نتایج جستجو برای: victim

تعداد نتایج: 8817  

2005
ONNO VAN DER HART DANNY BROM

2017
Mengchen Zhao Bo An Wei Gao Teng Zhang

Label contamination attack (LCA) is an important type of data poisoning attack where an attacker manipulates the labels of training data to make the learned model beneficial to him. Existing work on LCA assumes that the attacker has full knowledge of the victim learning model, whereas the victim model is usually a black-box to the attacker. In this paper, we develop a Projected Gradient Ascent ...

Journal: :CoRR 2012
Jan Wrobel

The paper demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker. The attacker sends to a victim a sequence of identical spoofed segments. The victim responds to each segment in the sequence (the sequence is reflected by the victim) if the segments satisfy a certain condition tested by the attac...

2012
Sanghyuk Jung Yong Ho Song

In NAND flash memory devices, pages marked “invalid” can remain in blocks and occupy flash space. Therefore, it is necessary to physically eliminate invalid pages and collect valid pages from the victim blocks in order to sustain flash write performance and storage lifespan. Although there have been many research studies on efficient garbage collection techniques, research has focused on victim...

Journal: :International Journal of Science, Technology and Society 2020

Journal: :Drug metabolism and disposition: the biological fate of chemicals 2010
Brian J Kirby Jashvant D Unadkat

Many mathematical models for in vitro to in vivo prediction of drug-drug interactions (DDIs) of orally administered victim drugs have been developed. However, to date, none of these models have been applicable to all intravenously administered victim drugs. We derived and conducted a sensitivity/error analysis of a modification to the existing multiple mode interaction prediction model such tha...

Journal: :Child abuse & neglect 2009
Melissa Ming Foynes Jennifer J Freyd Anne P Deprince

OBJECTIVE The current study tested several hypotheses about disclosure of childhood sexual, physical, and emotional abuse derived from Betrayal Trauma Theory [Freyd, J. J. (1996). Betrayal trauma: The logic of forgetting childhood abuse. Cambridge, MA: Harvard University Press]. We predicted that the duration of time from abuse to its disclosure would vary as a function of victim-perpetrator cl...

ژورنال: Journal of Research and Health 2013
Amiri, Shole, Steki Azad, Nasim,

Objectives: This study investigated the effects of Reduction of Bullying Training Program on the rate of reduction victim behaviors in male's studets of elementary school in Isfahan City. Method: A experimental research with pre-test, post-test, and follow up (after six months of the post-test) design was carried out to pursue this purpose. Statistical population included all the male's bully c...

Journal: :Journal of developmental and life-course criminology 2018
Amber L Beckley Avshalom Caspi Louise Arseneault J C Barnes Helen L Fisher Honalee Harrington Renate Houts Nick Morgan Candice L Odgers Jasmin Wertz Terrie E Moffitt

Purpose It is well-established that victims and offenders are often the same people, a phenomenon known as the victim-offender overlap, but the developmental nature of this overlap remains uncertain. In this study, we drew from a developmental theoretical framework to test effects of genetics, individual characteristics, and routine-activity-based risks. Drawing from developmental literature, w...

2002
Richard D. Alexander

Humor is hypothesized to be a social activity that alters the status of the humorist positively and that of the object or victim negatively. Of the two traditionally distingushed classes of humor, "ostracizing" humor singles out a victim, with others present or absent either incidental affiliates of the humorist (and one another) or unaffected. "AltBiative" humor, on the other hand, is focused ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید