Results 1 to 10 of about 257,623 (175)
Discriminator-free Generative Adversarial Attack [PDF]
9 pages, 6 figures, 4 ...
Lu, Shaohao +7 more
openaire +2 more sources
Form, function, and divergence of a generic fin shape in small cetaceans
Tail flukes as well as the dorsal fin are the apomorphic traits of cetaceans which appeared during the evolutionary process of adaptation to the aquatic life. Both appendages present a wing-like shape associated with lift generation and low drag.
Vadim Pavlov +5 more
doaj +2 more sources
Online Alternate Generator Against Adversarial Attacks [PDF]
Accepted as a Regular paper in the IEEE Transactions on Image ...
Haofeng Li +4 more
openaire +3 more sources
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage
Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack graph. Attack graphs represent vulnerabilities and actions an attacker
David Tayouri +3 more
doaj +1 more source
Generic attacks on small-state stream cipher constructions in the multi-user setting
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang +5 more
doaj +1 more source
Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car
Self-driving cars are going to be the main future mode of transportation. However, such systems like, any other cyber-physical system, are vulnerable to attack vectors and uncertainties.
Junaid M. Qurashi +5 more
doaj +1 more source
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Muyan Shen +4 more
doaj +1 more source
Truncated Differential Attacks on Contracting Feistel Ciphers
We improve truncated differential attacks on t-branch contracting Feistel ciphers with a domain size of Nt. Based on new truncated differentials, a generic distinguisher for t2 + t − 2 rounds using O(Nt−1) data and time is obtained.
Tim Beyne, Yunwen Liu
doaj +1 more source
Generic Attacks on Hash Combiners [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bao, Zhenzhen +4 more
openaire +3 more sources
Due to the integration of information and internet, the power network has facing more and more uncertain risks of malicious attacks. In response to this problem, we studied it from following four aspects.
Zi-gang Zhao +4 more
doaj +1 more source

