ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning
《Computers, Materials & Continua》2025年第5期1727-1752,共26页Ali Batouche Souham Meshoul Hadil Shaiba Mohamed Batouche 
the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through project number RI-44-0833.
The field of biometric identification has seen significant advancements over the years,with research focusing on enhancing the accuracy and security of these systems.One of the key developments is the integration of d...
关键词:Incremental learning personal identification cancelablemulti-biometrics pattern recognition security deep learning cyber-attacks transfer learning random projection catastrophic forgetting 
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
《Computers, Materials & Continua》2025年第4期239-258,共20页Long Cai Ke Gu Jiaqi Lei 
supported in part by the National Social Science Foundation of China under Grant 20BTQ058;in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50033.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed training.Nonetheless,the open system architecture inherent to federated learning syst...
关键词:Federated learning malicious client detection model recovery machine unlearning 
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
《Computers, Materials & Continua》2025年第4期157-175,共19页Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang 
supported by the Intelligent Policing Key Laboratory of Sichuan Province(No.ZNJW2022KFZD002);This work was supported by the Scientific and Technological Research Program of Chongqing Municipal Education Commission(Grant Nos.KJQN202302403,KJQN202303111).
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior knowledge.This is achieved by leveraging the property of adversarial examples.That is,when generated from a surrogate model,they re...
关键词:Adversarial examples black-box transferability regularized constrained transfer-based adversarial attacks 
Event-based non-fragile state estimation for time-varying systems under deception attacks
《Science China(Information Sciences)》2025年第4期345-358,共14页Xiao-Meng LI Tao ZOU Renquan LU Zhijia ZHAO 
partially supported by National Natural Science Foundation of China(Grant No.62303125);Guangdong Basic and Applied Basic Research Foundation(Grant No.2022A1515110949),Guangdong Basic and Applied Basic Research Foundation(Grant No.2023A1515011311);Open Fund of Guangdong Province Key Laboratory of Intelligent Decision and Cooperative Control。
This paper addresses the challenge of dynamic event-based non-fragile state estimation for discrete time-varying systems under deception attacks.These attacks involve injecting deceptive signals into the communication...
关键词:discrete time-varying systems deception attacks dynamic event-triggered mechanism finite horizon non-fragile estimation 
Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition
《Computer Modeling in Engineering & Sciences》2025年第3期2725-2737,共13页Donghyeok Park Sumin Yeon Hyeon Seo Seok-Jun Buu Suwon Lee 
supported by the Research Resurgence under the Glocal University 30 Project at Gyeongsang National University in 2024.
Recent research on adversarial attacks has primarily focused on white-box attack techniques,with limited exploration of black-box attack methods.Furthermore,in many black-box research scenarios,it is assumed that the ...
关键词:Adversarial attacks image recognition information security 
Towards the transferable audio adversarial attack via ensemble methods
《Cybersecurity》2025年第1期86-102,共17页Feng Guo Zheng Sun Yuxuan Chen Lei Ju 
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
关键词:Adversarial attacks Dynamic gradient weighting Transferability Ensemble methods 
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment
《Computers, Materials & Continua》2025年第3期4535-4554,共20页Tarak Dhaouadi Hichem Mrabet Adeeb Alhomoud Abderrazak Jemai 
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How...
关键词:Intrusion detection system industrial IoT machine learning security cyber-attacks DATASET 
Maxwell’s Demon in MLP-Mixer:towards transferable adversarial attacks
《Cybersecurity》2025年第1期180-188,共9页Haoran Lyu Yajie Wang Yu‑an Tan Huipeng Zhou Yuhang Zhao Quanxin Zhang 
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial examples.Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neur...
关键词:Adversarial attacks Adversarial examples Image classifcation 
Jamming-Resilient Consensus for Wireless Blockchain Networks
《Tsinghua Science and Technology》2025年第1期262-278,共17页Yifei Zou Meng Hou Li Yang Minghui Xu Libing Wu Dongxiao Yu Xiuzhen Cheng 
supported in part by the National Natural Science Foundation of China(Nos.62102232 and 62122042);Shandong Science Fund for Excellent Young Scholars(Nos.2023HWYQ-007 and 2023HWYQ-008);Key R&D Program of Shandong Province(No.2022CXGC020107).
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr...
关键词:consensus in blockchain jamming attacks distributed algorithm 
Oversampling-Enhanced Feature Fusion-Based Hybrid ViT-1DCNN Model for Ransomware Cyber Attack Detection
《Computer Modeling in Engineering & Sciences》2025年第2期1667-1695,共29页Muhammad Armghan Latif Zohaib Mushtaq Saifur Rahman Saad Arif Salim Nasar Faraj Mursal Muhammad Irfan Haris Aziz 
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection mechanisms.This study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutiona...
关键词:Ransomware attacks CYBERSECURITY vision transformer convolutional neural network feature fusion ENCRYPTION threat detection 
检索报告 对象比较 聚类工具 使用帮助 返回顶部