نتایج جستجو برای: ssdf attack
تعداد نتایج: 80839 فیلتر نتایج به سال:
Many recent studies have shown that deep neural models are vulnerable to adversarial samples: images with imperceptible perturbations, for example, can fool image classifiers. In this paper, we present the first type-specific approach generating examples object detection, which entails detecting bounding boxes around multiple objects in and classifying them at same time, making it a harder task...
An extensive experimental investigation to study the flow structure over the wing of a fighter type configuration model has been conducted. The model used for this study was similar to the High Alpha Research Vehicle (HARV) that has been used in various European research centers for studying its force and moment characteristics. Tests were conducted at two subsonic speeds and at low to moderate...
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
The prevalence of social media has inspired multiple researchers to investigate the value information on various platforms. However, most studies focus integrating individual views (the wisdom crowd), and few just one person's effect. To close this gap, article investigates impact Trump's tweets stock markets. Based intraday market data, study uses an event test immediate reaction markets in bo...
With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید