
    Get full text
    Article
  14. 194

    An improving secure communication using multipath malicious avoidance routing protocol for underwater sensor network by Vignesh Prasanna Natarajan, Senthil Jayapal

    Published 2024-12-01
    “…The characteristics of UWSN with underwater channels make them vulnerable to malicious attacks. UWSN communication networks are particularly susceptible to malicious attacks owing to high bit error rates, significant propagation delay variations, and low bandwidth. …”
    Get full text
    Article
  15. 195

    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map by Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan

    Published 2022-01-01
    “…The threat landscape, the statistical test analysis, along critical comparisons with other schemes indicate that the presented algorithm is significantly secure and is resistant to a wide range of different attacks such as differential and statistical attacks. …”
    Get full text
    Article
  16. 196

    Resilient $${\mathcalligra {H}}_\infty$$ filter design for networked control systems under communication jamming cyberattacks by Muhammad Ali, Ghulam Mustafa, Hasnain Ahmad, Muhammad Abid, Salman Habib, Roobaea Alroobaea, Ali ELrashidi

    Published 2025-07-01
    “…Consequently, the discrete-time models of filtering error systems become time-dependent, thereby complicating the design of filters. …”
    Get full text
    Article
  17. 197

    Separable reversible data hiding by vacating room after encryption using encrypted pixel difference by Veeramuthu Venkatesh, R. Anushiadevi, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-04-01
    “…The encrypted image ensures high security against various attacks, including statistical, differential, and chosen plaintext attacks, and it allows for the extraction of secret data and recovery of the original image independently, making it a separable process.…”
    Get full text
    Article
  18. 198

    Video dual-domain watermarking algorithm based on hybrid DWT-DCT and frame grouping by LIANG Yucheng, NIU Ke, LI Jun, MENG Yifei

    Published 2025-02-01
    “…The algorithm is shown to be robust against distortion noise attacks and frame attacks of varying intensities. …”
    Get full text
    Article
  19. 199

    Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs by Tarek Srour, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm, Ahmed A. F. Youssef, Ali M. El-Rifaie

    Published 2025-03-01
    “…The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performance-enhancing techniques and the use of the powerful and robust security tools. …”
    Get full text
    Article
  20. 200

    Spoofing Evident and Spoofing Deterrent Localization Using Ultrawideband (UWB) Active–Passive Ranging by Haige Chen, Ashutosh Dhekne

    Published 2024-01-01
    “…Our experimental evaluation shows a 30-cm <inline-formula><tex-math notation="LaTeX">$\text {75}{\text{th}}$</tex-math></inline-formula> percentile error for ToF-based honest tag localization and a submeter error for TDoA-based localization for spoofing tags. …”
    Get full text
    Article