Showing 201 - 220 results of 416 for search 'error attacks', query time: 0.09s Refine Results
  1. 201

    A Historical Survey of Sir Karl Popper's Contribution to Quantum Mechanics by William M. Shields

    Published 2012-11-01
    “… Sir Karl Popper (1902-1994), though not trained as a physicist and embarrassed early in his career by a physics error pointed out by Einstein and Bohr, ultimately made substantial contributions to the interpretation of quantum mechanics. …”
    Get full text
    Article
  2. 202

    A lightweight privacy-preserving truth discovery mechanism for IoT by Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG

    Published 2021-05-01
    “…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
    Get full text
    Article
  3. 203

    Quantum Diffie–Hellman key exchange by Georgios M. Nikolopoulos

    Published 2025-03-01
    “…Its security is analyzed in the framework of minimum-error-discrimination and photon-number-splitting attacks, while its performance and the challenges in a possible realization are also discussed.…”
    Get full text
    Article
  4. 204

    A Hyperchaotic Lorenz and DNA-Encoded Image Encryption Algorithm by Shuangyuan Li, Mengfan Li

    Published 2024-01-01
    “…Meanwhile, the mean square error (MSE) of pepper and salt noise density is analyzed by the peak signal-to-noise ratio (PSNR). …”
    Get full text
    Article
  5. 205

    Physical Layer Cyber Resilience Oriented Dynamic Secure Polar Code by Sifan Yao, Yu Dai, Gangtao Han, Zhiqing Tang, Dalong Zhang

    Published 2025-01-01
    “…The results show that the proposed scheme has high security against cryptanalysis attacks. Meanwhile the eavesdropper’s bit error rate is kept above 0.435 in non-degraded channel scenarios, and the reliability is almost the same with that of the original polar code. …”
    Get full text
    Article
  6. 206

    A new digital watermarking model using honey encryption and reversible cellular automata by Jianxin Xiong, Zhiyuan Zhou, Vyacheslav V. Dubrovskiy, Sangkeum Lee

    Published 2025-07-01
    “…The results demonstrate that the proposed method significantly outperforms the compared methods in terms of imperceptibility, achieving a significantly lower mean squared error of 13.55 and mean absolute error of 3.05, and a higher peak signal-to-noise ratio of 36.89. …”
    Get full text
    Article
  7. 207

    Robust zero-watermarking for color images using hybrid deep learning models and encryption by Hager A. Gharib, Noha M. M. Abdelnapi, Khalid M. Hosny

    Published 2025-08-01
    “…The extracted watermark maintains a low Bit Error Rate (BER) and a high Normalized Cross-Correlation (NCC). …”
    Get full text
    Article
  8. 208

    Use of Paraconsistent Feature Engineering to support the Long Term Feature choice for Speaker Verification by Alex Marino Gonçalves de Almeida, Claudineia Helena Recco, Rodrigo Capobianco Guido

    Published 2021-04-01
    “…Our experiments pointed out that for the use of more robust classifiers, the best choice would be the AlexNet method, while in terms of classification regarding the Equal Error Rate metric, the best suggestion would be Daubechies filter support 21. …”
    Get full text
    Article
  9. 209

    Security of School Financial Transaction Applications with the Implementation of Two Factor Authentication Method by Novi Hardiansyah, Rima Aulia, Angelina Hadriani

    Published 2025-05-01
    “…Financial transactions over the internet often become targets of cyber attacks that can harm users in conducting transactions due to negligence from both the system and human error. …”
    Get full text
    Article
  10. 210

    Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices by Md Saiful Islam

    Published 2015-06-01
    “…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. This feature could be computed and transmitted efficiently using mobile computing devices. …”
    Get full text
    Article
  11. 211

    A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things by Weimeng Wang, Chengliang Liu, Weiqiao Zhu, Chenhui Xie

    Published 2025-05-01
    “…Also, in terms of security, this method has been able to improve the security of information, which has achieved values of 1.041 and 0.49, respectively, using the Mean Squared Error and Bit Error Ratio criteria.…”
    Get full text
    Article
  12. 212

    One-way Video Transmission Technology for Urban Rail Transit Based on EndpointDevices by ZHANG Lidong, XU Ziheng, WANG Kun

    Published 2025-07-01
    “…UPET (unidirectional private exchange tunnel) technology is employed for the design of one-way transmission channels, and FEC (forward error correction) technology is used for error correction and verification design. …”
    Get full text
    Article
  13. 213

    Certificateless multi-source signcryption with lattice by Huifang Yu, Jiafeng Shi

    Published 2022-11-01
    “…Based on learning with errors and inhomogeneous small integer solution problems, LCL-MSSC is unforgeable under the adaptive chosen-message attacks and indistinguishable under the adaptive chosen-ciphertext attacks; in addition, it can resist the pollution attacks and quantum computing attacks. …”
    Get full text
    Article
  14. 214

    Analysis on Aigis‐Enc: Asymmetrical and symmetrical by Yupu Hu, Siyue Dong, Xingting Dong

    Published 2021-03-01
    “…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. …”
    Get full text
    Article
  15. 215

    Maritime autonomous surface ships (MASS) in Gulf of Suez: safety of navigation precautionary measures by Amr Samir Nossir, Samy Isamil A. M. Youssef, Mohamed Essallamy

    Published 2023-01-01
    “…Maritime Autonomous Surface Ships (MASS) improvements may help eliminate human error and greatly increase overall safety, but they are also likely to pose new threats, particularly given the marine industry's growing interest in MASS. …”
    Get full text
    Article
  16. 216

    Consensus of networked control multi-agent systems using a double-layer encryption scheme by Yamin Yan, Zhiyong Chen, Vijay Varadharajan

    Published 2023-11-01
    “…The paper provides an explicit design, supported by theoretical proof and numerical verification, covering stability, steady-state error, and the prevention of computation overflow or underflow.…”
    Get full text
    Article
  17. 217

    Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing by Jean Marie Vianney Sindayigaya

    Published 2025-06-01
    “…However, practical implementation of quantum computing solutions faces challenges such as high error rates, environmental sensitivity, and integration complexities. …”
    Get full text
    Article
  18. 218

    Blast loading prediction in a typical urban environment based on Bayesian deep learning by Weiwen Peng, Meilin Pan, Chunjiang Leng, Shufei Wang, Wei Zhong

    Published 2025-12-01
    “…Explosion events in urban environment, such as terrorist attacks, accidental industrial explosions and missile attacks in war, can be destructive to residents and properties, causing great casualties and structural damages. …”
    Get full text
    Article
  19. 219

    3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs by Yongchao Dang, Alp Karakoc, Saba Norshahida, Riku Jantti

    Published 2023-01-01
    “…Furthermore, the particle text filter-based GPS spoofing mitigation can relocate the UAV to the real position within an error of 10 meters using 100 particles.…”
    Get full text
    Article
  20. 220

    Cancelable finger vein authentication using multidimensional scaling based on deep learning by Mohamed Hammad, Mohammed ElAffendi, Ahmed A. Abd El-Latif

    Published 2025-06-01
    “…We evaluated our system on three publicly available datasets for finger veins using various performance metrics, including accuracy, precision, recall, and equal error rate (EER). The results demonstrated the effectiveness of our method, which achieved high accuracy, low error rates, and strong performance in diversity and irreversibility tests. …”
    Get full text
    Article