ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Digital Communications and Networksx
条 记 录,以下是1-10
视图:
排序:
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning被引量:1
《Digital Communications and Networks》2024年第4期1154-1167,共14页Jianyi Zhang Fangjiao Zhang Qichao Jin Zhiqiang Wang Xiaodong Lin Xiali Hei 
Supported by the Fundamental Research Funds for the Central Universities(328202204)。
Federated Learning(FL),a burgeoning technology,has received increasing attention due to its privacy protection capability.However,the base algorithm FedAvg is vulnerable when it suffers from so-called backdoor attacks...
关键词:Federated learning Backdoor attacks Aggregation methods 
Adversarial attacks and defenses for digital communication signals identification
《Digital Communications and Networks》2024年第3期756-764,共9页Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin 
supported by the National Natural Science Foundation of China(61771154);the Fundamental Research Funds for the Central Universities(3072022CF0601);supported by Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology,Harbin Engineering University,Harbin,China.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ...
关键词:Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators 
Data complexity-based batch sanitization method against poison in distributed learning
《Digital Communications and Networks》2024年第2期416-428,共13页Silv Wang Kai Fan Kuan Zhang Hui Li Yintang Yang 
supported in part by the“Pioneer”and“Leading Goose”R&D Program of Zhejiang(Grant No.2022C03174);the National Natural Science Foundation of China(No.92067103);the Key Research and Development Program of Shaanxi,China(No.2021ZDLGY06-02);the Natural Science Foundation of Shaanxi Province(No.2019ZDLGY12-02);the Shaanxi Innovation Team Project(No.2018TD-007);the Xi'an Science and technology Innovation Plan(No.201809168CX9JC10);the Fundamental Research Funds for the Central Universities(No.YJS2212)and National 111 Program of China B16037.
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are ca...
关键词:Distributed machine learning security Federated learning Data poisoning attacks Data sanitization Batch detection Data complexity 
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
《Digital Communications and Networks》2023年第5期1180-1189,共10页Xin Liu Liang Zheng Sumi Helal Weishan Zhang Chunfu Jia Jiehan Zhou 
The work presented in this paper is supported by the Shandong Provincial Natural Science Foundation(No.ZR2020MF04);National Natural Science Foundation of China(No.62072469);the Fundamental Research Funds for the Central Universities(19CX05027B,19CX05003A-11);West Coast Artificial Intelligence Technology Innovation Center(2019-1-5,2019-1-6);the Opening Project of Shanghai Trusted Industrial Control Platform(TICPSH202003015-ZC).
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices ...
关键词:Denial-of-service DRDoS SSDP reflection Attack Broad learning Traffic detection 
DroidEnemy: Battling adversarial example attacks for Android malware detection
《Digital Communications and Networks》2022年第6期1040-1047,共8页Neha Bala Aemun Ahmar Wenjia Li Fernanda Tovar Arpit Battu Prachi Bambarkar 
In recent years,we have witnessed a surge in mobile devices such as smartphones,tablets,smart watches,etc.,most of which are based on the Android operating system.However,because these Android-based mobile devices are...
关键词:Security Malware detection Adversarial example attack Data poisoning attack Evasi on attack Machine learning ANDROID 
Kernel-based adversarial attacks and defenses on support vector classification被引量:1
《Digital Communications and Networks》2022年第4期492-497,共6页Wanman Li Xiaozhang Liu Anli Yan Jie Yang 
supported by the National Natural Science Foundation of China under Grant No.61966011.
While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity...
关键词:Adversarial machine learning Support vector machines Evasion attack Vulnerability function Kernel optimization 
Poisoning attacks and countermeasures in intelligent networks:Status quo and prospects
《Digital Communications and Networks》2022年第2期225-234,共10页Chen Wang Jian Chen Yang Yang Xiaoqiang Ma Jiangchuan Liu 
This work was supported in part by the National Natural Science Foundation of China under Grants 62002104 and 61872416;the Natural Science Foundation of Hubei Province of China under Grant 2019CFB191;the special fund for Wuhan Yellow Crane Talents(Excellent Young Scholar).
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent network...
关键词:Machine learning Poisoning attack Intelligent networks Security threat 
Fooling intrusion detection systems using adversarially autoencoder
《Digital Communications and Networks》2021年第3期453-460,共8页Junjun Chen Di Wu Ying Zhao Nabin Sharma Michael Blumenstein Shui Yu 
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from n...
关键词:Intrusion detection Cyber attacks Autoencoder Generative adversarial networks 
Attacks and defences on intelligent connected vehicles:a survey被引量:6
《Digital Communications and Networks》2020年第4期399-421,共23页Mahdi Dibaei Xi Zheng Kun Jiang Robert Abbas Shigang Liu Yuexin Zhang Yang Xiang Shui Yu 
Australia Research Council LP 190100676.
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up new possibilities for different cyber-attacks,including in-vehicle attacks(e.g.,hijacking attacks)a...
关键词:Intelligent vehicles Vehicular networks Software vulnerabilities Deep learning 3GPP Software defined security 
Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods
《Digital Communications and Networks》2019年第4期237-244,共8页Kishan Neupane Rami J.Haddad 
Massive Multiple Input Multiple Output(MIMO)has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.This paper derives a closedform a...
关键词:Massive MIMO Linear precoding Normalization methods Secrecy analysis 
检索报告 对象比较 聚类工具 使用帮助 返回顶部