Search
Search Results
-
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
The security requirements of new applications such as cloud computing, big data, and the Internet of Things have promoted the development and...
-
Distinguishing Error of Nonlinear Invariant Attacks
Todo et al. (2018) have proposed nonlinear invariant attacks which consider correlations between nonlinear input and output combiners for a key... -
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant
Deep learning has shown remarkable advantages in many fields. Although the image recognition capabilities and deep neural network (DNN) have...
-
On the impossibility of an invariant attack on Kuznyechik
Currently numerous cryptographic systems are based on SP-networks. These primitives are supposed to be secure but recent investigations show that...
-
Label-Only Membership Inference Attack Based on Model Explanation
It is well known that machine learning models (e.g., image recognition) can unintentionally leak information about the training set. Conventional...
-
Locating collaborative attack targets based on physical invariants toward cyber-physical systems
Various studies have demonstrated that the collaborative false command injection (FCI) and false sensory data injection (FDI) attacks can go...
-
Improved Methods to Solve Nonlinear Invariants with Low Algebraic Degree for Linear Transformation
How to find the nonlinear invariants is the core step for the nonlinear invariant attack. In this paper, to reduce the costs in finding nonlinear...
-
Research on nonlinear invariants of a power function over a binary field
The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method...
-
Resilient Model Predictive Control of Distributed Systems Under Attack Using Local Attack Identification
With the growing share of renewable energy sources, the uncertainty in power supply is increasing. In addition to the inherent fluctuations in the...
-
Poisoning attack on VIMT and its adverse effect
In recent years, various approaches have been proposed to design control systems that directly utilize data without mathematical plant models....
-
A hybrid style transfer with whale optimization algorithm model for textual adversarial attack
Deep learning has been widely used in various research fields. However, researchers have discovered that deep learning models are vulnerable to...
-
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical...
-
SCPAD: An approach to explore optical characteristics for robust static presentation attack detection
Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new...
-
The Retracing Boomerang Attack, with Application to Reduced-Round AES
Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and...
-
Nonlinear modeling and designing transition flight control scenarios for a dual thrust hybrid UAV
Researchers have recently focused on studying the flight dynamics and control of multicopters and fixed-wing aerial vehicles. However, investigating...
-
Numerical Calculation and Identification of 3D Time-Invariant Freak Waves Based on JONSWAP Spectrum and Donelan Direction Function
The results of recent maritime accident investigations show that many shipwrecks are related to the attack of freak waves, which can sink ships... -
An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA
A blind digital image watermarking method based on combination of Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Principal...
-
Nonlinear and reinforcement learning control for motion of hybrid aerial underwater vehicle
Hybrid aerial underwater vehicle (HAUV), a new type of vehicle that can operate in the air and underwater, has emerged in recent years and...
-
Combining wavelet transforms features and high-level features using CNN for face morphing attack detection
Face recognition is the most extensively utilized verification method for security and public safety. In many nations, the Automatic Border Control...