Results 31 to 40 of about 178,776 (288)
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG +3 more
doaj +2 more sources
Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks
ICLR 2024 Spotlight (top 5%)
Franzmeyer, T +6 more
openaire +3 more sources
The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass ...
Xixiang Lin +3 more
doaj +1 more source
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine +10 more
wiley +1 more source
Low Latency Detection of Sparse False Data Injections in Smart Grids
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj +1 more source
Audio-Replay Attack Detection Countermeasures [PDF]
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches.
Lavrentyeva, Galina +5 more
openaire +2 more sources
Unorganized malicious attacks detection [PDF]
Recommender system has attracted much attention during the past decade. However, collaborative filtering as a usual technique is vulnerable to malicious attacks that generate fake profiles to manipulate the system. Prior research has shown that attacks can significantly affect the robustness of the systems.
Ming PANG, Zhi-Hua ZHOU
openaire +1 more source
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj +1 more source

