We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Exploring the feasibility of adversarial attacks on medical image segmentation

    Recent advancements in Deep Learning (DL) based medical image segmentation models have led to tremendous growth in healthcare applications. However,...

    Sneha Shukla, Anup Kumar Gupta, Puneet Gupta in Multimedia Tools and Applications
    Article 22 June 2023
  2. Leveraging blockchain and machine learning to counter DDoS attacks over IoT network

    The paper presents an approach for detecting Distributed Denial of Service (DDoS) attacks using machine learning and blockchain technology. With the...

    Pooja Kumari, Ankit Kumar Jain, ... Raghav in Multimedia Tools and Applications
    Article 20 March 2024
  3. Defense against adversarial attacks via textual embeddings based on semantic associative field

    Deep neural networks are known to be vulnerable to various types of adversarial attacks, especially word-level attacks, in the field of natural...

    Jiacheng Huang, Long Chen in Neural Computing and Applications
    Article Open access 02 November 2023
  4. Adversarial Attacks on Visual Objects Using the Fast Gradient Sign Method

    Adversarial attacks exploit vulnerabilities or weaknesses in the model’s decision-making process to generate inputs that appear benign to humans but...

    Syed Muhammad Ali Naqvi, Mohammad Shabaz, ... Syeda Iqra Hassan in Journal of Grid Computing
    Article 22 September 2023
  5. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks

    As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly...

    Wenbo Zhang, Tao Wang, ... **gyu Feng in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  6. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges

    Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...

    Batoul Achaal, Mehdi Adda, ... Ali Awde in Cybersecurity
    Article Open access 02 May 2024
  7. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

    The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to...

    Qianqian Yang, Ling Song, ... Jian Weng in Journal of Cryptology
    Article 10 April 2024
  8. Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning

    Real-world face recognition systems are vulnerable to diverse face attacks, ranging from digitally manipulated artifacts to physically crafted...

    Junyi Cao, Ke-Yue Zhang, ... Chao Ma in International Journal of Computer Vision
    Article 02 July 2024
  9. Detection of non-periodic low-rate denial of service attacks in software defined networks using machine learning

    In this paper, we propose a novel approach to detect non-periodic Low-rate Denial of Service attacks in Software Defined Networks using Machine...

    Danial Yousef, Boushra Maala, ... Petr Pokamestov in International Journal of Information Technology
    Article 20 December 2023
  10. Deep learning techniques to detect cybersecurity attacks: a systematic map** study

    Context

    Recent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly...

    Damiano Torre, Frantzy Mesadieu, Anitha Chennamaneni in Empirical Software Engineering
    Article 09 May 2023
  11. WFSS: weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks

    The emergence of adversarial examples poses a significant challenge to hyperspectral image (HSI) classification, as they can attack deep neural...

    Lichun Tang, Zhaoxia Yin, ... Bin Luo in Visual Intelligence
    Article Open access 28 February 2024
  12. Deep learning adversarial attacks and defenses on license plate recognition system

    The breakthroughs in Machine learning and deep neural networks have revolutionized the handling of critical practical challenges, achieving...

    Conrado Vizcarra, Shadan Alhamed, ... Muhammad Anan in Cluster Computing
    Article Open access 01 June 2024
  13. Blockchain-based security framework for mitigating network attacks in multi-SDN controller environment

    In the evolving landscape of network management, multi-Software Defined Networking (SDN) controller environments represent a paradigm shift toward...

    Pulkit Ohri, A. Daniel, ... Sunil Kumar Muttoo in International Journal of Information Technology
    Article 17 June 2024
  14. Quantum impossible differential attacks: applications to AES and SKINNY

    In this paper we propose the first efficient quantum version of key-recovery attacks on block ciphers based on impossible differentials, which was...

    Nicolas David, María Naya-Plasencia, André Schrottenloher in Designs, Codes and Cryptography
    Article 17 August 2023
  15. B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

    Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to...

    Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi in Journal of Big Data
    Article Open access 10 April 2024
  16. Meet-in-the-middle attacks on AES with value constraints

    In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are...

    **aoli Dong, Jun Liu, ... Jie Chen in Designs, Codes and Cryptography
    Article 18 April 2024
  17. A Geth-based real-time detection system for sandwich attacks in Ethereum

    With the rapid development of the Ethereum ecosystem and the increasing applications of decentralized finance (DeFi), the security research of smart...

    Dongze Li, Kejia Zhang, ... Gang Du in Discover Computing
    Article Open access 30 May 2024
  18. Enhancing non-profiled side-channel attacks by time-frequency analysis

    Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of...

    Chengbin **, Yongbin Zhou in Cybersecurity
    Article Open access 01 August 2023
  19. A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture

    Distributed denial-of-service (DDoS) attacks have grown to be a major concern for businesses and individuals who use the internet for operations and...

    Kwitee D. Gaylah, Ravirajsinh S. Vaghela, Wend-Benedo Simeon Zongo in SN Computer Science
    Article 23 August 2023
  20. Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms

    SQL injection is one of the important security issues in web applications because it allows an attacker to interact with the application's database....

    Bahman Arasteh, Babak Aghaei, ... Mahsa Torkamanian-Afshar in Neural Computing and Applications
    Article Open access 27 February 2024
Did you find what you were looking for? Share feedback.