Journal articles on the topic 'Data poisoning attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data poisoning attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Billah, Mustain, Adnan Anwar, Ziaur Rahman, and Syed Md Galib. "Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes." Energies 14, no. 13 (June 28, 2021): 3887. http://dx.doi.org/10.3390/en14133887.
Full textChen, Jian, Xuxin Zhang, Rui Zhang, Chen Wang, and Ling Liu. "De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks." IEEE Transactions on Information Forensics and Security 16 (2021): 3412–25. http://dx.doi.org/10.1109/tifs.2021.3080522.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textDunn, Corey, Nour Moustafa, and Benjamin Turnbull. "Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things." Sustainability 12, no. 16 (August 10, 2020): 6434. http://dx.doi.org/10.3390/su12166434.
Full textWeerasinghe, Sandamal, Tansu Alpcan, Sarah M. Erfani, and Christopher Leckie. "Defending Support Vector Machines Against Data Poisoning Attacks." IEEE Transactions on Information Forensics and Security 16 (2021): 2566–78. http://dx.doi.org/10.1109/tifs.2021.3058771.
Full textKalajdzic, Kenan, Ahmed Patel, and Mona Taghavi. "Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 50–60. http://dx.doi.org/10.4018/jdcf.2011070104.
Full textAlsuwat, Emad, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. "Adversarial data poisoning attacks against the PC learning algorithm." International Journal of General Systems 49, no. 1 (June 17, 2019): 3–31. http://dx.doi.org/10.1080/03081079.2019.1630401.
Full textPrabadevi, B., and N. Jeyanthi. "TSCBA-A Mitigation System for ARP Cache Poisoning Attacks." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 75–93. http://dx.doi.org/10.2478/cait-2018-0049.
Full textZhou, Xingchen, Ming Xu, Yiming Wu, and Ning Zheng. "Deep Model Poisoning Attack on Federated Learning." Future Internet 13, no. 3 (March 14, 2021): 73. http://dx.doi.org/10.3390/fi13030073.
Full textAydin, Burc. "Global Characteristics of Chemical, Biological, and Radiological Poison Use in Terrorist Attacks." Prehospital and Disaster Medicine 35, no. 3 (April 2, 2020): 260–66. http://dx.doi.org/10.1017/s1049023x20000394.
Full textTaheri, Rahim, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, and Mauro Conti. "On defending against label flipping attacks on malware detection systems." Neural Computing and Applications 32, no. 18 (July 28, 2020): 14781–800. http://dx.doi.org/10.1007/s00521-020-04831-9.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textChiba, Tomoki, Yuichi Sei, Yasuyuki Tahara, and Akihiko Ohsuga. "A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning." International Journal of Semantic Computing 15, no. 02 (June 2021): 215–40. http://dx.doi.org/10.1142/s1793351x21400043.
Full textSabir, Bushra, Faheem Ullah, M. Ali Babar, and Raj Gaire. "Machine Learning for Detecting Data Exfiltration." ACM Computing Surveys 54, no. 3 (June 2021): 1–47. http://dx.doi.org/10.1145/3442181.
Full textUlva, Fadillah, Nurul Prihastita Rizyana, and Afzahul Rahmi. "Hubungan Tingkat Pengetahuan Dengan Gejala Keracunan Pestisida pada Petani Penyemprot Pestisida Tanaman Holtikultura di Kecamatan Lembah Gumanti Kabupaten Solok Tahun 2019." Jurnal Ilmiah Universitas Batanghari Jambi 19, no. 3 (October 15, 2019): 501. http://dx.doi.org/10.33087/jiubj.v19i3.696.
Full textSingh, Vishwa Pratap, and R. L. Ujjwal. "Threat identification and risk assessments for named data networking architecture using SecRam." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (April 9, 2021): 33–47. http://dx.doi.org/10.3233/kes-210051.
Full textDuan, Jinhuan, Xianxian Li, Shiqi Gao, Zili Zhong, and Jinyan Wang. "SSGD: A Safe and Efficient Method of Gradient Descent." Security and Communication Networks 2021 (August 5, 2021): 1–11. http://dx.doi.org/10.1155/2021/5404061.
Full textXuan, Shichang, Ming Jin, Xin Li, Zhaoyuan Yao, Wu Yang, and Dapeng Man. "DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems." Security and Communication Networks 2021 (July 1, 2021): 1–14. http://dx.doi.org/10.1155/2021/9965157.
Full textMahloujifar, Saeed, Dimitrios I. Diochnos, and Mohammad Mahmoody. "The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 4536–43. http://dx.doi.org/10.1609/aaai.v33i01.33014536.
