Showing 381 - 400 results of 416 for search 'error attacks', query time: 0.11s Refine Results
  1. 381

    An Advanced Generative AI-Based Anomaly Detection in IEC61850-Based Communication Messages in Smart Grids by Aydin Zaboli, Yong-Hwa Kim, Junho Hong

    Published 2025-01-01
    “…The ToD model adapts effectively to new attack scenarios without extensive retraining, unlike traditional machine learning (ML) models or HITL, which require frequent updates. …”
    Get full text
    Article
  2. 382

    Symbolic Regression-Based Modeling for Aerodynamic Ground-to-Flight Deviation Laws of Aerospace Vehicles by Di Ding, Qing Wang, Qin Chen, Lei He

    Published 2025-05-01
    “…For UAV flight test data, the average root mean square error (RMSE) of the mathematical model demonstrates a maximum improvement of 37% in accuracy compared to three data-driven methods. …”
    Get full text
    Article
  3. 383

    Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers by Atef Ibrahim, Fayez Gebali

    Published 2025-06-01
    “…The regular structure not only enables these performance advantages but also facilitates future integration of error-detection and masking techniques for comprehensive side-channel protection. …”
    Get full text
    Article
  4. 384

    Overview of migraine care, impact of the disease, and patient experience in France through patient voices: a cross-sectional and participatory survey study by Anne Duburcq, Manon Molins, Sabine Debremaeker, Julie Joie, Luna Lopes, Camille Nevoret, Olivia Begasse de Dhaem

    Published 2025-04-01
    “…Results Out of the 683 participants (average age: 41.8 years; female: 92.4%; average age at first migraine attack: 16.2 years), 95.9% had received a formal migraine diagnosis from a physician. …”
    Get full text
    Article
  5. 385

    Analysis and prediction of infectious diseases based on spatial visualization and machine learning by Yunyun Cheng, Yanping Bai, Jing Yang, Xiuhui Tan, Ting Xu, Rong Cheng

    Published 2024-11-01
    “…Since the 1970s, constantly mutated new infectious viruses have been quietly attacking humanity, and at least one new type of infectious disease is discovered every year. …”
    Get full text
    Article
  6. 386

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…We infer the extraction, feature selection, attack detection, and data collection and processing procedures to anticipate anomaly inpatient data. …”
    Get full text
    Article
  7. 387

    Rancang Bangun Case Based Reasoning untuk Diagnosis Hama dan Penyakit Tanaman Nilam menggunakan Nearest Neighbor Kombinasi Certainty Factor by Rabiah Adawiyah, Fitrianti Handayani

    Published 2020-05-01
    “…The development of patchouli plants attacked by pests and diseases is often hampered because there are still many farmers who do not know the types of pests and diseases that attack farmers' crops. …”
    Get full text
    Article
  8. 388

    Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach by Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman, Arslan Shafique, Amer Aljaedi, Zaid Bassfar, Aminu Bello Usman

    Published 2024-05-01
    “…This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. …”
    Get full text
    Article
  9. 389

    (<italic>r, k, &#x03B5;</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali... by Burak Cem Kara, Can Eyupoglu, Oktay Karakus

    Published 2025-01-01
    “…However, protecting individuals&#x2019; privacy against diverse attack attempts presents significant challenges for anonymization models that rely solely on a single technique, highlighting the need for more adaptable and hybrid approaches. …”
    Get full text
    Article
  10. 390
  11. 391

    Eradication of Helicobacter pylori for prevention of aspirin-associated peptic ulcer bleeding in adults over 65 years: the HEAT RCT by CJ Hawkey, Anthony J Avery, Carol AC Coupland, Colin J Crooks, Jennifer S Dumbleton, FD Richard Hobbs, Denise Kendrick, Michael Moore, Clive Morris, Gregory Rubin, Murray Smith, Diane Stevenson

    Published 2025-08-01
    “…Omitting mention of death due to peptic ulcer bleeding from the protocol was an error, but it did not affect the analysis, as there were no pre-hospitalisation deaths. …”
    Get full text
    Article
  12. 392

    The use of modern military technologies in the light of the law of weapons and the law of targeting by Behzad Seyfi

    Published 2025-03-01
    “…For example, the bombardment of "USS Cole" by a small industrial ship equipped with classic weapons succeeded in attacking one of the most advanced warships in the world. …”
    Get full text
    Article
  13. 393

    Benefits of aldosterone receptor antagonism in chronic kidney disease: the BARACK-D RCT by F D Richard Hobbs, Richard McManus, Clare Taylor, Nicholas Jones, Joy Rahman, Jane Wolstenholme, Louise Jones, Jennifer Hirst, Sam Mort, Ly-Mee Yu

    Published 2025-03-01
    “…Due to the higher than anticipated measurement error/fluctuations, the eligible range was extended to 30–50 ml/minute/1.73 m2 following the initial recruitment period. …”
    Get full text
    Article
  14. 394

    Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN

    Published 2022-03-01
    “…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
    Get full text
    Article
  15. 395

    A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks by Zhen Liu, Yi-Liang Han, Xiao-Yuan Yang

    Published 2019-06-01
    “…Under hardness of decisional learning with errors problem on lattice, it can ensure indistinguishability against chosen ciphertext attack (IND-CCA1) security scheme for collected data on the extranet and indistinguishability against chosen plaintext attack security for data during the process of distributed collection on the intranet. …”
    Get full text
    Article
  16. 396

    Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care by Kou-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang

    Published 2013-12-01
    “…In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. …”
    Get full text
    Article
  17. 397

    Onboard Trajectory Generation of Hypersonic Morphing Aircraft by Chenxin Zhang, Yankun Zhang, Changzhu Wei

    Published 2021-01-01
    “…The simulation results indicate high accuracy of AMPI method and the final errors corresponding to different initial errors were acceptable. …”
    Get full text
    Article
  18. 398

    Linear Disturbance Observer-Enhanced Continuous-Time Predictive Control for Straight-Line Path-Following Control of Small Unmanned Aerial Vehicles by Weiwei Qi, Mingbo Tong, Xubo Li, Qi Wang, Wei Song

    Published 2024-11-01
    “…Firstly, based on the natural frame’s location on the prescribed reference paths, the command yaw angle (which is the basis for yaw angle control system design) is solved analytically by combining it with the errors of path following, attack angle, sideslip angle, attitude angles, and geometric parameters of the prescribed reference paths. …”
    Get full text
    Article
  19. 399

    Semi-supervised method for anomaly detection in HTTP traffic by Malki Ishara Wasundara, Junwei Zhou, Yanchao Yang, Dongdong Zhao, Jianwen Xiang

    Published 2025-08-01
    “…We also introduce a simple interpretability mechanism by attributing anomalies to token-level reconstruction errors, providing insights into detected threats. …”
    Get full text
    Article
  20. 400

    Detecting deception in movement: the case of the side-step in rugby. by Sébastien Brault, Benoit Bideau, Richard Kulpa, Cathy M Craig

    Published 2012-01-01
    “…By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05). In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. …”
    Get full text
    Article