National Natural Science Foundation of China (Grant No. 61972306);Song Shan Laboratory (Grant No. YYJC012022005);Zhejiang Laboratory (Grant No. 2021KD0AB03)。
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting...
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a...
supported by the National Cryptography Development Fund of China (Grant Nos.MMJJ20170103 and MMJJ20180204)。
Deoxys-BC is the primitive tweakable block cipher of the Deoxys family of authenticated encryption schemes.Based on existing related-tweakey boomerang distinguishers,this paper improves the boomerang attacks on 11-rou...
supported by the National Natural Science Foundation of China (Grant No.61702157);the Doctoral Fund of North China Institute of Aerospace Engineering (Grant No.BKY-2022-09)。
The robustness of graph neural networks(GNNs)is a critical research topic in deep learning.Many researchers have designed regularization methods to enhance the robustness of neural networks,but there is a lack of theo...
partially supported by the National Key R&D Program of China(Grant No.2020AAA0107701);the NSFC(Grant No.U20B2049 and U21B2018)。
With the rise of artificial intelligence and cloud computing,machine-learning-as-a-service platforms,such as Google,Amazon,and IBM,have emerged to provide sophisticated tasks for cloud applications.These proprietary m...
supported by the National Natural Science Foundation of China(62072445);the National Key Research and Development Program of China(2021YFB3100100).
Quantum algorithms are raising concerns in the field of cryptography all over the world.A growing number of symmetric cryptography algorithms have been attacked in the quantum setting.Type-3 generalized Feistel scheme...
supported by the National Natural Science Foundation of China(61876019,U1936218,62072037)。
The robustness of adversarial examples to image scaling transformation is usually ignored when most existing adversarial attacks are proposed.In contrast,image scaling is often the first step of the model to transfer ...
supported by the National Key R&D Program of China(2018YFA0704704);Natural Science Foundation of China(NSFC)(61772519);the Chinese Major Program of National Cryptography Development Foundation(MMJJ20180102).
Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs.For example,th...
supported by the National Natural Science Foundation of China(61876019)。
Deep neural network(DNN)is applied widely in many applications and achieves state-of-the-art performance.However,DNN lacks transparency and interpretability for users in structure.Attackers can use this feature to emb...
supported in part by the Fundamental Research Funds for the Central Universities(3072021CF0809);National Natural Science Foundation of China(62001138)。
Multiple secondary users(SUs)perform collaborative spectrum sensing(CSS)in cognitive radio networks to improve the sensing performance.However,this system severely degrades with spectrum sensing data falsification(SSD...