Results 61 to 70 of about 211,629 (261)
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers [PDF]
Machine learning (ML) based approaches have been the mainstream solution for anti-phishing detection. When they are deployed on the client-side, ML-based classifiers are vulnerable to evasion attacks. However, such potential threats have received relatively little attention because existing attacks destruct the functionalities or appearance of webpages
arxiv
This study presents microfabricated electrochemical sensors for detecting ultralow viral particles counts through evaporation‐enhanced redox cycling (E2RC). To achieve sub‐micrometer gap in interdigitated microelectrodes, a scalable, nanolithography‐free fabrication method is developed.
Pouya Soltan Khamsi+2 more
wiley +1 more source
Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj +1 more source
New collision attacks on SHA-1 based on optimal joint local-collision analysis [PDF]
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function {\SHA}.
Stevens, M.M.J. (Marc)
core
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa+11 more
wiley +1 more source
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding+5 more
doaj +1 more source
Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains [PDF]
Message digest algorithms are one of the underlying building blocks of blockchain platforms such as Ethereum. This paper analyses situations in which the message digest collision resistance property can be exploited by attackers. Two mitigations for possible attacks are described: longer message digest sizes make attacks more difficult; and, including ...
arxiv
ReLUSyn: Synthesizing Stealthy Attacks for Deep Neural Network Based Cyber-Physical Systems [PDF]
Cyber Physical Systems (cps) are deployed in many mission-critical settings, such as medical devices, autonomous vehicular systems and aircraft control management systems. As more and more CPS adopt Deep Neural Networks (Deep Neural Network (dnns), these systems can be vulnerable to attacks. .
arxiv
FreqD‐LBM simulates the oscillatory flow at the surface of a QCM‐D resonator in the presence of structured adsorbates. It derives shifts of frequency and bandwidth (equivalent to dissipation) on different overtones. Applications include rough surfaces, adsorbed rigid particles, adsorbed viscoelastic particles, spheres floating freely above the surface,
Diethelm Johannsmann+5 more
wiley +1 more source
Quantum collision finding for homomorphic hash functions [PDF]
Hash functions are a basic cryptographic primitive. Certain hash functions try to prove security against collision and preimage attacks by reductions to known hard problems. These hash functions usually have some additional properties that allow for that reduction.
arxiv