Showing 141 - 160 results of 416 for search 'error attacks', query time: 0.11s Refine Results
  1. 141

    PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach by Wafaa Kanakri, Brian King

    Published 2025-03-01
    “…Unlike symmetric approaches, PK-Judge employs a public key infrastructure (PKI) to decouple ownership validation from the extraction process, significantly increasing its resilience against adversarial attacks. Additionally, it incorporates a robust challenge-response mechanism to mitigate replay attacks and leverages error correction codes (ECC) to achieve an Effective Bit Error Rate (EBER) of zero, ensuring watermark integrity even under conditions such as fine-tuning, pruning, and overwriting. …”
    Get full text
    Article
  2. 142
  3. 143

    Adversarial Sample Generation Method Based on Frequency Domain Transformation and Channel Awareness by Yalin Gao, Dongwei Xu, Huiyan Zhu, Qi Xuan

    Published 2025-06-01
    “…The experimental results show that SDRNet is superior to traditional algorithms (such as the least square method, minimum mean square error estimation, etc.) in both mean square error and bit error rate. …”
    Get full text
    Article
  4. 144

    Tactical and statistical analysis of spiking efficiency by type, zone and set phase in women's volleyball by Kiattisak Sitti, K. Ravivuth Rangubhet

    Published 2025-08-01
    “…Tip shots had the lowest efficiency (EI = 0.22) but the highest continuation rate (61%). Side zone attacks exhibited higher kill rates (25.2%) and efficiency (EI = 0.227) than central zone attacks (14.1% kill rate, EI = 0.106). …”
    Get full text
    Article
  5. 145
  6. 146

    CoPaD-Mark: A Coded Parallelizable Deep Learning-Based Scheme for Robust Image Watermarking by Andy M. Ramos, Cecilio Pimentel, Daniel P. B. Chaves

    Published 2025-01-01
    “…The information bits embedded in the image are derived from the parity bits of an error-correcting code. This code’s message is constructed by combining a chaotic binary sequence with the original watermark bits. …”
    Get full text
    Article
  7. 147

    Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication by Guizhou Cao, Dawei Xia, Bokang Liu, Kai Meng, Zhenlong Wu, Yuan-Cheng Sun

    Published 2025-01-01
    “…The closed-loop performance is analyzed for the GU system in the input-to-state stable framework with or without attack. According to the DoS attack model, which is described by the assumptions of frequency and duration, the conservativeness of the tolerable DoS attack index is reduced by using the thought of robustness to the maximum disturbance-induced error. …”
    Get full text
    Article
  8. 148

    Verification of color characteristics of document images captured in uncontrolled conditions by I.A. Kunina, O.A. Padas, O.A. Kolomyttseva

    Published 2024-08-01
    “…This paper examines a presentation attack when a color photo of a gray copy of a document is presented instead of the original color document during remote user identification. …”
    Get full text
    Article
  9. 149

    Machine Learning Approach to Aerodynamic Analysis of NACA0005 Airfoil: ANN and CFD Integration by Taiba Kouser, Dilek Funda Kurtulus, Srikanth Goli, Abdulrahman Aliyu, Imil Hamda Imran, Luai M. Alhems, Azhar M. Memon

    Published 2025-01-01
    “…Data generated by computational fluid dynamics (CFD) is used to train the model for Reynolds numbers <inline-formula> <tex-math notation="LaTeX">$Re \in [{1000-5000}]$ </tex-math></inline-formula> and angles of attack ranging from 9&#x00B0; to 11&#x00B0;. A robust Scaled Conjugate Gradient (SCG) algorithm is employed for efficient training of data. …”
    Get full text
    Article
  10. 150

    Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms by Siva Ram Rajeyyagari, Srinivas Nowduri

    Published 2024-06-01
    “…The models are evaluated against a comprehensive set of performance metrics: Root Mean Square Error (RMSE), Mean Squared Error (MSE), coefficient of determination (R²), correlation coefficient (R), Mean Absolute Error (MAE), Relative Absolute Error (RAE), Squared Error (SE), Mean Absolute Percentage Error (MAPE), and Normalized Mean Squared Error (NMSE). …”
    Get full text
    Article
  11. 151

