نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements processing the availability of sophisticated software, fabrication may hide evidence hinder such criminal cases. The practice modifying original photographic images generate forged is known as digital forging. A section an copied pasted into another part same item or du...
This work mainly addresses continuous-time multiagent consensus networks where an adverse attacker affects the convergence performances of said protocol. In particular, we develop a novel secure-by-design approach in which presence network manager monitors system and broadcasts encrypted tasks (i.e., hidden edge weight assignments) to agents involved. Each agent is then expected decode received...
2 Physical Layer 3 2.1 Attacks in the Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Device Tampering . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Countermeasures in the Physical Layer . . . . . . . . . . . . ....
Can humans get arbitrarily capable reinforcement learning (RL) agents to do their bidding? Or will sufficiently RL always find ways bypass intended objectives by shortcutting reward signal? This question impacts how far can be scaled, and whether alternative paradigms must developed in order build safe artificial general intelligence. In this paper, we study when an agent has instrumental goal ...
We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X with high min-entropy and a number (say, t in total) of arbitrary functions (T1, . . . , Tt) which are applied in succession to that source to generate the chain X T1 −→ X T2 −→ X · · · Tt −→ X. Intuitively, the Chaining Lemma g...
Text information is a natural language dependent, which enhances reliability and security of text data exchanged through Internet networks becoming main concern for researchers. Content authentication, Tampering detection, integrity verification digital content are considered challenges in the communication exchange area Internet. Watermarking algorithms emerge as potential method achieving thi...
In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, Photoplus and Picasa etc.) that can be used to modify these digital image. Therefore we cannot use these images as a proof or evidence. Therefore det...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید