the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through project number RI-44-0833.
The field of biometric identification has seen significant advancements over the years,with research focusing on enhancing the accuracy and security of these systems.One of the key developments is the integration of d...
supported in part by the National Social Science Foundation of China under Grant 20BTQ058;in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50033.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed training.Nonetheless,the open system architecture inherent to federated learning syst...
supported by the Intelligent Policing Key Laboratory of Sichuan Province(No.ZNJW2022KFZD002);This work was supported by the Scientific and Technological Research Program of Chongqing Municipal Education Commission(Grant Nos.KJQN202302403,KJQN202303111).
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior knowledge.This is achieved by leveraging the property of adversarial examples.That is,when generated from a surrogate model,they re...
partially supported by National Natural Science Foundation of China(Grant No.62303125);Guangdong Basic and Applied Basic Research Foundation(Grant No.2022A1515110949),Guangdong Basic and Applied Basic Research Foundation(Grant No.2023A1515011311);Open Fund of Guangdong Province Key Laboratory of Intelligent Decision and Cooperative Control。
This paper addresses the challenge of dynamic event-based non-fragile state estimation for discrete time-varying systems under deception attacks.These attacks involve injecting deceptive signals into the communication...
supported by the Research Resurgence under the Glocal University 30 Project at Gyeongsang National University in 2024.
Recent research on adversarial attacks has primarily focused on white-box attack techniques,with limited exploration of black-box attack methods.Furthermore,in many black-box research scenarios,it is assumed that the ...
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How...
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial examples.Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neur...
supported in part by the National Natural Science Foundation of China(Nos.62102232 and 62122042);Shandong Science Fund for Excellent Young Scholars(Nos.2023HWYQ-007 and 2023HWYQ-008);Key R&D Program of Shandong Province(No.2022CXGC020107).
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr...
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection mechanisms.This study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutiona...