ATTACK

作品数:757被引量:1243H指数:15
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张天桥刘杰刘济林许溟陈南宇更多>>
相关机构:清华大学北京理工大学深圳市乐玛通科技有限公司浙江大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Robust federated contrastive recommender system against targeted model poisoning attack
《Science China(Information Sciences)》2025年第4期46-61,共16页Wei YUAN Chaoqun YANG Liang QU Guanhua YE Quoc Viet Hung NGUYEN Hongzhi YIN 
supported by Australian Research Council under the Streams of Future Fellowship(Grant No.FT210100624);Discovery Project(Grant No.DP240101108);Linkage Project(Grant No.LP230200892)。
Federated recommender systems(FedRecs)have garnered increasing attention recently,thanks to their privacypreserving benefits.However,the decentralized and open characteristics of current FedRecs present at least two d...
关键词:federated recommender system contrastive learning model poisoning attack and defense 
Anti-spoofing performance analysis of typical GNSS-based railway train positioning schemes
《High-Speed Railway》2025年第1期37-43,共7页Siqi Wang Jiang Liu Baigen Cai Jian Wang Debiao Lu Wei Jiang 
the National Key Research and Development Program of China(2023YFB3907300);the National Natural Science Foundation of China(U2268206,T2222015);the Beijing Natural Science Foundation(4232031).
Global Navigation Satellite Systems(GNSSs)are vulnerable to both unintentional interference and intentional attacks,making it difficult to meet the stringent safety requirements of railway train control systems.The gr...
关键词:Railway train control Global navigation satellite system Train positioning Interference attack Anti-spoofing 
Machine Learning-Based Hybrid SSO-MA with Optimized Secure Link State Routing Protocol in Manet
《China Communications》2025年第3期164-180,共17页Varsha Ashok Khandekar Praveen Gupta 
A decentralized network made up of mobile nodes is termed the Mobile Ad-hoc Network(MANET).Mobility and a finite battery lifespan are the two main problems with MANETs.Advanced methods are essential for enhancing MANE...
关键词:attack detection system cluster head selection clustering mobile Ad-hoc network soft k-Means SSO-MA optimization algorithm 
Towards the transferable audio adversarial attack via ensemble methods
《Cybersecurity》2025年第1期86-102,共17页Feng Guo Zheng Sun Yuxuan Chen Lei Ju 
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
关键词:Adversarial attacks Dynamic gradient weighting Transferability Ensemble methods 
Adaptive regulation-based Mutual Information Camouflage Poisoning Attack in Graph Neural Networks
《Journal of Automation and Intelligence》2025年第1期21-28,共8页Jihui Yin Taorui Yang Yifei Sun Jianzhi Gao Jiangbo Lu Zhi-Hui Zhan 
supported by the Natural Science Basic Research Plan in Shaanxi Province of China(Program No.2022JM-381,2017JQ6070);National Natural Science Foundation of China(Grant No.61703256),Foundation of State Key Laboratory of Public Big Data(No.PBD2022-08);the Fundamental Research Funds for the Central Universities,China(Program No.GK202201014,GK202202003,GK201803020).
Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks ...
关键词:Mutual information Adaptive weighting Poisoning attack Graph neural networks 
Full-round impossible diferential attack on shadow block cipher
《Cybersecurity》2025年第1期247-261,共15页Yuting Liu Yongqiang Li Huiqin Chen Mingsheng Wang 
supported by the National Natural Science Foundation of China(No.12371525).
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential c...
关键词:Lightweight block cipher SHADOW Impossible diferential cryptanalysis SAT 
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
《Global Energy Interconnection》2025年第1期1-12,共12页Xing Huang Yulin Chen Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 
supported by Hainan Provincial Natural Science Foundation of China(No.524RC532);Research Startup Funding from Hainan Institute of Zhejiang University(No.0210-6602-A12202);Project of Sanya Yazhou Bay Science and Technology City(No.SKJC-2022-PTDX-009/010/011).
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam...
关键词:MICROGRIDS Distributed secondary control Self-triggered control Hash algorithms False data injection attack 
APWF: A Parallel Website Fingerprinting Attack with Attention Mechanism
《Computers, Materials & Continua》2025年第2期2027-2041,共15页Dawei Xu Min Wang Yue Lv Moxuan Fu Yi Wu Jian Zhao 
supported by the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026);the funding of Key Laboratory of Mobile Application Innovation and Governance Technology,Ministry of Industry and Information Technology(2023IFS080601-K).
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea...
关键词:Website fingerprinting attack transfer learning concept drift 
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
《Computers, Materials & Continua》2025年第2期2475-2494,共20页Soyoung Joo So-Hyun Park Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 
supported by the Ministry of Trade,Industry and Energy(MOTIE)under Training Industrial Security Specialist for High-Tech Industry(RS-2024-00415520)supervised by the Korea Institute for Advancement of Technology(KIAT);the Ministry of Science and ICT(MSIT)under the ICT Challenge and Advanced Network of HRD(ICAN)Program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information&Communication Technology Planning&Evaluation(IITP).
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther...
关键词:Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack 
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)
《Computers, Materials & Continua》2025年第2期3619-3641,共23页Hariharan Ramachandran Richard Smith Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya 
funded by the Office of Gas and Electricity Markets(Ofgem)and supported by De Montfort University(DMU)and Nottingham Trent University(NTU),UK.
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f...
关键词:ICS/OT cyber Programmable Logic Controllers(PLC)security detection safety reliability proof testing gas compressor station ICS resilience security architecture ICS 
检索报告 对象比较 聚类工具 使用帮助 返回顶部