Search
Search Results
-
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
The proliferation of Internet of Things (IoT) devices has revolutionized various domains, but it has also brought forth numerous security challenges....
-
An advanced security model for fog computing to tackle various attacks on the data link layer using the QQL-FHES scheme
Fog computing provides maximum flexibility and low latency by divesting the usage of cloud resources and amenities to the end users. In rendering the...
-
Variational quantum attacks threaten advanced encryption standard based symmetric cryptography
We propose a variational quantum attack algorithm (VQAA) for classical advanced encryption standard (AES)-like symmetric cryptography, as exemplified...
-
Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security
As we all know, modern cryptography is “the scientific study of strategies for safeguarding digital information, transactions, and distributed... -
Adequate responses to cyber-attacks
Cybersecurity has become a prominent issue for companies in all sectors. Businesses need to ensure that they have taken the necessary measures and...
-
Real-time detection of deception attacks in cyber-physical systems
Detection of deception attacks is pivotal to ensure the safe and reliable operation of cyber-physical systems (CPS). Detection of such attacks needs...
-
A novel approach detection for IIoT attacks via artificial intelligence
The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as...
-
Cybersecurity for autonomous vehicles against malware attacks in smart-cities
Smart Autonomous Vehicles (AVSs) are networks of Cyber-Physical Systems (CPSs) in which they wirelessly communicate with other CPSs sub-systems...
-
Targeted adversarial attacks on wind power forecasts
In recent years, researchers proposed a variety of deep learning models for wind power forecasting. These models predict the wind power generation of...
-
Channel-augmented joint transformation for transferable adversarial attacks
Deep neural networks (DNNs) are vulnerable to adversarial examples that fool the models with tiny perturbations. Although adversarial attacks have...
-
T&TRS: robust collaborative filtering recommender systems against attacks
In recent years, the Internet has had a main and important contribution to human life and the amount of data on the World Wide Web such as books,...
-
Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks
The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...
-
A survey on privacy-preserving federated learning against poisoning attacks
Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training...
-
A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection
Medical image protection against tampering attacks remains an ongoing issue, despite the numerous watermarking-based solutions developed thus far....
-
Spoofing attacks against vehicular FMCW radar
The safety and security of the passengers in vehicles in the face of cyber attacks is a key concern in the automotive industry, especially with the...
-
Data Poisoning Attacks and Mitigation Strategies on Federated Support Vector Machines
Federated learning is a machine learning approach where multiple edge devices, each holding local data samples, send a locally trained model to the...
-
Secure Voice Processing Systems against Malicious Voice Attacks
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...
-
Adversarial attacks in computer vision: a survey
Deep learning, as an important topic of artificial intelligence, has been widely applied in various fields, especially in computer vision...
-
Black-box attacks on face recognition via affine-invariant training
Deep neural network (DNN)-based face recognition has shown impressive performance in verification; however, recent studies reveal a vulnerability in...
-
Timely detection of DDoS attacks in IoT with dimensionality reduction
The exponential growth of IoT devices and their interdependency makes the technology more vulnerable to network attacks like Distributed Denial of...