نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
AbstractWe study protecting a user’s data (images in this work) against learner’s unauthorized use training neural networks. It is especially challenging when the only tiny percentage of complete set. We revisit traditional watermarking under modern deep learning settings to tackle challenge. show that user watermarks images using specialized linear color transformation, network classifier will...
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring processing sensitive data. Attackers have exploited this prospect IoT devices to compromise user data’s integrity confidentiality. Considering the dynamic nature attacks, artificial intelligence (AI)-based techniques incorporating machine learning ...
Unauthorized subcontracting—when suppliers outsource part of their production to a third party without the retailer’s consent—has been common practice in apparel industry and is often tied noncompliant working conditions. Because retailers are unaware party, process becomes obscure cannot be tracked. In this paper, we present an empirical study factors that can lead engage unauthorized subcontr...
We had proposed a hop-by-hop IP traceback method that can reliably trace a source of an attack. In this paper, we describe the development and the evaluation of our prototype system. The main features of our proposed method are the packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet, and the algorithm using datalink...
Security of mobile ad-hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are no...
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید