Showing 121 - 140 results of 416 for search 'error attacks', query time: 0.12s Refine Results
  1. 121

    ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Medical Errors in the Era of Generative AI and Cloud-Based Health Information Ecosystems by Khalid Al-hammuri, Fayez Gebali, Awos Kanan

    Published 2024-07-01
    “…However, as telehealth technology continues to evolve and Internet of Things (IoT) devices become more widely used, they are also increasingly exposed to various types of vulnerabilities and medical errors. In healthcare information systems, about 90% of vulnerabilities emerge from medical error and human error. …”
    Get full text
    Article
  2. 122

    Análisis observacional del ataque a una pierna del central en el voleibol femenino (Observational analysis of the one-leg attack of the central player in female volleyball) by Sergi Forrat-Fuster, Bruno Bazuelo Ruiz

    Published 2024-01-01
    “…The shot to the diagonal obtained similar results in the points achieved as the shot to the line but with a lower percentage of error. Conclusions: the attack after a positive double reception, the attack at the first half, the shot to the diagonal and the shot "fast" were the actions with which better sports performance was obtained and caused a greater rival defensive disorganization. …”
    Get full text
    Article
  3. 123

    On the Properties of Algebraic Geometric Codes as Copy Protection Codes by Vladimir M. Deundyak, Denis V. Zagumennov

    Published 2020-03-01
    “…To prevent this attacks, classes of error-correcting codes with special c-FP and c-TA properties are used. …”
    Get full text
    Article
  4. 124

    Dual-Model Synergy for Fingerprint Spoof Detection Using VGG16 and ResNet50 by Mohamed Cheniti, Zahid Akhtar, Praveen Kumar Chandaliya

    Published 2025-02-01
    “…Similarly, the Attack Presentation Classification Error Rate (APCER) remains low at 0.35% on LivDet 2013 and 3.68% on LivDet 2015. …”
    Get full text
    Article
  5. 125

    MSRD-CNN: Multi-Scale Residual Deep CNN for General-Purpose Image Manipulation Detection by Kapil Rana, Gurinder Singh, Puneet Goyal

    Published 2022-01-01
    “…The experiment results show that our model surpasses the existing schemes even under anti-forensic attacks, when evaluated on large-scale datasets by considering multiple image processing operations. …”
    Get full text
    Article
  6. 126

    An improvement of both security and reliability for AES implementations by Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout

    Published 2022-11-01
    “…Cryptographic circuits, because they contain confidential information, are subject to fraudulent manipulations, commonly called attacks, by ill-intentioned people. Several attacks have been identified and analyzed. …”
    Get full text
    Article
  7. 127

    Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism by Kai Zhang, Pei-Wei Tsai, Jiao Tian, Wenyu Zhao, Xinyi Cai, Longxiang Gao, Jinjun Chen

    Published 2024-09-01
    “…Additionally, this mechanism can synchronize historical query information and privacy budget consumption within the blockchain network to prevent privacy leakage. We employ Relative Error (RE), Mean Square Error (MSE), and privacy budget consumption as evaluation metrics to measure the performance of the proposed mechanism. …”
    Get full text
    Article
  8. 128

    Improved integral neural distinguisher model for lightweight cipher PRESENT by Wanqing Wu, Mingyu Guo

    Published 2024-12-01
    “…The results demonstrate that the key recovery success rates for 5-round and 6-round are 98% and 90%, considering error bits within a range of two bits.…”
    Get full text
    Article
  9. 129

    Framingham Risk Score Prediction at 12 Months in the STANDFIRM Randomized Control Trial by Thanh G. Phan, Velandai K. Srikanth, Dominique A. Cadilhac, Mark Nelson, Joosup Kim, Muideen T. Olaiya, Sharyn M. Fitzgerald, Christopher Bladin, Richard Gerraty, Henry Ma, Amanda G. Thrift

