Showing 161 - 180 results of 416 for search 'error attacks', query time: 0.08s Refine Results
  1. 161
  2. 162

    Dynamic Group Key Exchange Protocol With Lattice Trapdoor and Re-Encryption Mechanisms by Narn-Yih Lee, Yuan-Ting Tsai

    Published 2025-01-01
    “…Specifically, our approach utilizes lattice trapdoors and a re-encryption mechanism based on the Ring Learning With Errors (RLWE) problem. This design not only achieves post-quantum security but also enhances efficiency and flexibility in dynamic group settings. …”
    Get full text
    Article
  3. 163

    A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function by Yangchao He, Jiong Li, Lei Shao, Chijun Zhou, Xiangwei Bu

    Published 2025-01-01
    “…This paper proposes a trajectory prediction method via the adaptive cost function to address the difficulties in inferring the attack intention and maneuver mode, as well as the accumulation of prediction error during the trajectory prediction of reentry glide vehicles. …”
    Get full text
    Article
  4. 164

    Combined compression and encryption of linear wireless sensor network data using autoencoders by N. Shylashree, Sachin Kumar, Hong Min

    Published 2025-05-01
    “…The proposed lossy compression has a mean square reconstruction error of less than 0.5 for compression ratios in the range of 5 to 10. …”
    Get full text
    Article
  5. 165
  6. 166

    A comparative study of ultra-massive MIMO intelligent receivers with adversarial robustness and energy efficiency for 6G applications by Pushkar Nidagundi, Advesh Darvekar, Malik Amber, Ramesh R

    Published 2025-06-01
    “…The approach integrates advanced technologies including UM-MIMO, cognitive radio, and Artificial Intelligence (AI)-based detection to enhance robustness against adversarial attacks. Simulation results demonstrate that the optimized Minimum Mean Square Error (MMSE) detector achieves up to 95 % reduction in Bit Error Rate (BER) compared to Zero-Forcing (ZF) in small-to-medium UM-MIMO configurations (2 × 2 to 32 × 32), as shown in Tables (4 and 5), while maintaining computational feasibility. …”
    Get full text
    Article
  7. 167

    Ethernet Passive Mutual Authentication Scheme on Quantum Networks by Jianuo Tian, Panke Qin, Zongqu Zhao, Baodong Qin

    Published 2025-01-01
    “…The proposed scheme leverages the security of the ring learning with errors (RLWE) problem to establish a robust public-key cryptosystem. …”
    Get full text
    Article
  8. 168

    Research on the Improvement of the Signal Time Delay Estimation Method of Acoustic Positioning for Anti-Low Altitude UAVs by Miao Liu, Jiyan Yu, Zhengpeng Yang

    Published 2025-04-01
    “…With the popularity of low-altitude small unmanned aerial vehicles (UAVs), UAVs are often used to take candid photos or even carry out malicious attacks. Acoustic detection can be used to locate UAVs in order to prevent malicious attacks by UAVs. …”
    Get full text
    Article
  9. 169

    Improve security of wireless sensor networks through reluctant checksum by Qiong Zhang, Jianyu Xiao

    Published 2017-09-01
    “…But an adversary can still recover the secrets by eavesdropping the frames and performing off-line brute-force attacks. Capturing valid frames is fundamental for such attacks. …”
    Get full text
    Article
  10. 170

    Quantum dialogue protocol based on self-dual quantum low density parity check codes by Fen LIU, Zhenxing HE, Pengao XU, Hongyang MA

    Published 2020-08-01
    “…In quantum channels,particles are usually affected by noise during transmission.A quantum dialogue protocol based on self-dual quantum low density parity check codes was proposed to resist noise attacks.A combination of B construction method and U construction method was used to construct a self-dual quantum low density parity check matrix.The proposed quantum dialogue protocol can resist common external attacks,and there was no information leakage,which improved the efficiency of encoding and decoding.The security of quantum dialogue protocol was studied from the perspective of error correction.Security analysis shows that the protocol has sufficient security and can effectively resist common malicious attacks.…”
    Get full text
    Article
  11. 171

