9   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xianfeng Gao, Yu-an Tan, Hongwei Jiang, Quanxin Zhang and Xiaohui Kuang    
These years, Deep Neural Networks (DNNs) have shown unprecedented performance in many areas. However, some recent studies revealed their vulnerability to small perturbations added on source inputs. Furthermore, we call the ways to generate these perturba... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Raz Lapid, Zvika Haramaty and Moshe Sipper    
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating advers... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Joseph Pedersen, Rafael Muñoz-Gómez, Jiangnan Huang, Haozhe Sun, Wei-Wei Tu and Isabelle Guyon    
We address the problem of defending predictive models, such as machine learning classifiers (Defender models), against membership inference attacks, in both the black-box and white-box setting, when the trainer and the trained model are publicly released... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yong Fang, Cheng Huang, Yijia Xu and Yang Li    
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yuichi Komano and Shoichi Hirose    
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is on... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kazuki Koga and Kazuhiro Takemoto    
Universal adversarial attacks, which hinder most deep neural network (DNN) tasks using only a single perturbation called universal adversarial perturbation (UAP), are a realistic security threat to the practical application of a DNN for medical imaging. ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Amy Vennos, Kiernan George and Alan Michaels    
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Raluca Chitic, Ali Osman Topal and Franck Leprévost    
Through the addition of humanly imperceptible noise to an image classified as belonging to a category ???? c a , targeted adversarial attacks can lead convolutional neural networks (CNNs) to classify a modified image as belonging to any predefined target... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »