Results 1 to 10 of about 257,623 (175)

Discriminator-free Generative Adversarial Attack [PDF]

open access: yesProceedings of the 29th ACM International Conference on Multimedia, 2021
9 pages, 6 figures, 4 ...
Lu, Shaohao   +7 more
openaire   +2 more sources

Form, function, and divergence of a generic fin shape in small cetaceans

open access: yesPLoS ONE, 2021
Tail flukes as well as the dorsal fin are the apomorphic traits of cetaceans which appeared during the evolutionary process of adaptation to the aquatic life. Both appendages present a wing-like shape associated with lift generation and low drag.
Vadim Pavlov   +5 more
doaj   +2 more sources

Online Alternate Generator Against Adversarial Attacks [PDF]

open access: yesIEEE Transactions on Image Processing, 2020
Accepted as a Regular paper in the IEEE Transactions on Image ...
Haofeng Li   +4 more
openaire   +3 more sources

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

open access: yesIEEE Access, 2023
Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack graph. Attack graphs represent vulnerabilities and actions an attacker
David Tayouri   +3 more
doaj   +1 more source

Generic attacks on small-state stream cipher constructions in the multi-user setting

open access: yesCybersecurity, 2023
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang   +5 more
doaj   +1 more source

Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car

open access: yesIEEE Access, 2023
Self-driving cars are going to be the main future mode of transportation. However, such systems like, any other cyber-physical system, are vulnerable to attack vectors and uncertainties.
Junaid M. Qurashi   +5 more
doaj   +1 more source

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Muyan Shen   +4 more
doaj   +1 more source

Truncated Differential Attacks on Contracting Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We improve truncated differential attacks on t-branch contracting Feistel ciphers with a domain size of Nt. Based on new truncated differentials, a generic distinguisher for t2 + t − 2 rounds using O(Nt−1) data and time is obtained.
Tim Beyne, Yunwen Liu
doaj   +1 more source

Generic Attacks on Hash Combiners [PDF]

open access: yesJournal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bao, Zhenzhen   +4 more
openaire   +3 more sources

Control-theory based security control of cyber-physical power system under multiple cyber-attacks within unified model framework

open access: yesCognitive Robotics, 2021
Due to the integration of information and internet, the power network has facing more and more uncertain risks of malicious attacks. In response to this problem, we studied it from following four aspects.
Zi-gang Zhao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy