Showing 221 - 240 results of 416 for search 'error attacks', query time: 0.08s Refine Results
  1. 221

    Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism by Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede

    Published 2025-03-01
    “…In this work, we explored the design space of learning with error-based PQC schemes to design a lightweight key-encapsulation mechanism (KEM) suitable for resourceconstrained devices. …”
    Get full text
    Article
  2. 222

    Evaluating the Performance of LoRa Networks: A Study on Disaster Monitoring Scenarios by Isadora Rezende Lopes, Paulo Rodolfo da Silva Leite Coelho, Rafael Pasquini, Rodrigo Sanches Miani

    Published 2025-02-01
    “…These numerous technologies, such as LoRa (Long Range) transceivers, find applications in various domains, including monitoring natural disasters and those caused by human error. Security vulnerabilities arise concurrently with the advancement of these new technologies. …”
    Get full text
    Article
  3. 223

    Analyzing anomalous events in passageways with high-frequency ship signals. by Cherryl Chico, Macario O Ii Cordel, Mahinthan Joseph Mariasingham, Elaine S Tan

    Published 2025-01-01
    “…This means that disruptions such as natural disasters or human error at these crucial points can significantly impact numerous economies across various facets of trade. …”
    Get full text
    Article
  4. 224

    Transfer Reinforcement Learning-Based Power Control for Anti-Jamming in Underwater Acoustic Communication Networks by Liejun Yang, Yi Chen, Hui Wang

    Published 2025-04-01
    “…However, they are highly susceptible to performance degradation due to narrow bandwidths, long propagation delays, and severe multipath effects, especially adversarial jamming attacks. Traditional anti-jamming techniques struggle to adapt to the dynamic nature of underwater acoustic channels effectively. …”
    Get full text
    Article
  5. 225

    Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum by J. de Curtò, I. de Zarzà, Juan-Carlos Cano, Carlos T. Calafate

    Published 2024-11-01
    “…Our method introduces a concurrent access protocol for multiple drones to share a QRNG device efficiently, incorporating robust error handling and a shared memory system for random number distribution. …”
    Get full text
    Article
  6. 226

    Ultra-secure quantum protection for e-healthcare images: Hybrid chaotic one-time pad with cipher chaining encryption framework by Roayat Ismail Abdelfatah, Reham Mohamed Elsobky, Salah Aldeen Khamis

    Published 2025-08-01
    “…This study effectively bridges the gap between theoretical quantum security models and real-world implementation on existing NISQ devices, demonstrating resilience against classical statistical and differential attacks, as well as quantum-specific threats such as Grover’s brute-force search and quantum chosen-plaintext attacks. …”
    Get full text
    Article
  7. 227

    Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models by Rijvan Beg, R. K. Pateriya, Deepak Singh Tomar

    Published 2024-01-01
    “…This configuration allows the model to be able to detect and adapt to evolving attack patterns, thus, by 25%, significantly improving the zero-day attack detection.…”
    Get full text
    Article
  8. 228
  9. 229

    Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor by Alexey Sulavko, Irina Panfilova, Daniil Inivatov, Pavel Lozhnikov, Alexey Vulfin, Alexander Samotuga

    Published 2025-01-01
    “…The results show that the proposed neural fuzzy extractor model provides an equal error probability level of EER = 2.1%.…”
    Get full text
    Article
  10. 230

    Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map by Weishuai Wu, Yujiao Dong, Guangyi Wang

    Published 2024-01-01
    “…Robustness testing against various types of attacks resulted in normalized correlation (NC) values consistently surpassing 0.9, with bit error rate (BER) values approaching 0. …”
    Get full text
    Article
  11. 231

    Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm by Reismary Armas, Hamed Taherdoost

    Published 2025-04-01
    “…Research has shown that a significant percentage of recorded cyber incidents are attributed to social engineering practices or human error. In response to this growing threat, reinforcing cybersecurity awareness among users has become an urgent strategy to develop and apply. …”
    Get full text
    Article
  12. 232

    Codes in Dihedral Group Algebra by Kirill V. Vedenev, Vladimir M. Deundyak

    Published 2018-04-01
    “…So, the new classes of error-correcting codes are required for building new resistant code cryptosystems. …”
    Get full text
    Article
  13. 233

    High Security Differential Chaos-Based Modulation With Channel Scrambling for WDM-Aided VLC System by Bingjun Chen, Lin Zhang, Huaiyin Lu

    Published 2016-01-01
    “…However, due to the broadcasting property of optical channels, VLC systems may also suffer from malicious attacks or eavesdropping. In this paper, we present a differential chaos-based modulation with channel scrambling (DCM-CS) for wavelength-division multiplexing (WDM) aided VLC system to enhance the transmission security over red, green, and blue (RGB) channels. …”
    Get full text
    Article
  14. 234

    Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security by Mahmoud Nasr, Krzysztof Brzostowski, Adam Piórkowski, Fathi E. Abd El-Samie

    Published 2025-03-01
    “…Experimental assessments indicate the method robustness against possible attacks, attaining an Area under the Receiver Operating Characteristic curve (AROC) of 0.9997 and an almost negligible Equal Error Rate (EER). …”
    Get full text
    Article
  15. 235

    GNSS-denied geolocalization of UAVs using terrain-weighted constraint optimization by Fushan Yao, Chaozhen Lan, Longhao Wang, Hongfa Wan, Tian Gao, Zijun Wei

    Published 2024-12-01
    “…However, GNSS systems are susceptible to blockages, jamming, and spoofing attacks. Localization using onboard cameras and satellite images provides a promising solution for UAVs operating in GNSS-denied environments. …”
    Get full text
    Article
  16. 236

    Discrete-Modulated Coherent-State Quantum Key Distribution with Basis-Encoding by Mingxuan Guo, Peng Huang, Le Huang, Xiaojuan Liao, Xueqin Jiang, Tao Wang, Guihua Zeng

    Published 2025-01-01
    “…However, the traditional DMCS-CVQKD scheme cannot tolerate the high channel excess noise and channel loss, compared to the Gaussian-modulated scheme, and its error correction is still difficult. In this paper, we propose a discrete-modulated coherent-state basis-encoding quantum key distribution (DMCS-BE-QKD) protocol, where the secret keys are encoded in the random choice of 2 measurement bases, i.e., the conjugate quadratures X and P of discrete-modulated coherent states, and it only needs simple binary sequence error correction. …”
    Get full text
    Article
  17. 237

    Rectifying Adversarial Examples Using Their Vulnerabilities by Fumiya Morimoto, Ryuto Morita, Satoshi Ono

    Published 2025-01-01
    “…Deep neural network-based classifiers are prone to errors when processing adversarial examples (AEs). …”
    Get full text
    Article
  18. 238

    Voice Fence Wall: User-optional voice privacy transmission by Li Luo, Yining Liu

    Published 2024-03-01
    “…Specifically, our framework achieves 89.84 ​% accuracy in sentiment recognition and 6.01 ​% equal error rate in voice authentication.…”
    Get full text
    Article
  19. 239

    DICTION: DynamIC robusT whIte bOx Watermarking Scheme for Deep Neural Networks by Reda Bellafqira, Gouenou Coatrieux

    Published 2025-07-01
    “…Experiments conducted on four benchmark models (MLP, CNN, ResNet-18, and LeNet) demonstrate that DICTION achieves a zero bit error rate (BER) while maintaining model accuracy within 0.5% of the baseline. …”
    Get full text
    Article
  20. 240

    Adaptive Autoencoder-Based Intrusion Detection System with Single Threshold for CAN Networks by Donghyeon Kim, Hyungchul Im, Seongsoo Lee

    Published 2025-07-01
    “…The proposed autoencoder model was trained exclusively on normal data. A portion of the attack data was utilized to determine the optimal detection threshold using a Gaussian kernel density estimation function, while the frame count was selected based on error rate analysis. …”
    Get full text
    Article