    Information Theoretic Analysis of PUF-Based Tamper Protection by Georg Maringer, Matthias Hiller

    Published 2025-03-01
    “…We apply zero leakage output quantization to existing quantization schemes and minimize the reconstruction error probability under zero leakage. We apply wiretap coding within a helper data algorithm to enable a reliable key reconstruction for the legitimate user while guaranteeing a selectable reconstruction complexity for an attacker, analogously to the security level for a cryptographic algorithm for the attacker models considered in this work. …”
    Get full text
    Article
  12. 152

    Acute hepatic porphyrias for the neurologist: current concepts and perspectives by Paulo Victor Sgobbi de Souza, Bruno de Mattos Lombardi Badia, Igor Braga Farias, Eduardo Augusto Gonçalves, Wladimir Bocca Vieira de Rezende Pinto, Acary Souza Bulle Oliveira

    Published 2021-01-01
    “…ABSTRACT Background: Acute hepatic porphyrias represent an expanding group of complex inherited metabolic disorders due to inborn errors of metabolism involving heme biosynthesis. …”
    Get full text
    Article
  13. 153

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…To achieve zero-bit error restoration, we utilize the differential evolution algorithm to optimize adversarial perturbations while minimizing distortion. …”
    Get full text
    Article
  14. 154

    Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal

    Published 2025-01-01
    “…The overall analysis of proposed work significantly improves result in terms of the security and robustness under various attacks.…”
    Get full text
    Article
  15. 155

    A compact public key encryption with equality test for lattice in cloud computing by Junfei He, Qing Ye, Zhichao Yang, Shixiong Wang, Jiasheng Wang

    Published 2025-07-01
    “…With those efforts, our scheme can withstand the chosen ciphertext attacks as long as the learning with errors (LWE) assumption holds. …”
    Get full text
    Article
  16. 156

    Anti-Jamming RIS Communications Using DQN-Based Algorithm by Pham Duy Thanh, Hoang Thi Huong Giang, Ic-Pyo Hong

    Published 2022-01-01
    “…As a result, the optimal resource allocation is achieved through trial-and-error interactions with environment by observing the predefined rewards and the network state transition. …”
    Get full text
    Article
  17. 157

    False data intrusion detection method for power grid based on deep machine learning by ZHU Wen, HU Yaping, NIE Yongquan, JIANG Wei, XIE Hu

    Published 2025-06-01
    “…False data injection attacks (FDIAs) are obtained by continuously adding error measurement vectors in PMU to judge whether the power grid has been attacked by false information and predict the location value of possible attacks. …”
    Get full text
    Article
  18. 158

    Estimation of Fractal Dimension and Detection of Fake Finger-Vein Images for Finger-Vein Recognition by Seung Gu Kim, Jin Seong Hong, Jung Soo Kim, Kang Ryoung Park

    Published 2024-10-01
    “…Furthermore, experiments conducted with the proposed spoof detector yielded average classification error rates of 0.4% and 0.12% on the two aforementioned open databases, respectively, outperforming existing SOTA methods for spoof detection.…”
    Get full text
    Article
  19. 159

    CFD-Modeling of the Airfoil of the Blades of a Wind Power Plant with a Vertical Axis in the Ansys Fluent System by G. N. Uzakov, V. A. Sednin, A. B. Safarov, R. A. Mamedov, I. A. Khatamov

    Published 2024-04-01
    “…In assessing the compatibility of the model and the experimental results of the DU-06-W-200 airfoil, the conformity criterion χ2, root mean square error (RMSE), coefficient of determination (R2), and average bias error (ABE) were used. …”
    Get full text
    Article
  20. 160

    Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE by Siliang Zhao, Wuman Luo, Qin Shu, Fangwei Xu

    Published 2025-02-01
    “…Current machine learning-based approaches struggle to effectively control state estimation errors and are confined to the data distribution of training sets. …”
    Get full text
    Article