Towards Lightweight Black-Box Attacks against Deep Neural Networks [PDF]
Black-box attacks can generate adversarial examples without accessing the parameters of target model, largely exacerbating the threats of deployed deep neural networks (DNNs). However, previous works state that black-box attacks fail to mislead target models when their training data and outputs are inaccessible.
arxiv
An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN [PDF]
Zia ur Rehman+5 more
openalex +1 more source
From Microscale to Road Scale: Bridging the Gaps of Predictive Aluminum Corrosion Using SECM
The current study explores the corrosion prediction possibility on various aluminum (AAxxxx) surfaces (via. SECM) without the need of long‐term road testing. The obtained results show a strong correlation identified between the in‐service corrosion propagation data (from 2 years of road‐test), and the estimated corrosion propagation using ...
Vikram Singh+3 more
wiley +1 more source
On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack [PDF]
Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant. However, this study points out that an attacker can use a modification attack to make both participants share a wrong key without being ...
arxiv
ELDA: Towards Efficient and Lightweight Detection of Cache Pollution Attacks in NDN [PDF]
As a promising architectural design for future Internet, named data networking (NDN) relies on in-network caching to efficiently deliver name-based content. However, the in-network caching is vulnerable to cache pollution attacks (CPA), which can reduce cache hits by violating cache locality and significantly degrade the overall performance of NDN.
arxiv +1 more source
The design, optimization and characterization of a new bilayer painting system is presented. The underlying layer is engineered to provide exceptional thermal insulation through the synergistic effect of hollow perlite microspheres and micrometer‐sized cellulose particles. The external painting layer is designed to induce the formation of a homogeneous
Antonino Caputo+8 more
wiley +1 more source
Nucleation sites and forest recovery under high shrub competition
Abstract Forests currently face numerous stressors, raising questions about processes of forest recovery as well as the role of humans in stimulating recovery by planting trees that might not otherwise regenerate. Theoretically, planted trees can also provide a seed source for further recruitment once the planted trees become reproductive, acting as ...
Tara Ursell, Hugh D. Safford
wiley +1 more source
An overview of memristive cryptography [PDF]
Smaller, smarter and faster edge devices in the Internet of things era demands secure data analysis and transmission under resource constraints of hardware architecture. Lightweight cryptography on edge hardware is an emerging topic that is essential to ensure data security in near-sensor computing systems such as mobiles, drones, smart cameras, and ...
arxiv
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system [PDF]
Mounika Jammula+2 more
openalex +1 more source
Reconfigurable Manipulation of Sound with a Multimaterial 3D Printed Origami Metasurface
This paper demonstrates a programmable origami‐inspired metasurface, using multimaterial three‐dimensional printing technology to achieve reconfigurable sound manipulation. The unique bistable design enables rapid switching between configurations, allowing for precise control of acoustic reflections with minimal mechanical input. The results showcase a
Dinh Hai Le+5 more
wiley +1 more source