Search
Search Results
-
Blockchain-based immunization against kleptographic attacks
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel...
-
The most impactful ransomware attacks in 2023 and their business implications
The impact of a ransomware attack can be devastating, and any organization in any sector can become a victim. In particular, a ransomware attack can...
-
A survey on privacy-preserving federated learning against poisoning attacks
Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training...
-
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to...
-
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks
Nowadays, the growth of internet users has led to a significant increase in identity fraud security risks. One of the common forms of identity fraud...
-
Preventing Adversarial Attacks on Autonomous Driving Models
Autonomous driving systems are among the exceptional technological developments of recent times. Such systems gather live information about the... -
Gradient-Based Enhancement Attacks in Biomedical Machine Learning
The prevalence of machine learning in biomedical research is rapidly growing, yet the trustworthiness of such research is often overlooked. While... -
Real-Time Mitigation of Trust-Related Attacks in Social IoT
The social Internet of Things (Social IoT) introduces novel ways to enhance IoT networks and service discovery through social contexts. However,... -
-
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
This paper presents a comprehensive analysis of the verification algorithm of the CRYSTALS-Dilithium, focusing on a C reference implementation.... -
SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning
Federated learning is widely used in mobile computing, the Internet of Things, and other scenarios due to its distributed and privacy-preserving... -
DoS Attacks on Blockchain Ecosystem
Denial of Service (DoS) attacks are a growing threat in network services. The frequency and intensity of DoS attacks are rapidly increasing day by... -
PPAPAFL: A Novel Approach to Privacy Protection and Anti-poisoning Attacks in Federated Learning
In the realm of distributed machine learning, although federated learning has received considerable attention, it still confronts grave challenges... -
Algorithm substitution attacks against receivers
This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our...
-
Three Attacks on Proof-of-Stake Ethereum
Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain... -
Structured argumentation dynamics
This paper develops a logical theory that unifies all three standard types of argumentative attack in AI, namely rebutting, undercutting and...
-
GAN Attacks and Counterattacks in Federated Learning
In this chapter, we will present the related content of generative adversarial networks (GANs) and their applications in the federated learning... -
Enhancing Generalization in Few-Shot Learning for Detecting Unknown Adversarial Examples
Deep neural networks, particularly convolutional neural networks, are vulnerable to adversarial examples, undermining their reliability in visual...
-
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...
-
IoV security and privacy survey: issues, countermeasures, and challenges
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...