Showing 61 - 80 results of 416 for search 'error attacks', query time: 0.12s Refine Results
  1. 61

    Cooperative spectrum sensing scheme against SSDF attack based on ESD test in radio network by Lichun XIE, Chunqin ZHANG

    Published 2016-10-01
    “…The simulation results show that the proposed scheme can effectively filter SSDF attack data in cooperative sensing, and it has lower error detection rate.…”
    Get full text
    Article
  2. 62

    Observer-Based Sliding Mode Load Frequency Control of Power Systems under Deception Attack by Siwei Qiao, Xinghua Liu, Gaoxi Xiao, Shuzhi Sam Ge

    Published 2021-01-01
    “…This study investigates the observer-based sliding mode load frequency control for multiarea interconnected power systems under deception attack. By introducing the observer and combining it with the system state equation, the expression of the system error is obtained. …”
    Get full text
    Article
  3. 63

    Security state estimation based on signal reconstruction for multi‐vehicle systems under malicious attack by Jing Wang, Siyuan Wang, Shan Lu, Meng Zhou

    Published 2024-11-01
    “…First the reconstruction of attack signal is transformed into a sparse error correction problem by stacking the measurement information of adjacent vehicles, and is solved by orthogonal matching pursuit (OMP) algorithm. …”
    Get full text
    Article
  4. 64

    Study on correction technology of aircraft angle-of-attack signal based on estimation of side-slip angle by XUE Yuan, LIU Shimin, WEI Jianlong

    Published 2025-06-01
    “…The simulation results show that the proposed method is successful in estimating the side-slip angle, and the angle-of-attack signal on both sides of the nose is consistent with the modified side-slip angle, which solves the problem of over-error of the angle-of-attack signal caused by the large side-slip state and has good correction effect.…”
    Get full text
    Article
  5. 65

    Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models by Xinxin Yue, Zhiyong Zhang, Junchang Jing, Weiguo Wang

    Published 2025-06-01
    “…Numerous experiments on LLMs with varying performance and parameter sizes have validated the effectiveness, stability, and generalizability of this attack. The model’s error response and the superiority of this attack are thoroughly examined using attention by gradient technology, confirming the security threats posed by LLMs when leveraging CoT capability. …”
    Get full text
    Article
  6. 66

    Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization by Olga Ilina, Maxim Tereshonok, Vadim Ziyadinov

    Published 2025-01-01
    “…Existing defense methods against patch attacks are insufficiently effective, which underlines the need to develop new reliable solutions. …”
    Get full text
    Article
  7. 67

    Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks by Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot

    Published 2024-10-01
    “…However, NN-based methods are vulnerable to adversarial attacks. Attackers could insert adversarial noise into spoofing examples to circumvent an NN-based face-liveness detector. …”
    Get full text
    Article
  8. 68
  9. 69

    Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding by Aleksandr Aleksandrovich Kuznetsov, Igor Ivanovich Svatovskiy, Aleksey Vladimirovich Shevtsov

    Published 2022-09-01
    “…Code-based cryptography draws attention not only highly resistant to attacks of various kinds, but also performance hardware implementation and the additional advantage of the ability to correct errors in the transmission signals over data channels. …”
    Get full text
    Article
  10. 70

    The usage of power system multi-model forecasting aided state estimation for cyber attack detection by I. A. Lukicheva, A. L. Kulikov

    Published 2022-01-01
    “…Such an aggregate cyber-physical system can be subject to cyber attacks. One of the ways to counter cyberattacks is state estimation. …”
    Get full text
    Article
  11. 71
  12. 72

    An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method by Mostefa Kara, Konstantinos Karampidis, Giorgos Papadourakis, Mohammad Hammoudeh, Muath AlShaikh

    Published 2024-10-01
    “…Based on the learning with error (LWE) system, this paper introduces a novel asymmetric encryption technique that encrypts entire messages of n bits rather than just 1 bit. …”
    Get full text
    Article
  13. 73

    Dynamic event-triggered $ H_{\infty} $ control for neural networks with sensor saturations and stochastic deception attacks by Zongying Feng, Guoqiang Tan

    Published 2025-03-01
    “…And a lower trigger frequency can be obtained by appropriately adjusting the triggering error. Then, a new closed-loop quantized control model is established under a dynamic event-triggered scheme, sensor saturations, and stochastic deception attacks, which is described by two independent Bernoulli-distributed variables. …”
    Get full text
    Article
  14. 74

    PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. …”
    Get full text
    Article
  15. 75

    State Estimation in Power Systems Under False Data Injection Attack Using Total Least Squares by Bamrung Tausiesakul, Krissada Asavaskulkiet, Chuttchaval Jeraputra, Ittiphong Leevongwat, Thamvarit Singhavilai, Supun Tiptipakorn

    Published 2025-01-01
    “…Signal-to-noise ratio (SNR), signal-and-attack-to-noise ratio (SANR), and phase-to-attack ratio are examples of the situational quality that can exist in the power distribution systems. …”
    Get full text
    Article
  16. 76

    Bit flipping-based error correcting output code construction for adversarial robustness of neural networks by Wooram Jang, Woojin Hwang, Kezhong Jin, Hosung Park

    Published 2025-04-01
    “…In this paper, we propose a method for constructing error-correcting output codes (ECOCs) based on a codeword bit flipping algorithm to enhance adversarial robustness of neural networks. …”
    Get full text
    Article
  17. 77

    Ataque del colocador en voleibol de alto nivel (The setter’s attack in high-level volleyball) by Eduardo López, María Velasco Rodrigo, Gemma María Gea-García

    Published 2024-07-01
    “…For data analysis, Pearson's Chi-square and an analysis of ROC curves were used. The setter’s attack obtained more points and created less errors when performed after an excellent pass to the setter (X2=15.53; p=.004). …”
    Get full text
    Article
  18. 78

    Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis by Ahmad Mohammadi, Reza Ahmari, Vahid Hemmati, Frederick Owusu-Ambrose, Mahmoud Nabil Mahmoud, Parham Kebria, Abdollah Homaifar

    Published 2025-01-01
    “…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. …”
    Get full text
    Article
  19. 79

    Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution by Il-Youp Kwak, Sungsu Kwag, Junhee Lee, Youngbae Jeon, Jeonghwan Hwang, Hyo-Jung Choi, Jong-Hoon Yang, So-Yul Han, Jun Ho Huh, Choong-Hoon Lee, Ji Won Yoon

    Published 2023-01-01
    “…Our single model achieved a replay attack detection equal error rate (EER) of 0.30% on the evaluation set using an optimized constant Q transform (CQT) feature, outperforming the top ensemble system in the competition, which scored an EER of 0.39%. …”
    Get full text
    Article
  20. 80

    Key Distribution System Based on Hadamard Designs by Vladimir M. Deundyak, Alexey A. Taran

    Published 2019-06-01
    “…Such key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. …”
    Get full text
    Article