Results 61 to 70 of about 211,629 (261)

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers [PDF]

open access: yesarXiv, 2020
Machine learning (ML) based approaches have been the mainstream solution for anti-phishing detection. When they are deployed on the client-side, ML-based classifiers are vulnerable to evasion attacks. However, such potential threats have received relatively little attention because existing attacks destruct the functionalities or appearance of webpages
arxiv  

Evaporation‐Enhanced Redox Cycling for Rapid Detection of Attomolar SARS‐CoV‐2 Virions Using Nanolithography‐Free Electrochemical Devices

open access: yesAdvanced Materials Technologies, EarlyView.
This study presents microfabricated electrochemical sensors for detecting ultralow viral particles counts through evaporation‐enhanced redox cycling (E2RC). To achieve sub‐micrometer gap in interdigitated microelectrodes, a scalable, nanolithography‐free fabrication method is developed.
Pouya Soltan Khamsi   +2 more
wiley   +1 more source

Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]

open access: yesHangkong bingqi
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj   +1 more source

New collision attacks on SHA-1 based on optimal joint local-collision analysis [PDF]

open access: yes, 2013
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function {\SHA}.
Stevens, M.M.J. (Marc)
core  

Dual Charge Transfer Mechanisms in Intimately Bonded S‐scheme Heterojunction Photocatalyst with Expeditious Activity toward Environmental Remediation

open access: yesAdvanced Sustainable Systems, EarlyView.
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa   +11 more
wiley   +1 more source

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing

open access: yesIEEE Access, 2019
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding   +5 more
doaj   +1 more source

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains [PDF]

open access: yesarXiv, 2018
Message digest algorithms are one of the underlying building blocks of blockchain platforms such as Ethereum. This paper analyses situations in which the message digest collision resistance property can be exploited by attackers. Two mitigations for possible attacks are described: longer message digest sizes make attacks more difficult; and, including ...
arxiv  

ReLUSyn: Synthesizing Stealthy Attacks for Deep Neural Network Based Cyber-Physical Systems [PDF]

open access: yesarXiv, 2021
Cyber Physical Systems (cps) are deployed in many mission-critical settings, such as medical devices, autonomous vehicular systems and aircraft control management systems. As more and more CPS adopt Deep Neural Networks (Deep Neural Network (dnns), these systems can be vulnerable to attacks. .
arxiv  

The Frequency‐Domain Lattice Boltzmann Method (FreqD‐LBM): A Versatile Tool to Predict the QCM Response Induced by Structured Samples

open access: yesAdvanced Theory and Simulations, EarlyView.
FreqD‐LBM simulates the oscillatory flow at the surface of a QCM‐D resonator in the presence of structured adsorbates. It derives shifts of frequency and bandwidth (equivalent to dissipation) on different overtones. Applications include rough surfaces, adsorbed rigid particles, adsorbed viscoelastic particles, spheres floating freely above the surface,
Diethelm Johannsmann   +5 more
wiley   +1 more source

Quantum collision finding for homomorphic hash functions [PDF]

open access: yesarXiv, 2021
Hash functions are a basic cryptographic primitive. Certain hash functions try to prove security against collision and preimage attacks by reductions to known hard problems. These hash functions usually have some additional properties that allow for that reduction.
arxiv  

Home - About - Disclaimer - Privacy