نتایج جستجو برای: victim
تعداد نتایج: 8817 فیلتر نتایج به سال:
Label contamination attack (LCA) is an important type of data poisoning attack where an attacker manipulates the labels of training data to make the learned model beneficial to him. Existing work on LCA assumes that the attacker has full knowledge of the victim learning model, whereas the victim model is usually a black-box to the attacker. In this paper, we develop a Projected Gradient Ascent ...
The paper demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker. The attacker sends to a victim a sequence of identical spoofed segments. The victim responds to each segment in the sequence (the sequence is reflected by the victim) if the segments satisfy a certain condition tested by the attac...
In NAND flash memory devices, pages marked “invalid” can remain in blocks and occupy flash space. Therefore, it is necessary to physically eliminate invalid pages and collect valid pages from the victim blocks in order to sustain flash write performance and storage lifespan. Although there have been many research studies on efficient garbage collection techniques, research has focused on victim...
Many mathematical models for in vitro to in vivo prediction of drug-drug interactions (DDIs) of orally administered victim drugs have been developed. However, to date, none of these models have been applicable to all intravenously administered victim drugs. We derived and conducted a sensitivity/error analysis of a modification to the existing multiple mode interaction prediction model such tha...
OBJECTIVE The current study tested several hypotheses about disclosure of childhood sexual, physical, and emotional abuse derived from Betrayal Trauma Theory [Freyd, J. J. (1996). Betrayal trauma: The logic of forgetting childhood abuse. Cambridge, MA: Harvard University Press]. We predicted that the duration of time from abuse to its disclosure would vary as a function of victim-perpetrator cl...
Objectives: This study investigated the effects of Reduction of Bullying Training Program on the rate of reduction victim behaviors in male's studets of elementary school in Isfahan City. Method: A experimental research with pre-test, post-test, and follow up (after six months of the post-test) design was carried out to pursue this purpose. Statistical population included all the male's bully c...
Purpose It is well-established that victims and offenders are often the same people, a phenomenon known as the victim-offender overlap, but the developmental nature of this overlap remains uncertain. In this study, we drew from a developmental theoretical framework to test effects of genetics, individual characteristics, and routine-activity-based risks. Drawing from developmental literature, w...
Humor is hypothesized to be a social activity that alters the status of the humorist positively and that of the object or victim negatively. Of the two traditionally distingushed classes of humor, "ostracizing" humor singles out a victim, with others present or absent either incidental affiliates of the humorist (and one another) or unaffected. "AltBiative" humor, on the other hand, is focused ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید