نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

2003
Jonathan Herzog Moses Liskov Silvio Micali

In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintext-aware encryption without random oracles by using a third party. However, we do not need to trust the third party: even when the third party is dishonest, we still guarantee security against adaptive chosen ciphertext attacks....

Journal: :IEEE Transactions on Knowledge and Data Engineering 2021

In network link prediction, it is possible to hide a target from being predicted with small perturbation on structure. This observation may be exploited in many real world scenarios, for example, preserve privacy, or exploit financial security. There have been recent studies generate adversarial examples mislead deep learning models graph data. However, none of the previous work has considered ...

Journal: :IEEE Transactions on Multimedia 2022

Image denoising can remove natural noise that widely exists in images captured by multimedia devices due to low-quality imaging sensors, unstable image transmission processes, or low light conditions. Recent works also find benefits the high-level vision tasks, e.g., classification. In this work, we try challenge common sense and explore a totally new problem, i.e., whether be giv...

2017
Olga Gadyatskaya Ravi Jhawar Sjouke Mauw Rolando Trujillo-Rasua Tim A. C. Willemse

Attack trees allow a security analyst to obtain an overview of the potential vulnerabilities of a system. Due to their refinement structure, attack trees support the analyst in understanding the system vulnerabilities at various levels of abstraction. However, contrary to manually synthesized attack trees, automatically generated attack trees are often not refinement-aware, making subsequent hu...

2012
P.V.RADHAKRISHNA MURTY

Aware aggregation is an important subtask of Imposition detection. The goal is to identify and to cluster different Awares produced by low-level Imposition detection systems, firewalls, etc. Belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-Awares can be generated for the clusters that contain all the relevant information wher...

Journal: :IEEE transactions on artificial intelligence 2023

Existing model poisoning attacks on federated learning (FL) assume that an adversary has access to the full data distribution. In reality, usually limited prior knowledge about clients' data. A poorly chosen target class renders attack less effective. This work considers a semi-targeted situation where source is predetermined but not. The goal cause misclassification of global classifier from c...

Journal: :International Journal of Engineering & Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید