Showing 241 - 260 results of 416 for search 'error attacks', query time: 0.09s Refine Results
  1. 241

    Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction by Younsung Choi, Youngsook Lee, Dongho Won

    Published 2016-01-01
    “…Our analysis shows that Yoon and Kim's scheme has various security weaknesses such as a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks, and a revocation problem. …”
    Get full text
    Article
  2. 242

    Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations by TanPing Zhou, NingBo Li, QiQi Lai, XiaoYuan Yang, YiLiang Han, WenChao Liu

    Published 2021-11-01
    “…The error bound of the basic function components is re‐analysed over prime cyclotomic rings in the average case, which can be used in the error analysis of our scheme. …”
    Get full text
    Article
  3. 243

    Method based on contrastive learning for fine-grained unknown malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN

    Published 2022-10-01
    “…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
    Get full text
    Article
  4. 244

    Deep Neural Network-Based Detection of Modulated Jamming in Free-Space Optical Systems: Theory and Performance Under Atmospheric Fading by Manav R. Bhatnagar

    Published 2025-01-01
    “…Free-space optical (FSO) communication systems, though advantageous in terms of bandwidth and security, are highly susceptible to deliberate jamming attacks, particularly under intensity modulation and direct detection (IM/DD) constraints. …”
    Get full text
    Article
  5. 245

    Cancelable Biometric Template Generation Using Random Feature Vector Transformations by Ragendhu S P, Tony Thomas, Sabu Emmanuel

    Published 2024-01-01
    “…The recognition performance of the proposed scheme is evaluated for face and fingerprint modalities. Equal Error Rate (EER) of 1.5 is obtained for face and 1.7 is obtained for the fingerprint in the worst case.…”
    Get full text
    Article
  6. 246

    Hilbert Convex Similarity for Highly Secure Random Distribution of Patient Privacy Steganography by Hussein K. Alzubaidy, Dhiah Al-Shammary, Mohammed Hamzah Alsalihi, Ayman Ibaida, Khandakar Ahmed

    Published 2023-01-01
    “…In order to evaluate the performance of the proposed solution, three quality metrics: Peak signal to noise ratio (PSNR), Mean Square Error (MSE), percentage residual difference (PRD) and Structural Similarity Index measure (SSIM) were computed and compared on ten MRI images. …”
    Get full text
    Article
  7. 247

    A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation by Mustafa Dhiaa Al-Hassani

    Published 2022-08-01
    “…So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. …”
    Get full text
    Article
  8. 248

    Experimental Implementation of Enhanced Security Coherent One-Way Quantum Key Distribution by Amirhosein Dadahhani, Soheil Hajibaba, Hamid Asgari, Majid Khodabandeh, Fatemeh Rezazadeh, Azam Mani, Seyed Ahmad Madani

    Published 2025-01-01
    “…We also emphasize that monitoring the click rates of the data line detector for each state individually serves as a powerful method for detecting zero-error attacks.…”
    Get full text
    Article
  9. 249

    OPERATIONAL RISK MANAGEMENT GENERATED BY THE DIGITALIZATION OF THE BANKING SYSTEM by SLUSARIUC GABRIELA CORINA

    Published 2025-04-01
    “…Risks can come from various sources, such as internal errors and problems, external attacks, insufficient or inappropriate training of employees and many others. …”
    Get full text
    Article
  10. 250

    Application of a Hybrid Model Based on CEEMDAN and IMSA in Water Quality Prediction by GUO Li-jin, WU Hao-tian

    Published 2025-06-01
    “…The predictions were combined and reconstructed, and a BiLSTM-based error correction model further corrected the errors, yielding the final prediction results. …”
    Get full text
    Article
  11. 251

    Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare by Bandana Mallick, Priyadarsan Parida, Chittaranjan Nayak, Tarek Khalifa, Manoj Kumar Panda, Nawaf Ali, Gajanan Uttam Patil, Bibhu Prasad

    Published 2025-01-01
    “…Quantum key distribution (QKD) is a viable technique for safeguarding image transmission against numerous attacks. To address the limitations of existing methods in securing electronic medical records, we have explored an encryption technique using a set of real-time medical images along with existing standard images using QKD protocols including BB84 (Bennett-Brassard 1984), CASCADE (Cascading Error Correction Algorithm for Data Exchange), and differential-phase-shift (DPS) under the fiber-based (OFC) and free-space (FSO) channels. …”
    Get full text
    Article
  12. 252

