-
41
Leveraging Finite-Precision Errors in Chaotic Systems for Enhanced Image Encryption
Published 2024-01-01“…Previous studies have primarily aimed to mitigate this issue, with limited consideration of harnessing finite-precision errors as a potential source of randomness. In this study, we propose an innovative encryption method that leverages finite-precision errors within chaotic systems. …”
Get full text
Article -
42
Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks
Published 2024-04-01“…This paper examines the Latin text entitled Tractus Errores Graecorum: De Processione Spiritus Sancti. …”
Get full text
Article -
43
A Novel FDIA Model for Virtual Power Plant Cyber–Physical Systems Based on Network Topology and DG Outputs
Published 2025-03-01“…A hybrid solution framework is then proposed for the optimization problem above, where the corresponding submodules realize the bad data detection, topology error identification, and optimal dispatching in the optimal attack vector. …”
Get full text
Article -
44
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01“…Then we demonstrate that the attacker can reduce such output variation with a modified approach, by compensating the quantization error of the attack signal inside the attack dynamics. …”
Get full text
Article -
45
Multibit image watermarking algorithm resistant to geometric attacks based on level set method
Published 2011-01-01“…A multibit watermarking algorithm based on level set method was proposed.First,the stable location of the unit disk was found using level set method.Then,pseudo-Zernike moments were calculated.At last,the watermark was embedded by modifying the pseudo-Zernike moments.In the extraction process,the root-mean-square-error method was employed to detect the watermark.Simulation results show that the algorithm overcomes the defect of the traditional al-gorithm based on pseudo-Zernike moments,while be robust against geometric attacks.…”
Get full text
Article -
46
Adaptive Cooperative Quality Weight Spectrum Sensing for Mitigating Byzantine Attacks in Cognitive Radio
Published 2025-01-01“…Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results to mislead the fusion center on channel availability decisions. …”
Get full text
Article -
47
Secure state estimation and attack reconstruction for cyber-physical system with intermediate and robust observer
Published 2020-05-01“…An intermediate and robust observer is presented in this article to robustly estimate secure state and reconstruct actuator attack for continuous-time/discrete-time cyber-physical system. …”
Get full text
Article -
48
STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE
Published 2014-04-01“…It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. …”
Get full text
Article -
49
Parameter Identification and Control Method of a Hypersonic Wind Tunnel Attack Angle Mechanism
Published 2020-10-01“…Aiming at a hypersonic wind tunnel angle of attack mechanism, its special structural characteristics and kinematics are analyzed, and its parameter identification and control methods are studied. …”
Get full text
Article -
50
Performance of a kinetic model for predicting internal sulphate attack in Portland cement mortars
Published 2025-07-01“…The observed limitations and sources of error are discussed along with suggested future research. …”
Get full text
Article -
51
RESPONSE- a resilient framework to manage cyber-attacks on cyber-physical process systems
Published 2025-06-01“…RESPONSE is built on the National Institute of Standards and Technology (NIST) cybersecurity recommendation by leveraging redundant control architecture, secure detection mechanism, and integral error manipulation to maintain safe operations under attack conditions. …”
Get full text
Article -
52
Preset-Time Tracking Control for Nonlinear Cyber-Physical Systems Against Cyber Attacks
Published 2025-01-01“…Particularly, a new Gaussian radial basis function neural network (RBFNN) is designed as a neural estimator acting in an on-line pattern to estimate the vitriolic attacks. The designed control strategy can guarantee that the output tracking error enters a predefined small region around the equilibrium point, but also all the other states of the closed-loop system keep semi-globally practical finite-time stable (SGPFS), where the regulation time and tracking accuracy level remain prior known and could be preassigned. …”
Get full text
Article -
53
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
Published 2025-06-01“…It causes negligible classification errors.…”
Get full text
Article -
54
Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks
Published 2025-01-01“…With the increasing deployment of 5G networks, the vulnerability to malicious interference, such as jamming attacks, has become a significant concern. Detecting such attacks is crucial to ensuring the reliability and security of 5G communication systems Specifically in CAVs. …”
Get full text
Article -
55
Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks
Published 2025-01-01“…The primary objective is to evaluate the performance of these embedding techniques in terms of insertion time, extraction time, Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), and Mean Squared Error (MSE). To assess the robustness of the embedded data, a series of attacks are applied to the DICOM images, including zero attack, salt and pepper attack, Gaussian attack, and speckle noise attack. …”
Get full text
Article -
56
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. …”
Get full text
Article -
57
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. …”
Get full text
Article -
58
Mọ́remí or Mọ́rèmí: An Investigation into the Perception Error of a Deified Woman in Ilé-Ifẹ̀
Published 2022-01-01“…We trace this to the transcription of Dúró Ládipo ̣ ̀’s tonal melodies of his song Mọ́remí Àján̄sorò which is basically a perception error. We argue that though “re” is a variant of the verb “rè”, the form “re” only occurs with referential nouns while “rè” is found with short pronouns (Déchaine, 2001). …”
Get full text
Article -
59
Research on adversarial attacks and defense performance of image classification models for automated driving systems
Published 2025-01-01“…A sensitivity analysis-based noise superposition attack strategy was employed to perform white-box adversarial attacks against ResNet, a typical image classification model. …”
Get full text
Article -
60
Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks
Published 2025-02-01“…A DoS attack model and its corresponding compensation algorithm are developed, while a dynamic event-triggered condition is designed considering both the consensus error and the tracking error. …”
Get full text
Article