-
61
Cooperative spectrum sensing scheme against SSDF attack based on ESD test in radio network
Published 2016-10-01“…The simulation results show that the proposed scheme can effectively filter SSDF attack data in cooperative sensing, and it has lower error detection rate.…”
Get full text
Article -
62
Observer-Based Sliding Mode Load Frequency Control of Power Systems under Deception Attack
Published 2021-01-01“…This study investigates the observer-based sliding mode load frequency control for multiarea interconnected power systems under deception attack. By introducing the observer and combining it with the system state equation, the expression of the system error is obtained. …”
Get full text
Article -
63
Security state estimation based on signal reconstruction for multi‐vehicle systems under malicious attack
Published 2024-11-01“…First the reconstruction of attack signal is transformed into a sparse error correction problem by stacking the measurement information of adjacent vehicles, and is solved by orthogonal matching pursuit (OMP) algorithm. …”
Get full text
Article -
64
Study on correction technology of aircraft angle-of-attack signal based on estimation of side-slip angle
Published 2025-06-01“…The simulation results show that the proposed method is successful in estimating the side-slip angle, and the angle-of-attack signal on both sides of the nose is consistent with the modified side-slip angle, which solves the problem of over-error of the angle-of-attack signal caused by the large side-slip state and has good correction effect.…”
Get full text
Article -
65
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models
Published 2025-06-01“…Numerous experiments on LLMs with varying performance and parameter sizes have validated the effectiveness, stability, and generalizability of this attack. The model’s error response and the superiority of this attack are thoroughly examined using attention by gradient technology, confirming the security threats posed by LLMs when leveraging CoT capability. …”
Get full text
Article -
66
Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
Published 2025-01-01“…Existing defense methods against patch attacks are insufficiently effective, which underlines the need to develop new reliable solutions. …”
Get full text
Article -
67
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
Published 2024-10-01“…However, NN-based methods are vulnerable to adversarial attacks. Attackers could insert adversarial noise into spoofing examples to circumvent an NN-based face-liveness detector. …”
Get full text
Article -
68
LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES
Published 2025-07-01Subjects: Get full text
Article -
69
Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding
Published 2022-09-01“…Code-based cryptography draws attention not only highly resistant to attacks of various kinds, but also performance hardware implementation and the additional advantage of the ability to correct errors in the transmission signals over data channels. …”
Get full text
Article -
70
The usage of power system multi-model forecasting aided state estimation for cyber attack detection
Published 2022-01-01“…Such an aggregate cyber-physical system can be subject to cyber attacks. One of the ways to counter cyberattacks is state estimation. …”
Get full text
Article -
71
Exploring the Roles of In-Network Caching in ICN
Published 2014-03-01Subjects: Get full text
Article -
72
An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method
Published 2024-10-01“…Based on the learning with error (LWE) system, this paper introduces a novel asymmetric encryption technique that encrypts entire messages of n bits rather than just 1 bit. …”
Get full text
Article -
73
Dynamic event-triggered $ H_{\infty} $ control for neural networks with sensor saturations and stochastic deception attacks
Published 2025-03-01“…And a lower trigger frequency can be obtained by appropriately adjusting the triggering error. Then, a new closed-loop quantized control model is established under a dynamic event-triggered scheme, sensor saturations, and stochastic deception attacks, which is described by two independent Bernoulli-distributed variables. …”
Get full text
Article -
74
PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation
Published 2025-01-01“…Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. …”
Get full text
Article -
75
State Estimation in Power Systems Under False Data Injection Attack Using Total Least Squares
Published 2025-01-01“…Signal-to-noise ratio (SNR), signal-and-attack-to-noise ratio (SANR), and phase-to-attack ratio are examples of the situational quality that can exist in the power distribution systems. …”
Get full text
Article -
76
Bit flipping-based error correcting output code construction for adversarial robustness of neural networks
Published 2025-04-01“…In this paper, we propose a method for constructing error-correcting output codes (ECOCs) based on a codeword bit flipping algorithm to enhance adversarial robustness of neural networks. …”
Get full text
Article -
77
Ataque del colocador en voleibol de alto nivel (The setter’s attack in high-level volleyball)
Published 2024-07-01“…For data analysis, Pearson's Chi-square and an analysis of ROC curves were used. The setter’s attack obtained more points and created less errors when performed after an excellent pass to the setter (X2=15.53; p=.004). …”
Get full text
Article -
78
Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis
Published 2025-01-01“…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. …”
Get full text
Article -
79
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution
Published 2023-01-01“…Our single model achieved a replay attack detection equal error rate (EER) of 0.30% on the evaluation set using an optimized constant Q transform (CQT) feature, outperforming the top ensemble system in the competition, which scored an EER of 0.39%. …”
Get full text
Article -
80
Key Distribution System Based on Hadamard Designs
Published 2019-06-01“…Such key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. …”
Get full text
Article