We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Blockchain-based immunization against kleptographic attacks

    Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel...

    Changsong Jiang, Chunxiang Xu, ... Kefei Chen in Science China Information Sciences
    Article 06 June 2024
  2. DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol

    Resource Attacks in the Internet of Things (IoT) target to attack resource-related things. It affects the memory, processing, energy, and battery of...

    Deepavathi Paganraj, Mala Chelliah in The Journal of Supercomputing
    Article 23 June 2024
  3. Detection of adversarial attacks based on differences in image entropy

    Although deep neural networks (DNNs) have achieved high performance across various applications, they are often deceived by adversarial examples...

    Gwonsang Ryu, Daeseon Choi in International Journal of Information Security
    Article Open access 17 August 2023
  4. Phishing attacks: risks and challenges for law firms

    Law firms have become prime targets for cybercriminals. This is also because the volume of sensitive data handled by the average law firm has...

    Fabian M. Teichmann, Sonia R. Boticiu in International Cybersecurity Law Review
    Article 07 February 2024
  5. Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder

    Abstract

    Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition...

    V. V. Platonov, N. M. Grigorjeva in Automatic Control and Computer Sciences
    Article 01 December 2023
  6. State of the art on adversarial attacks and defenses in graphs

    Graph neural networks (GNNs) had shown excellent performance in complex graph data modelings such as node classification, link prediction and graph...

    Zhengli Zhai, Penghui Li, Shu Feng in Neural Computing and Applications
    Article 16 July 2023
  7. Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering

    Abstract —

    The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of...

    A. D. Dakhnovich, D. S. Zagalsky, R. S. Solovey in Automatic Control and Computer Sciences
    Article 01 December 2023
  8. Local imperceptible adversarial attacks against human pose estimation networks

    Deep neural networks are vulnerable to attacks from adversarial inputs. Corresponding attack research on human pose estimation (HPE), particularly...

    Fuchang Liu, Shen Zhang, ... Yongwei Miao in Visual Computing for Industry, Biomedicine, and Art
    Article Open access 21 November 2023
  9. A novel approach detection for IIoT attacks via artificial intelligence

    The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as...

    Gökçe Karacayılmaz, Harun Artuner in Cluster Computing
    Article Open access 06 May 2024
  10. Targeted adversarial attacks on wind power forecasts

    In recent years, researchers proposed a variety of deep learning models for wind power forecasting. These models predict the wind power generation of...

    René Heinrich, Christoph Scholz, ... Malte Lehna in Machine Learning
    Article Open access 13 September 2023
  11. Black-box attacks on face recognition via affine-invariant training

    Deep neural network (DNN)-based face recognition has shown impressive performance in verification; however, recent studies reveal a vulnerability in...

    Bowen Sun, Hang Su, Shibao Zheng in Neural Computing and Applications
    Article 25 February 2024
  12. Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks

    Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that...

    Haoran Lyu, Yajie Wang, ... Quanxin Zhang in Cybersecurity
    Article Open access 02 March 2024
  13. Time series adversarial attacks: an investigation of smooth perturbations and defense approaches

    Adversarial attacks represent a threat to every deep neural network. They are particularly effective if they can perturb a given model while...

    Gautier Pialla, Hassan Ismail Fawaz, ... Germain Forestier in International Journal of Data Science and Analytics
    Article Open access 24 October 2023
  14. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

    The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to...

    Qianqian Yang, Ling Song, ... Jian Weng in Journal of Cryptology
    Article 10 April 2024
  15. Leveraging blockchain and machine learning to counter DDoS attacks over IoT network

    The paper presents an approach for detecting Distributed Denial of Service (DDoS) attacks using machine learning and blockchain technology. With the...

    Pooja Kumari, Ankit Kumar Jain, ... Raghav in Multimedia Tools and Applications
    Article 20 March 2024
  16. Secure Voice Processing Systems against Malicious Voice Attacks

    This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...

    Kun Sun, Shu Wang in SpringerBriefs in Computer Science
    Book 2024
  17. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile

    In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the...

    Shaoyong Li, Xueshu Hong, Yao Feng in Cluster Computing
    Article 25 July 2023
  18. Adversarial attacks in computer vision: a survey

    Deep learning, as an important topic of artificial intelligence, has been widely applied in various fields, especially in computer vision...

    Chao Li, Handing Wang, ... Tingsong Jiang in Journal of Membrane Computing
    Article 10 April 2024
  19. Data Poisoning Attacks and Mitigation Strategies on Federated Support Vector Machines

    Federated learning is a machine learning approach where multiple edge devices, each holding local data samples, send a locally trained model to the...

    Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan in SN Computer Science
    Article 27 January 2024
  20. Leveraging deep learning-assisted attacks against image obfuscation via federated learning

    Obfuscation techniques (e.g., blurring) are employed to protect sensitive information (SI) in images such as individuals’ faces. Recent works...

    Jimmy Tekli, Bechara Al Bouna, ... Antoine Charbel in Neural Computing and Applications
    Article 18 May 2024
Did you find what you were looking for? Share feedback.