Search

Search Results

Showing 1-20 of 1,181 results
  1. Article

    Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes

    The security requirements of new applications such as cloud computing, big data, and the Internet of Things have promoted the development and...

    Bolin Wang, Wenling Wu in Designs, Codes and Cryptography
    21 July 2024
  2. Conference paper

    Distinguishing Error of Nonlinear Invariant Attacks

    Todo et al. (2018) have proposed nonlinear invariant attacks which consider correlations between nonlinear input and output combiners for a key...
    Subhabrata Samajder, Palash Sarkar in Progress in Cryptology – INDOCRYPT 2022
    2022
  3. Article

    Improved nonlinear invariant attack

    Haipeng Tong, Xuan Shen, ... Yunwen Liu in Science China Information Sciences
    24 May 2021
  4. Article

    An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant

    Deep learning has shown remarkable advantages in many fields. Although the image recognition capabilities and deep neural network (DNN) have...

    Zigang Chen, Renjie Dai, ... Kai Sheng in Neural Processing Letters
    22 October 2022
  5. Article

    On the impossibility of an invariant attack on Kuznyechik

    Currently numerous cryptographic systems are based on SP-networks. These primitives are supposed to be secure but recent investigations show that...

    29 November 2021
  6. Article
    Full access

    Label-Only Membership Inference Attack Based on Model Explanation

    It is well known that machine learning models (e.g., image recognition) can unintentionally leak information about the training set. Conventional...

    Yao Ma, Xurong Zhai, ... Yongle Chen in Neural Processing Letters
    18 September 2024 Open access
  7. Article

    Locating collaborative attack targets based on physical invariants toward cyber-physical systems

    Various studies have demonstrated that the collaborative false command injection (FCI) and false sensory data injection (FDI) attacks can go...

    Peng Xun, Ziyu Yang, ... Zhu Tang in International Journal of Information Security
    08 November 2023
  8. Article

    Improved Methods to Solve Nonlinear Invariants with Low Algebraic Degree for Linear Transformation

    How to find the nonlinear invariants is the core step for the nonlinear invariant attack. In this paper, to reduce the costs in finding nonlinear...

    Zebin Wang, Chenhui Jin, ... Ting Cui in Theory of Computing Systems
    05 March 2025
  9. Article

    Research on nonlinear invariants of a power function over a binary field

    The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method...

    Zebin Wang, Chenhui Jin, Ting Cui in Cryptography and Communications
    12 August 2024
  10. Article

    Resilient Model Predictive Control of Distributed Systems Under Attack Using Local Attack Identification

    With the growing share of renewable energy sources, the uncertainty in power supply is increasing. In addition to the inherent fluctuations in the...

    Sarah Braun, Sebastian Albrecht, Sergio Lucia in SN Computer Science
    14 December 2023
  11. Article

    Poisoning attack on VIMT and its adverse effect

    In recent years, various approaches have been proposed to design control systems that directly utilize data without mathematical plant models....

    Taichi Ikezaki, Osamu Kaneko, ... Junya Fujita in Artificial Life and Robotics
    13 November 2023
  12. Article

    A hybrid style transfer with whale optimization algorithm model for textual adversarial attack

    Deep learning has been widely used in various research fields. However, researchers have discovered that deep learning models are vulnerable to...

    Yan Kang, Jianjun Zhao, ... Wentao Xie in Neural Computing and Applications
    11 December 2023
  13. Article
    Full access

    EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

    Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical...

    Vikas Maurya, Rachit Agarwal, ... Sandeep Shukla in Cybersecurity
    01 November 2023 Open access
  14. Article

    SCPAD: An approach to explore optical characteristics for robust static presentation attack detection

    Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new...

    Chen Dang, Zhaoqiang Xia, ... Xiaoyi Feng in Multimedia Tools and Applications
    27 June 2023
  15. Article
    Full access

    The Retracing Boomerang Attack, with Application to Reduced-Round AES

    Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and...

    Orr Dunkelman, Nathan Keller, ... Adi Shamir in Journal of Cryptology
    15 July 2024 Open access
  16. Article

    Nonlinear modeling and designing transition flight control scenarios for a dual thrust hybrid UAV

    Researchers have recently focused on studying the flight dynamics and control of multicopters and fixed-wing aerial vehicles. However, investigating...

    Navid Mohammadi, Morteza Tayefi, Man Zhu in International Journal of Intelligent Robotics and Applications
    27 June 2024
  17. Conference paper

    Numerical Calculation and Identification of 3D Time-Invariant Freak Waves Based on JONSWAP Spectrum and Donelan Direction Function

    The results of recent maritime accident investigations show that many shipwrecks are related to the attack of freak waves, which can sink ships...
    Geng-Kun Wu, Ruo-Yu Li, ... Bin Liu in Artificial Intelligence and Robotics
    2025
  18. Article

    An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA

    A blind digital image watermarking method based on combination of Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Principal...

    S. Abolfazl Hosseini, Parya Farahmand in Multimedia Tools and Applications
    02 August 2023
  19. Article

    Nonlinear and reinforcement learning control for motion of hybrid aerial underwater vehicle

    Hybrid aerial underwater vehicle (HAUV), a new type of vehicle that can operate in the air and underwater, has emerged in recent years and...

    Junping Li, Hexiong Zhou, ... Lian Lian in Neural Computing and Applications
    23 December 2024
  20. Article

    Combining wavelet transforms features and high-level features using CNN for face morphing attack detection

    Face recognition is the most extensively utilized verification method for security and public safety. In many nations, the Automatic Border Control...

    Iman S. Razaq, Baheja K. Shukur in International Journal of Information Technology
    07 September 2023
Did you find what you were looking for? Share feedback.