Full textXiang, Zhen, David J. Miller, Hang Wang, and George Kesidis. "Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set." Neural Computation 33, no. 5 (April 13, 2021): 1329–71. http://dx.doi.org/10.1162/neco_a_01376.
Full textRathore, Shailendra, Yi Pan, and Jong Hyuk Park. "BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network." Sustainability 11, no. 14 (July 22, 2019): 3974. http://dx.doi.org/10.3390/su11143974.
Full textKasyap, Harsh, and Somanath Tripathy. "Privacy-preserving Decentralized Learning Framework for Healthcare System." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 2s (June 10, 2021): 1–24. http://dx.doi.org/10.1145/3426474.
Full textKhosravi, Alireza, Abdolreza Ghoreishi, and Seyyedeh-Masoumeh Bagheri. "Epidemiologic study of causes of seizure attacks in patients admitted to emergency of Zahedan city hospital, 2015-2016." International Journal Of Community Medicine And Public Health 5, no. 1 (December 23, 2017): 72. http://dx.doi.org/10.18203/2394-6040.ijcmph20175765.
Full textChinonso Mark, Kingsley. "Russia-United Kingdom Diplomatic Crisis over Salisbury Nerve Agent Attack: An Analysis." International Journal of Law and Public Administration 1, no. 1 (June 11, 2018): 58. http://dx.doi.org/10.11114/ijlpa.v1i1.3357.
Full textDar, Bilquees, and Sheraz Ahsmad Lone. "Pre and post Vulnerability of Floods to Mental Health Among the Residents of Srinagar City, J&K-India." Sustainability, Agri, Food and Environmental Research 11, no. 1 (June 6, 2021): 1–12. http://dx.doi.org/10.7770/safer-v11n1-art2393.
Full textBaud, F. J. "Cyanide: critical issues in diagnosis and treatment." Human & Experimental Toxicology 26, no. 3 (March 2007): 191–201. http://dx.doi.org/10.1177/0960327107070566.
Full textKwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (July 8, 2019): 892. http://dx.doi.org/10.3390/sym11070892.
Full textLi, Mohan, Yanbin Sun, Hui Lu, Sabita Maharjan, and Zhihong Tian. "Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems." IEEE Internet of Things Journal 7, no. 7 (July 2020): 6266–78. http://dx.doi.org/10.1109/jiot.2019.2962914.
Full textQureshi, Adnan Mahmood, Nadeem Anjum, Rao Naveed Bin Rais, Masood Ur-Rehman, and Amir Qayyum. "Detection of malicious consumer interest packet with dynamic threshold values." PeerJ Computer Science 7 (March 17, 2021): e435. http://dx.doi.org/10.7717/peerj-cs.435.
Full textAhmad, Nasir, Adi Isworo, and Citra Indriani. "KEJADIAN LUAR BIASA KERACUNAN “CUMI-CUMIAN” DI SEKOLAH DASAR NEGERI 1 TRASAN BANDONGAN KABUPATEN MAGELANG." MEDIA ILMU KESEHATAN 7, no. 2 (November 17, 2019): 131–36. http://dx.doi.org/10.30989/mik.v7i2.232.
Full textAhmad, Nasir. "KEJADIAN LUAR BIASA KERACUNAN “CUMI-CUMIAN” DI SEKOLAH DASAR NEGERI 1 TRASAN BANDONGAN KABUPATEN MAGELANG." Media Ilmu Kesehatan 7, no. 2 (August 30, 2018): 131–36. http://dx.doi.org/10.30989/mik.v7i2.280.
Full textGlynn, J. R., and D. J. Bradley. "The relationship between infecting dose and severity of disease in reported outbreaks of salmonella infections." Epidemiology and Infection 109, no. 3 (December 1992): 371–88. http://dx.doi.org/10.1017/s0950268800050366.
Full textTracqui, A., C. Mutter-Schmidt, P. Kintz, C. Berton, and P. Mangin. "Amisulpride poisoning: a report on two cases." Human & Experimental Toxicology 14, no. 3 (March 1995): 294–98. http://dx.doi.org/10.1177/096032719501400310.
Full textHidano, Seira, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, and Goichiro Hanaoka. "Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 264–83. http://dx.doi.org/10.2478/popets-2020-0052.
Full textUllah, Syed Sajid, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Muhammad Adnan, Saddam Hussain, Noor Ul Amin, and Muazzam A. Khan Khattak. "A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things." IEEE Access 8 (2020): 98910–28. http://dx.doi.org/10.1109/access.2020.2995080.
Full textHussain, Saddam, Syed Sajid Ullah, Abdu Gumaei, Mabrook Al-Rakhami, Ijaz Ahmad, and Syed Muhammad Arif. "A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things." IEEE Access 9 (2021): 40198–215. http://dx.doi.org/10.1109/access.2021.3063490.
