نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

Journal: :IEEE transactions on artificial intelligence 2021

Deep neural networks are a powerful model for feature extraction. They produce features that enable state-of-the-art performance on many tasks, including emotion categorization. However, their homogeneous representation of knowledge has made them prone to attacks, i.e., small modification in train or test data mislead the models. Emotion categorization can usually be performed either in-distrib...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2020

Journal: :IACR Cryptology ePrint Archive 2012
Md. Iftekhar Salam Hoon-Jae Lee

Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against the algebraic attack. In particular, we focus on the PingPong-128 stream cip...

Journal: :IACR Cryptology ePrint Archive 2011
Fanbao Liu Tao Xie Changxiang Shen

We propose an efficient method to break H-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance).

ژورنال: مهندسی دریا 2006
شاهی فر, حمیدرضا, قاسمی, حسن,

When the body is running at fully immersed condition in viscous fluid, there are two components of resistance, i.e. frictional resistance and form drag. When it is near the free surface, the additional drag encountered to the body which is wave-making drag. This paper is presents the hydrodynamic performance of high-speed Unmanned Underwater Vehicle (UUV) in fully immersed condition. We did 100...

2014
Ailsa H. C. McLean H. Charles J. Godfray

An experiment was conducted to test whether parasitoid resistance within a single clonal line of pea aphid (Acyrthosiphon pisum) might increase after exposure to the parasitoid wasp Aphidius ervi. Any change in resistance was expected to occur through an increase in the density of protective symbiotic bacteria rather than genetic change within the aphid or the bacterial symbiont. Six aphid line...

2013
Haiyan Sun Qiaoyan Wen Hua Zhang Zhengping Jin

Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users’ private keys. Under this problem, these schemes cannot provide insider attack resistance or mutual authentication. Furthermore, some of these schemes cannot si...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید