ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Cybersecurityx
条 记 录,以下是1-10
视图:
排序:
Towards the transferable audio adversarial attack via ensemble methods
《Cybersecurity》2025年第1期86-102,共17页Feng Guo Zheng Sun Yuxuan Chen Lei Ju 
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
关键词:Adversarial attacks Dynamic gradient weighting Transferability Ensemble methods 
Maxwell’s Demon in MLP-Mixer:towards transferable adversarial attacks
《Cybersecurity》2025年第1期180-188,共9页Haoran Lyu Yajie Wang Yu‑an Tan Huipeng Zhou Yuhang Zhao Quanxin Zhang 
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial examples.Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neur...
关键词:Adversarial attacks Adversarial examples Image classifcation 
Generic attacks on small-state stream cipher constructions in the multi-user setting
《Cybersecurity》2024年第3期69-79,共11页Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang Ling Song 
This work was supported by the National Natural Science Foundation of China[grant number 62022036,62132008,62372213].
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight design.These ...
关键词:Small-state stream ciphers TMDTO attacks Multi-user setting 
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
《Cybersecurity》2024年第1期1-15,共15页Armita Kazeminajafabadi Mahdi Imani 
supported in part by the National Science Foundation award IIS-2202395;ARMY Research Office award W911NF2110299;Oracle Cloud credits and related resources provided by the Oracle for Research program.
Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are co...
关键词:Multi-stage attacks Bayesian attack graph Attack detection Optimal monitoring 
Towards the universal defense for query-based audio adversarial attacks on speech recognition system
《Cybersecurity》2024年第1期53-70,共18页Feng Guo Zheng Sun Yuxuan Chen Lei Ju 
supported in part by NSFC No.62202275,Shandong-SF No.ZR2022QF012 projects.
Recently,studies show that deep learning-based automatic speech recognition(ASR)systems are vulnerable to adversarial examples(AEs),which add a small amount of noise to the original audio examples.These AE attacks pos...
关键词:Adversarial attacks DEFENSE Memory mechanism Query-based 
DLP:towards active defense against backdoor attacks with decoupled learning process
《Cybersecurity》2024年第1期122-134,共13页Zonghao Ying Bin Wu 
supported by the National Nature Science Foundation of China under Grant No.62272007;National Nature Science Foundation of China under Grant No.U1936119;Major Technology Program of Hainan,China(ZDKJ2019003)。
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl...
关键词:Deep learning Backdoor attack Active defense 
An ensemble deep learning based IDS for IoT using Lambda architecture被引量:1
《Cybersecurity》2023年第3期1-17,共17页Rubayyi Alghamdi Martine Bellaiche 
The Internet of Things(IoT)has revolutionized our world today by providing greater levels of accessibility,connectivity and ease to our everyday lives.It enables massive amounts of data to be traversed across multiple...
关键词:IOT IDS Lambda architecture Cyber-attacks Deep learning Ensemble learning 
Threats,attacks and defenses to federated learning:issues,taxonomy and perspectives被引量:6
《Cybersecurity》2022年第2期56-74,共19页Pengrui Liu Xiangrui Xu Wei Wang 
This work was supported in part by National Key R&D Program of China,under Grant 2020YFB2103802;in part by the National Natural Science Foundation of China,uder grant U21A20463;in part by the Fundamental Research Funds for the Central Universities of China under Grant KKJB320001536.
Empirical attacks on Federated Learning(FL)systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution.These attacks can not only cause models to fail in specific tasks,but also infer...
关键词:Federated learning Security and privacy threats Multi-phases Inference attacks Poisoning attacks Evasion attacks DEFENSES TRUSTED 
Precision time protocol attack strategies and their resistance to existing security extensions
《Cybersecurity》2021年第1期160-176,共17页Waleed Alghamdi Michael Schukat 
the Technical and Vocational Training Corporation, Saudi Arabia.
The IEEE 1588 precision time protocol(PTP)is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels.Neve...
关键词:APT Cyber-attacks IEEE 1588 PTP Security Time synchronization protocols 
A critical review of intrusion detection systems in the internet of things:techniques,deployment strategy,validation strategy,attacks,public datasets and challenges被引量:4
《Cybersecurity》2021年第1期251-277,共27页Ansam Khraisat Ammar Alazab 
the Internet Commerce Security Lab, whichis funded by Westpac Banking Corporation.
The Internet of Things(IoT)has been rapidly evolving towards making a greater impact on everyday life to large industrial systems.Unfortunately,this has attracted the attention of cybercriminals who made IoT a target ...
关键词:MALWARE Intrusion detection system IOT Anomaly detection Machine learning Deep learning Internet of things ATTACKS IoT security 
检索报告 对象比较 聚类工具 使用帮助 返回顶部