Full textHorikoshi, Chifuyu, Phil F. Battley, and Edward O. Minot. "Annual survival estimates and risk of fluoroacetate (1080) secondary poisoning for New Zealand falcons (Falco novaeseelandiae) in a managed exotic forest." Wildlife Research 45, no. 2 (2018): 155. http://dx.doi.org/10.1071/wr17144.
Full textPrajapati, Paresh, Prabhjot Kaur, Tanvir K. Sidhu, Gurkirat Singh, Shyam Mehra, Sourabh Paul, Varun M. Malhotra, and Rupali . "Investigation of the food poisoning outbreak in girls hostel of medical college in Punjab." International Journal Of Community Medicine And Public Health 7, no. 8 (July 24, 2020): 3166. http://dx.doi.org/10.18203/2394-6040.ijcmph20203395.
Full textCherney, L. S., H. V. Fesenko, А. V. Prokhorov, О. Yu Moroz, and V. M. Liaskivskiy. "The Beetles (Coleoptera) dangerous for Japanese quail Coturnix japonica Temminck et Schlegel, 1849 (Phasanidae) at farms." Ukrainian Entomological Journal 16, no. 1 (October 2, 2019): 36–43. http://dx.doi.org/10.15421/281906.
Full textHadzic, Devleta, Nada Mladina, Mirsada Praso, Selmira Brkic, and Belkisa Colic. "CHARACTERISTICS OF CHILDHOOD DIFFICULTIES IN BREATHING SYNDROME." Acta Medica Saliniana 37, no. 2 (December 28, 2008): 151–56. http://dx.doi.org/10.5457/ams.v37i2.14.
Full textSamosir, Kholilah, Onny Setiani, and Nurjazuli Nurjazuli. "Hubungan Pajanan Pestisida dengan Gangguan Keseimbangan Tubuh Petani Hortikultura di Kecamatan Ngablak Kabupaten Magelang." JURNAL KESEHATAN LINGKUNGAN INDONESIA 16, no. 2 (November 7, 2017): 63. http://dx.doi.org/10.14710/jkli.16.2.63-69.
Full textNahorna, A. M., and N. V. Savenkova. "Natural death of the employees at workplace in Ukraine in the dynamics of 2015-2020." Environment & Health 100 (3) (September 2021): 13–21. http://dx.doi.org/10.32402/dovkil2021.03.013.
Full text"DNS Security - Prevent DNS Cache Poisoning Attack using Blockchain." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 2151–62. http://dx.doi.org/10.35940/ijitee.d1549.029420.
Full textChen, Liang, Yangjun Xu, Fenfang Xie, Min Huang, and Zibin Zheng. "Data poisoning attacks on neighborhood‐based recommender systems." Transactions on Emerging Telecommunications Technologies, January 14, 2020. http://dx.doi.org/10.1002/ett.3872.
Full textTakiddin, Abdulrahman, Muhammad Ismail, Usman Zafar, and Erchin Serpedin. "Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids." IEEE Transactions on Smart Grid, 2020, 1. http://dx.doi.org/10.1109/tsg.2020.3047864.
Full textGanesan, Kavitha. "Machine Learning Data Detection Poisoning Attacks Using Resource Schemes Multi-Linear Regression." Neural, Parallel, & Scientific Computations 28, no. 2 (June 1, 2020). http://dx.doi.org/10.46719/npsc20202821.
Full textAl-Drees, Mohammed, Marwah M. Almasri, Mousa Al-Akhras, and Mohammed Alawairdhi. "Building a DNS Tunneling Dataset." International Journal of Sensors, Wireless Communications and Control 10 (November 24, 2020). http://dx.doi.org/10.2174/2210327910999201124205758.
Full textZhao, Ping, Hongbo Jiang, Jie Li, Zhu Xiao, Daibo Liu, Ju Ren, and Deke Guo. "Garbage in, Garbage out: Poisoning Attacks Disguised with Plausible Mobility in Data Aggregation." IEEE Transactions on Network Science and Engineering, 2021, 1. http://dx.doi.org/10.1109/tnse.2021.3103919.
Full text"DNS Aegis, Authentication with Digital Signature using Hash Functions and Various Attacks: KARKOFF." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 5066–69. http://dx.doi.org/10.35940/ijitee.a8901.119119.
Full textCrook, Alexandra, Aline De Lima Leite, Thomas Payne, Fatema Bhinderwala, Jade Woods, Vijay K. Singh, and Robert Powers. "Radiation exposure induces cross-species temporal metabolic changes that are mitigated in mice by amifostine." Scientific Reports 11, no. 1 (July 7, 2021). http://dx.doi.org/10.1038/s41598-021-93401-7.
Full text