    Facial Anti-Spoofing Using “Clue Maps” by Liang Yu Gong, Xue Jun Li, Peter Han Joo Chong

    Published 2024-11-01
    “…In addition, the inter-dataset on CASIA-MFSD (training set) and Replay-attack (Testing set) reaches a new state-of-the-art performance with 23.8% Half Total Error Rate (HTER).…”
    Get full text
    Article
  12. 172

    Model and training method for aerial image object detector with optimization of both robustness and computational efficiency by Alona Moskalenko, Mykola Zaretskyi, Maksym Vynohradov, Vladyslav Babych

    Published 2024-10-01
    “…However, the vulnerability of neural networks to noise, adversarial attacks, and weight error injections significantly diminishes their robustness and overall effectiveness. …”
    Get full text
    Article
  13. 173

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…For checking the effectiveness of the suggested method, an open-source dataset was applied, which recorded the traffic of CAN using a real vehicle throughout injection attacks of message. The results show that this method outperforms certain machine learning algorithms in error rate and false negative for DoS and drive gear and RPM spoofing attack with accuracy of 96.3%, recall of 96.1%, F1-Score of 96.2%, specificity of 97.2%, accuracy of 96.3%, AUC-ROC of 0.97, and MCC of 0.92 for DoS attacks. …”
    Get full text
    Article
  14. 174

    Enhancing Voice Spoofing Detection: A Hybrid Approach With VGGish-LSTM Model for Improved Security in Automatic Speaker Verification Systems by Komal Shahzad, Saima Farhan, Yasin-Ul-Haq, Rabia Sana, Salman Pathan

    Published 2025-01-01
    “…Cybercrimes frequently manifest through the utilization of the internet. Spoofing attacks epitomize an advanced facet of contemporary cybercrime. …”
    Get full text
    Article
  15. 175

    A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain by Anshula Sangwan, Hukum Singh

    Published 2021-01-01
    “…The efficacy of the system is calculated by evaluating the estimated error between the input and retrieved images. The proposed technique provides innumerable security keys and is robust against various potential attacks. …”
    Get full text
    Article
  16. 176

    Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme by Yuli Yang, Meiru Jiang, Xiufang Feng, Chenchen Lu, Yongle Chen, Shuang Zhou, Hao Zhang

    Published 2024-01-01
    “…In comparison, the mean square error of the proposed rotation angle estimation model rose from 0.042 to 0.018, and the mean absolute error climbed from 0.065 to 0.032. …”
    Get full text
    Article
  17. 177

    Enhancing the reliability and accuracy of wireless sensor networks using a deep learning and blockchain approach with DV-HOP algorithm for DDoS mitigation and node localization by Bhupinder Kaur, Deepak Prashar, Leo Mrsic, Ahmad Almogren, Ateeq Ur Rehman, Ayman Altameem, Seada Hussen

    Published 2025-06-01
    “…Abstract Wireless sensor networks (WSNs) are subject to distributed denial-of-service (DDoS) attacks that impact data dependability, mobility of nodes, and energy drain. …”
    Get full text
    Article
  18. 178

    Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach by Armita Kazeminajafabadi, Mahdi Imani

    Published 2024-01-01
    “…The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. This paper develops two security policies based on the optimal stationary defense policy for the underlying POMDP state process (i.e., a network with known compromises): the estimation-based policy that performs the defense actions corresponding to the optimal minimum mean square error state estimation and the distribution-based policy that utilizes the posterior distribution of network compromises to make defense decisions. …”
    Get full text
    Article
  19. 179

    Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT by Jueun Jeon, Seungyeon Baek, Byeonghui Jeong, Young-Sik Jeong

    Published 2023-12-01
    “…Consequently, ransomware attacks to encrypt healthcare systems or leak such data have increased recently. …”
    Get full text
    Article
  20. 180

    Metrics for code obfuscation based on symbolic execution and N-scope complexity by Yuqiang XIAO, Yunfei GUO, Yawen WANG

    Published 2022-12-01
    “…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
    Get full text
    Article