Results 11 to 20 of about 257,742 (291)

Generative Dynamic Patch Attack

open access: yesProceedings of the British Machine Vision Conference 2021, 2021
Adversarial patch attack is a family of attack algorithms that perturb a part of image to fool a deep neural network model. Existing patch attacks mostly consider injecting adversarial patches at input-agnostic locations: either a predefined location or a random location.
Li, Xiang, Ji, Shihao
openaire   +2 more sources

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Cryptanalysis of HALFLOOP Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high ...
Gregor Leander   +2 more
doaj   +1 more source

Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois   +2 more
doaj   +1 more source

Attacks Generation by Detecting Attack Surfaces

open access: yesProcedia Computer Science, 2014
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Ouchani, Samir, Lenzini, Gabriele
openaire   +2 more sources

Searching for Subspace Trails and Truncated Differentials

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.
Gregor Leander   +2 more
doaj   +1 more source

Spectral analysis of ZUC-256

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis.
Jing Yang   +2 more
doaj   +1 more source

A simple generic attack on text captchas [PDF]

open access: yes, 2016
Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs. Many attacks have been proposed; these fine prior art advanced the scientific understanding of Captcha robustness, but most of them
Yan, Jeff
core   +1 more source

ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation [PDF]

open access: yes, 2021
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a morphed face detector (MFD), training on all possible attack types is essential to achieve good detection performance.
Damer, Naser   +8 more
openaire   +2 more sources

Type I Attack For Generative Models [PDF]

open access: yes2020 IEEE International Conference on Image Processing (ICIP), 2020
Generative models are popular tools with a wide range of applications. Nevertheless, it is as vulnerable to adversarial samples as classifiers. The existing attack methods mainly focus on generating adversarial examples by adding imperceptible perturbations to input, which leads to wrong result.
Sun, Chengjin   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy