supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial examples.Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neur...
This work was supported by the National Natural Science Foundation of China[grant number 62022036,62132008,62372213].
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight design.These ...
supported in part by the National Science Foundation award IIS-2202395;ARMY Research Office award W911NF2110299;Oracle Cloud credits and related resources provided by the Oracle for Research program.
Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are co...
supported in part by NSFC No.62202275,Shandong-SF No.ZR2022QF012 projects.
Recently,studies show that deep learning-based automatic speech recognition(ASR)systems are vulnerable to adversarial examples(AEs),which add a small amount of noise to the original audio examples.These AE attacks pos...
supported by the National Nature Science Foundation of China under Grant No.62272007;National Nature Science Foundation of China under Grant No.U1936119;Major Technology Program of Hainan,China(ZDKJ2019003)。
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl...
The Internet of Things(IoT)has revolutionized our world today by providing greater levels of accessibility,connectivity and ease to our everyday lives.It enables massive amounts of data to be traversed across multiple...
This work was supported in part by National Key R&D Program of China,under Grant 2020YFB2103802;in part by the National Natural Science Foundation of China,uder grant U21A20463;in part by the Fundamental Research Funds for the Central Universities of China under Grant KKJB320001536.
Empirical attacks on Federated Learning(FL)systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution.These attacks can not only cause models to fail in specific tasks,but also infer...
the Technical and Vocational Training Corporation, Saudi Arabia.
The IEEE 1588 precision time protocol(PTP)is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels.Neve...
the Internet Commerce Security Lab, whichis funded by Westpac Banking Corporation.
The Internet of Things(IoT)has been rapidly evolving towards making a greater impact on everyday life to large industrial systems.Unfortunately,this has attracted the attention of cybercriminals who made IoT a target ...