ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Frontiers of Computer Sciencex
条 记 录,以下是1-10
视图:
排序:
Blockchain based federated learning for intrusion detection for Internet of Things
《Frontiers of Computer Science》2024年第5期109-119,共11页Nan SUN Wei WANG Yongxin TONG Kexin LIU 
This work was supported in part by the National Key R&D Program of China(2018AAA0101100);the National Natural Science Foundation of China(Grant Nos.62022008 and 92067204).
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion attacks.There has been re...
关键词:intrusion detection federated learning new attacks discovering blockchain 
FedDAA:a robust federated learning framework to protect privacy and defend against adversarial attack被引量:1
《Frontiers of Computer Science》2024年第2期107-122,共16页Shiwei LU Ruihu LI Wenbin LIU 
supported by the National Natural Science Foundation of China (Grand Nos.62072128,11901579,11801564);the Natural Science Foundation of Shaanxi (2022JQ-046,2021JQ-335,2021JM-216).
Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial intelligence.However,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the subm...
关键词:federated learning privacy protection adversarial attacks aggregated rule correctness verification 
Jointly beam stealing attackers detection and localization without training:an image processing viewpoint
《Frontiers of Computer Science》2023年第3期145-160,共16页Yaoqi YANG Xianglin WEI Renhui XU Weizheng WANG Laixian PENG Yangang WANG 
This work was supported in part by the National Natural Science Foundation of China(Grant No.61671471)。
Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications.The premise to restore normal network service is detecting and locating beam stealing attackers w...
关键词:beam-stealing attacks DETECTION LOCALIZATION image processing 
Defense against local model poisoning attacks to byzantine-robust federated learning被引量:3
《Frontiers of Computer Science》2022年第6期171-173,共3页Shiwei LU Ruihu LI Xuan CHEN Yuena MA 
supported by the National Natural Science Foundation of China (Grand Nos.11901579,11801564).
1 Introduction As a new mode of distributed learning,Federated Learning(FL)helps multiple organizations or clients to jointly train an artificial intelligence model without sharing their own datasets.Compared with the...
关键词:CLIENT jointly model 
SeBROP:blind ROP attacks without returns被引量:1
《Frontiers of Computer Science》2022年第4期185-202,共18页Tianning Zhang Miao Cai Diming Zhang Hao Huang 
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern ...
关键词:code-reuse atack ROP signal 
Side-channel analysis attacks based on deep learning network被引量:2
《Frontiers of Computer Science》2022年第2期35-45,共11页Yu OU Lang LI 
This research was supported by the National Natural Science Foundation of China(Grant No.61572174);Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001);Hunan Provincial Natural Science Foundation of China(2019JJ60004);the Scientific Research Fund of Hunan Provincial Education Department with(19A072);Subject group construction project of Hengyang Normal University(18XKQ02);Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469);the Science and Technology Plan Project of Hunan Province(2016TP1020).
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have inv...
关键词:side-channel analysis template attack machine learning deep learning 
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services
《Frontiers of Computer Science》2020年第3期225-227,共3页Jiaxun HUA Yu LIU Yibin SHEN Xiuxia TIAN Yifeng LUO Cheqing JIN 
supported by the National Natural Science Foundation of China(NSFC)(Grant Nos.61532021,U1811264 and U1501252).
1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and e...
关键词:LBS services knowledge 
Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset被引量:2
《Frontiers of Computer Science》2016年第4期755-766,共12页Alampallam Ramaswamy VASUDEVAN Subramanian SELVAKUMAR 
Identification of attacks by a network intrusion detection system (NIDS) is an important task. In signature or rule based detection, the previously encountered attacks are modded, and signatures/rules are extracted....
关键词:hierarchical model DP clustering LOF Dis-cretizer one class classifier NIDS 
Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services被引量:5
《Frontiers of Computer Science》2016年第2期370-386,共17页Xiao PAN Weizhang CHEN Lei WU Chunhui PIAO Zhaojun HU 
Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay attention t...
关键词:query semantics sensitive information privacy protection road networks location based services 
A novel pairing-free certificateless authenticated key agreement protocol with provable security被引量:10
《Frontiers of Computer Science》2013年第4期544-557,共14页Haiyan SUN Qiaoyan WEN Hua ZHANG Zhengping JIN 
Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secu...
关键词:ATTACKS PAIRINGS eCK model provable security certificateless authenticated key agreement 
检索报告 对象比较 聚类工具 使用帮助 返回顶部