    Published 2025-05-01
    “…Background The STANDFIRM (Shared Team Approach Between Nurses and Doctors for Improved Risk Factor Management; ANZCTR registration ACTRN12608000166370) trial was designed to test the effectiveness of chronic disease care management for modifying the Framingham risk score (FRS) among patients with stroke or transient ischemic attack. The primary outcome of change in FRS was not met. …”
    Get full text
    Article
  10. 130

    DeepLASD countermeasure for logical access audio spoofing by Hamed Al-Tairi, Ali Javed, Tasawer Khan, Abdul Khader Jilani Saudagar

    Published 2025-07-01
    “…Abstract Voice-based authentication systems have become increasingly vulnerable to logical access (LA) spoofing through sophisticated voice conversion (VC) and text-to-speech (TTS) attacks. This paper proposes an end-to-end deep learning approach DeepLASD, that processes raw waveforms to detect spoofed speech without relying on handcrafted features. …”
    Get full text
    Article
  11. 131

    Prediction-Based Distributed State Estimation Control for IoT-Enabled Train Positioning Systems by L. Ponnarasi, P. B. Pankajavalli, Y. Lim, R. Sakthivel, Sultan Alfarhood, Mejdl Safran

    Published 2025-01-01
    “…To mitigate the adverse effects of sensor attacks and faults on estimation performance, a novel resilient distributed state estimation method is proposed. …”
    Get full text
    Article
  12. 132
  13. 133
  14. 134

    Increasing the Efficiency of Blind Decoding of the Steganographic Method with Code Control of Additional Information Embedding by Sokolov A.V., Ihnatenko O.O., Balandina N.M.

    Published 2024-04-01
    “…This purpose was achieved by identifying two factors that determine the occurrence of errors during blind decoding of additional information in the steganographic method with code control: variation of sub-blocks, and errors caused by attacks against the embedded message. …”
    Get full text
    Article
  15. 135

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  16. 136

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  17. 137

    Adversarial defense for battery state-of-health prediction models by Masoumeh Mohammadi, Insoo Sohn

    Published 2025-06-01
    “…To enhance model robustness, we propose a two-defense strategy against such attacks. The effectiveness of these defenses is evaluated using error metrics such as root-mean-square error (RMSE), mean absolute error (MAE), and mean-square error (MSE). …”
    Get full text
    Article
  18. 138

    Position related lightweight Sybil detection approach in VANET by Yan XIN, Xia FENG, Ting-ting LI

    Published 2017-04-01
    “…In VANET,the Sybil attack simultaneously using multiple forged identities can easily cause the injustice of resource usage and make networks in a mess by distributing false messages.To solve this problem,an event-driven lightweight algorithm was proposed,which could identify vehicles false position quickly.When one vehicle appeared inside another's safety zone,a geometrical cross-recognition algorithm to calculate the overlap between vehicles to detect false position claiming was presented.At the same time,according to the neighbors within the confirming vehicle's radio range,position deviation matrix was established further to identify the Sybil node of two overlap vehicles.The performance analysis and simulation results show that the lightweight algorithm driven by safety zone demonstrates fast identification and high detection rate,especially when GPS error is very low.The imported safety zone can also balance the communication load impacting by heavy vehicular density.And the communication processing delay is lower than other approaches.…”
    Get full text
    Article
  19. 139

    Modular Neural Network Model for Biometric Authentication of Personnel in Critical Infrastructure Facilities Based on Facial Images by Oleksandr Korchenko, Ihor Tereikovskyi, Ruslana Ziubina, Liudmyla Tereikovska, Oleksandr Korystin, Oleh Tereikovskyi, Volodymyr Karpinskyi

    Published 2025-02-01
    “…The experimental results show that the proposed model allows for a 5–10% decrease in person recognition error, recognition of spoofing attacks based on the naturalness of emotions and images of background objects, and recognition of the emotional state of personnel, which increases the efficiency of biometric authentication tools.…”
    Get full text
    Article
  20. 140