Showing 101 - 120 results of 416 for search 'error attacks', query time: 0.26s Refine Results
  1. 101

    Nonlinear Sliding-Mode Super-Twisting Reaching Law for Unmanned Surface Vessel Formation Control Under Coupling Deception Attacks by Yifan Wang, Qiang Zhang, Yaping Zhu, Yancai Hu, Xin Hu

    Published 2025-03-01
    “…First, a USV model with attacks and disturbances is established, and a leader–follower formation system is designed. …”
    Get full text
    Article
  2. 102

    State Estimation in Power Systems Under Random Data Attack Using Correlation Matching, Semidefinite Relaxation, and Truncated Eigenvalue Decomposition by Bamrung Tausiesakul, Krissada Asavaskulkiet, Chuttchaval Jeraputra, Ittiphong Leevongwat, Thamvarit Singhavilai, Supun Tiptipakorn

    Published 2025-01-01
    “…Numerical simulation is conducted to demonstrate the usability of the proposed algorithms and to illustrate their performance. Signal-plus-attack-to-noise ratio (SANR) and phase-to-attack ratio are examples of the situational quality that can exist in the power transmission systems. …”
    Get full text
    Article
  3. 103

    Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM) by R. Priya, N. Sivakumar

    Published 2022-12-01
    “…Platoons require help between those vehicles to improve fuel efficiency, security, and various crises associated with driver errors. Despite these advances, the communication network must govern vehicles unprotected from adequate threat vectors, which malicious attacks might exploit. …”
    Get full text
    Article
  4. 104
  5. 105

    Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network by V. Abilasha, A. Karthikeyan

    Published 2025-01-01
    “…Conversely, by manipulating secondary users, Primary User Emulation Attack (PUEA) create severe threats to security and cause improper spectrum allocation and higher energy usage. …”
    Get full text
    Article
  6. 106

    Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning by Kaspars Sudars, Ivars Namatevs, Arturs Nikulins, Kaspars Ozols

    Published 2025-05-01
    “…As shown in this paper, additional protection by differential privacy leads to the saturation of gradient inversion attacks, i.e., the reconstructed signal maintains a certain error level, depending on the applied privacy budget level. …”
    Get full text
    Article
  7. 107

    Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion by Chen Meng, Haoyang Yang, Cuicui Jiang, Qinglei Hu, Dongyu Li

    Published 2025-06-01
    “…Notably, when benchmarked against traditional methods, the proposed system reduced navigation errors by a factor of approximately 2-3 under attack scenarios, which substantially enhanced the operational stability of the UAVs in challenging environments.…”
    Get full text
    Article
  8. 108

    WAMS Operations in modern power systems: A median expectation-based state estimation approach for grid resilience towards cyber attacks by Asif Gulraiz, Haris M. Khalid, Sajjad Haider Zaidi, Abdulla Ismail, Cédric Escudero, Farid Flitti, Zafar Said, Mohammad Amir

    Published 2025-09-01
    “…The proposed scheme was further validated on IEEE 13 and 37 Bus-test feeder systems under various disturbances and severe injection attacks. The proposed scheme demonstrates 1) accurate state estimation capabilities with 2) faster computation times while successfully 3) identifying attack corruption and 4) generating residual error measurements.…”
    Get full text
    Article
  9. 109

    Multi-model assurance analysis showing large language models are highly vulnerable to adversarial hallucination attacks during clinical decision support by Mahmud Omar, Vera Sorin, Jeremy D. Collins, David Reich, Robert Freeman, Nicholas Gavin, Alexander Charney, Lisa Stump, Nicola Luigi Bragazzi, Girish N. Nadkarni, Eyal Klang

    Published 2025-08-01
    “…Abstract Background Large language models (LLMs) show promise in clinical contexts but can generate false facts (often referred to as “hallucinations”). One subset of these errors arises from adversarial attacks, in which fabricated details embedded in prompts lead the model to produce or elaborate on the false information. …”
    Get full text
    Article
  10. 110

    Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley by Alaa Selim, Huadong Mo, Hemanshu Pota

    Published 2025-02-01
    “…These signals serve as a complementary example of adversarial attacks, demonstrating how such noise can destabilize estimation algorithms and lead to critical control errors. …”
    Get full text
    Article
  11. 111

    Nonfragile State Estimator Design for Memristor-Based Fractional-Order Neural Networks with Randomly Occurring Hybrid Time Delays and Stochastic Cyber-Attacks by Qifeng Niu, Xiaoguang Shao, Yanjuan Lu, Yibo Zhao, Jie Zhang

    Published 2025-07-01
    “…In real network environments, the outputs may be compromised by cyber-attacks, which can disrupt data transmission systems. …”
    Get full text
    Article
  12. 112

    Block Encryption LAyer (BELA): Zero-Trust Defense Against Model Inversion Attacks for Federated Learning in 5G/6G Systems by Sunder A. Khowaja, Parus Khuwaja, Kapal Dev, Keshav Singh, Xingwang Li, Nikolaos Bartzoudis, Ciprian R. Comsa

    Published 2025-01-01
    “…However, the FL paradigm is still vulnerable to model inversion attacks, which allow malicious attackers to reconstruct data by using the trained model gradients. …”
    Get full text
    Article
  13. 113

    Reputation mechanism based on multi-path routing protocol in ad hoc networks by CUI Guo-hua, LU She-jie, LIU Zhi-yuan, GENG Yong-jun

    Published 2008-01-01
    “…Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. …”
    Get full text
    Article
  14. 114

    Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks by Chuhan Zhou, Ying Wang, Yun Sun, Chaoqi Fu

    Published 2024-11-01
    “…This controller is tailored to the network connectivity characteristics of NCSs, ensuring resilient convergence of the system despite asynchronous DoS attacks. Notably, consensus tracking errors are maintained within predefined performance bounds. …”
    Get full text
    Article
  15. 115

    Fixed-Time Distributed Event-Triggered Cooperative Guidance Methods for Multiple Vehicles with Limited Communications to Achieve Simultaneous Arrival by Zhenzhen Gu, Xugang Wang, Zhongyuan Wang

    Published 2024-08-01
    “…Aiming at the salvo-attack problem of multiple missiles, a distributed cooperative guidance law based on the event-triggered mechanism is proposed, which enables missiles with large differences in spatial location and velocity to achieve simultaneous attacks with only a few dozen information exchanges. …”
    Get full text
    Article
  16. 116

    Rapid simulation of wave runup on morphologically diverse, reef-lined coasts with the BEWARE-2 (Broad-range Estimator of Wave Attack in Reef Environments) meta-process model by R. McCall, C. Storlazzi, F. Roelvink, S. G. Pearson, R. de Goede, J. A. Á. Antolínez

    Published 2024-10-01
    “…In the validation stage, the BEWARE-2 modeling system produced runup results that had a relative root mean square error of 13 % and relative bias of 5 % relative to runup simulated by XBeach Non-Hydrostatic for a large range of oceanographic forcing conditions and for diverse reef morphologies (root mean square error and bias 0.63 and 0.26 m, respectively, relative to mean simulated wave runup of 4.85 m). …”
    Get full text
    Article
  17. 117

    An optimal L∞-PLA algorithm for trajectory data compression by ZHAO Huanyu, SUN Guohao, LI Tongliang, YANG Jian, PANG Chaoyi

    Published 2024-09-01
    “…This paper presented a novel multi-dimensional compression problem under maximum error bound (mDisPLA∞), and proposed an optimal online PLA algorithm MDisPLA to solve it. …”
    Get full text
    Article
  18. 118

    Real-World Smartphone Data Predicts Mood After Ischemic Stroke and Transient Ischemic Attack Symptoms and May Constitute Digital Endpoints: A Proof-of-Concept Study by Stephanie Zawada, PhD, MS, Jestrii Acosta, MS, Caden Collins, BA, Oana Dumitrascu, MD, MS, Ehab Harahsheh, MBBS, Clinton Hagen, MS, Ali Ganjizadeh, MD, Elham Mahmoudi, MD, Bradley Erickson, MD, PhD, Bart Demaerschalk, MD, MSc

    Published 2025-09-01
    “…Using demographic data and the most recent PHQ-8 scores, average root-mean-squared error for depression severity prediction across models was 1.64 with only PHQ-8 scores, 1.49 also including accelerometer and GPS data, and 1.36 also including PHQ-8 administration duration. …”
    Get full text
    Article
  19. 119

    Dual antiplatelet therapy versus aspirin alone in acute ischemic stroke or transient ischemic attack: A meta-analysis and trial sequential analysis of randomized controlled trials by Ramez M Odat, Sakhr Alshwayyat, Zainab I Bahdar, Mohammad Abdelraheem, Basma B Khalefa, Omar Jarah, Mohammad H Obeidat, Mohammad E Bani Khalaf, Aon J Bani Khalaf, Ayham Mohammad Hussein, Jehad A Yasin, Hamdah Hanifa, Hritvik Jain

    Published 2025-05-01
    “…Introduction Data regarding the role of dual antiplatelet therapy in patients with ischemic stroke or transient ischemic attack are limited. This study aimed to systematically review and analyze the efficacy and safety of dual antiplatelet therapy compared with aspirin alone in patients with acute ischemic stroke or transient ischemic attack. …”
    Get full text
    Article
  20. 120

    Legacy electronic health record systems as culprit behind cybersecurity risks in public healthcare facilities of South Africa by Kabelo Given Chuma

    Published 2025-12-01
    “…These security incidents resulted in severe consequences, including data loss, system errors and failures, operational disruptions, unexpected downtime, and sluggish system performance. …”
    Get full text
    Article