    A reversible and robust hybrid image steganography framework using radon transform and integer lifting wavelet transform by B. M. El-den, Walid Raslan

    Published 2025-05-01
    “…The system exhibits exceptional robustness, with a Bit Error Rate (BER) as low as 0.0017 under scaling distortions, representing a 30% reduction compared to state-of-the-art methods. …”
    Get full text
    Article
  13. 253

    Generative Image Steganography via Encoding Pose Keypoints by Yi Cao, Wentao Ge, Chengsheng Yuan, Quan Wang

    Published 2024-12-01
    “…This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. …”
    Get full text
    Article
  14. 254

    Phishing suspiciousness in older and younger adults: The role of executive functioning. by Brandon E Gavett, Rui Zhao, Samantha E John, Cara A Bussell, Jennifer R Roberts, Chuan Yue

    Published 2017-01-01
    “…Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. …”
    Get full text
    Article
  15. 255

    NSEA: A Resilient ERP Framework Integrating Quantum-Safe Cryptography and Neuro-Symbolic Reasoning for Industrial Adaptability by Yong Lin, Yadi Lin

    Published 2025-01-01
    “…On industrial IoT (IIoT) edge devices, Kyber-512 achieves sub-<inline-formula> <tex-math notation="LaTeX">$5~\mu $ </tex-math></inline-formula>s encryption latency and mitigates 72% of phishing attacks through dynamic response mechanisms. In demand forecasting tasks, the hybrid reasoning model reduced mean absolute percentage error (MAPE) to 6.8% and resolved 89% of inventory stockout alerts within 15 minutes. …”
    Get full text
    Article
  16. 256

    Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid by Syeda Afra Saiara, Mohd. Hasan Ali

    Published 2024-12-01
    “…Numerical results demonstrate the improved performance of the proposed SDM controller, with a 35% reduction in AC bus voltage error compared to the conventional PI controller and FLC. …”
    Get full text
    Article
  17. 257

    Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos by Xing-Quan Fu, Bo-Cheng Liu, Yi-Yuan Xie, Wei Li, Yong Liu

    Published 2018-01-01
    “…The simulation results verify that the cryptosystem is enough against the traditional attacks, such as statistical attack, differential attack, brute force attack, and entropy attack. …”
    Get full text
    Article
  18. 258

    CSI-based symmetric encryption end-to-end communication system by Yongli AN, Zongrui LI, Haifei BAI, Xueyu MI

    Published 2025-08-01
    “…Additionally, in four attack scenarios, such as brute force and key leakage attacks, the BER of eavesdropper is approximately 0.5, indicating an inability to decrypt the information. …”
    Get full text
    Article
  19. 259

    SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction by Hyunmin Kim, Zahid Basha Shaik Kadu, Kyusuk Han

    Published 2025-08-01
    “…Our approach addresses critical vulnerabilities in Electronic Speed Controller (ESC) interfaces by deploying four synergistic algorithms—Kalman Filter Timing Correction (KFTC), Recursive Least Squares Timing Correction (RLSTC), Fuzzy Logic Timing Correction (FLTC), and Hybrid Adaptive Timing Correction (HATC)—each optimized for specific error characteristics and attack scenarios. Through comprehensive evaluation encompassing 32,000 Monte Carlo test iterations (500 per scenario × 16 scenarios × 4 algorithms) across 16 distinct operational scenarios and PolarFire SoC Field-Programmable Gate Array (FPGA) implementation, we demonstrate exceptional performance with 88.3% attack detection rate, only 2.3% false positive incidence, and substantial vulnerability mitigation reducing Common Vulnerability Scoring System (CVSS) severity from High (7.3) to Low (3.1). …”
    Get full text
    Article
  20. 260

    Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques by Yongho Ko, I Wayan Adi Juliawan Pawana, Ilsun You

    Published 2024-12-01
    “…The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy. To address these vulnerabilities, we previously proposed the 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol, which introduces an ephemeral key pair within the home network (HN) to support forward secrecy and prevent linkability attacks. …”
    Get full text
    Article