We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 757 results
  1. Blockchain-based immunization against kleptographic attacks

    Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel...

    Changsong Jiang, Chunxiang Xu, ... Kefei Chen in Science China Information Sciences
    Article 06 June 2024
  2. The most impactful ransomware attacks in 2023 and their business implications

    The impact of a ransomware attack can be devastating, and any organization in any sector can become a victim. In particular, a ransomware attack can...

    Fabian M. Teichmann, Sonia R. Boticiu in International Cybersecurity Law Review
    Article 10 April 2024
  3. A survey on privacy-preserving federated learning against poisoning attacks

    Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training...

    Feng **a, Wenhao Cheng in Cluster Computing
    Article 01 July 2024
  4. C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

    Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to...

    Raja Zeeshan Haider, Baber Aslam, ... Zafar Iqbal in International Journal of Information Security
    Article 29 April 2024
  5. GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

    Nowadays, the growth of internet users has led to a significant increase in identity fraud security risks. One of the common forms of identity fraud...

    Fabrice Mvah, Vianney Kengne Tchendji, ... Charles Kamhoua in International Journal of Information Security
    Article 26 August 2023
  6. Preventing Adversarial Attacks on Autonomous Driving Models

    Autonomous driving systems are among the exceptional technological developments of recent times. Such systems gather live information about the...
    Junaid Sajid, Bareera Anam, ... Samee U. Khan in Wireless Internet
    Conference paper 2023
  7. Gradient-Based Enhancement Attacks in Biomedical Machine Learning

    The prevalence of machine learning in biomedical research is rapidly growing, yet the trustworthiness of such research is often overlooked. While...
    Conference paper 2023
  8. Real-Time Mitigation of Trust-Related Attacks in Social IoT

    The social Internet of Things (Social IoT) introduces novel ways to enhance IoT networks and service discovery through social contexts. However,...
    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in Model and Data Engineering
    Conference paper 2024
  9. Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification

    This paper presents a comprehensive analysis of the verification algorithm of the CRYSTALS-Dilithium, focusing on a C reference implementation....
    Andersson Calle Viera, Alexandre Berzati, Karine Heydemann in Smart Card Research and Advanced Applications
    Conference paper 2024
  10. SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning

    Federated learning is widely used in mobile computing, the Internet of Things, and other scenarios due to its distributed and privacy-preserving...
    Zhuotao Lian, Chen Zhang, ... Chunhua Su in Network and System Security
    Conference paper 2023
  11. DoS Attacks on Blockchain Ecosystem

    Denial of Service (DoS) attacks are a growing threat in network services. The frequency and intensity of DoS attacks are rapidly increasing day by...
    Mayank Raikwar, Danilo Gligoroski in Euro-Par 2021: Parallel Processing Workshops
    Conference paper 2022
  12. PPAPAFL: A Novel Approach to Privacy Protection and Anti-poisoning Attacks in Federated Learning

    In the realm of distributed machine learning, although federated learning has received considerable attention, it still confronts grave challenges...
    Conference paper 2024
  13. Algorithm substitution attacks against receivers

    This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our...

    Marcel Armour, Bertram Poettering in International Journal of Information Security
    Article Open access 21 June 2022
  14. Three Attacks on Proof-of-Stake Ethereum

    Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain...
    Caspar Schwarz-Schilling, Joachim Neu, ... David Tse in Financial Cryptography and Data Security
    Conference paper 2022
  15. Structured argumentation dynamics

    This paper develops a logical theory that unifies all three standard types of argumentative attack in AI, namely rebutting, undercutting and...

    Article Open access 27 July 2021
  16. GAN Attacks and Counterattacks in Federated Learning

    In this chapter, we will present the related content of generative adversarial networks (GANs) and their applications in the federated learning...
    Chapter 2023
  17. Enhancing Generalization in Few-Shot Learning for Detecting Unknown Adversarial Examples

    Deep neural networks, particularly convolutional neural networks, are vulnerable to adversarial examples, undermining their reliability in visual...

    Wenzhao Liu, Wanli Zhang, ... Jianghong Wei in Neural Processing Letters
    Article Open access 05 March 2024
  18. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices

    In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...

    Sankepally Sainath Reddy, Kosaraju Nishoak, ... U. Venkanna in Journal of Network and Systems Management
    Article 01 November 2023
  19. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
Did you find what you were looking for? Share feedback.