Academic literature on the topic 'Noise attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Noise attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Noise attack"
Han, Jaeseung, and Dong-Guk Han. "Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm." Sensors 25, no. 13 (2025): 4170. https://doi.org/10.3390/s25134170.
Full textMike, Hamburg, Hermelink Julius, Primas Robert, et al. "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber." IACR Transactions on Cryptographic Hardware and Embedded Systems 2021, no. 4 (2021): 8–113. https://doi.org/10.46586/tches.v2021.i4.88-113.
Full textShi, Lin, Teyi Liao, and Jianfeng He. "Defending Adversarial Attacks against DNN Image Classification Models by a Noise-Fusion Method." Electronics 11, no. 12 (2022): 1814. http://dx.doi.org/10.3390/electronics11121814.
Full textDayananda, Prakyath, Mallikarjunaswamy Srikantaswamy, Sharmila Nagaraju, Rekha Velluri, and Doddananjedevaru Mahesh Kumar. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems (IJPEDS) 13, no. 4 (2022): 2086. http://dx.doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.
Full textPrakyath, Dayananda, Srikantaswamy Mallikarjunaswamy, Nagaraju Sharmila, Velluri Rekha, and Mahesh Kumar Doddananjedevaru. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems 13, no. 4 (2022): 2086~2097. https://doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.
Full textKarpenko, A. P., and V. A. Ovchinnikov. "How to Trick a Neural Network? Synthesising Noise to Reduce the Accuracy of Neural Network Image Classification." Herald of the Bauman Moscow State Technical University. Series Instrument Engineering, no. 1 (134) (March 2021): 102–19. http://dx.doi.org/10.18698/0236-3933-2021-1-102-119.
Full textSudha, M. S., and T. C. Thanuja. "Effect of different attacks on image watermarking using dual tree complex wavelet transform (DTCWT) and principle component analysis (PCA)." International Journal of Engineering & Technology 7, no. 2.9 (2018): 1. http://dx.doi.org/10.14419/ijet.v7i2-9.9249.
Full textWang, Haigang, Kan He, Yuyang Hao, and Shuyuan Yang. "Quantum tomography with Gaussian noise." Quantum Information and Computation 22, no. 13&14 (2022): 1144–57. http://dx.doi.org/10.26421/qic22.13-14-4.
Full textUsenko, Vladyslav C. "Redundancy and Synergy of an Entangling Cloner in Continuous-Variable Quantum Communication." Entropy 24, no. 10 (2022): 1501. http://dx.doi.org/10.3390/e24101501.
Full textGao, Jiaqi, Kangfeng Zheng, Xiujuan Wang, Chunhua Wu, and Bin Wu. "EFSAttack: Edge Noise-Constrained Black-Box Attack Using Artificial Fish Swarm Algorithm." Electronics 13, no. 13 (2024): 2446. http://dx.doi.org/10.3390/electronics13132446.
Full textDissertations / Theses on the topic "Noise attack"
Basu, Prabal. "Toward Reliable, Secure, and Energy-Efficient Multi-Core System Design." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7517.
Full textPokorný, Martin. "Návrh a realizace filtru ADSR." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218044.
Full textCler, Gauthier. "Horizontal Side Channel Attacks on Noisy Traces." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2024. http://www.theses.fr/2024UMONS010.
Full textGabriel, Tomáš. "Konstrukce zkušebního zařízení pro testování adheze a hluku v kontaktu kola a kolejnice." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2020. http://www.nusl.cz/ntk/nusl-417765.
Full textStucke, Russell Andrew. "High Angle-of-Attack Yaw Control Using Strakes on Blunt-Nose Bodies." University of Toledo / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1167777201.
Full textGarcia-Patron, Sanchez Raul. "Quantum information with optical continuous variables: from Bell tests to key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210655.
Full textFabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020/document.
Full textFabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020.
Full textAl, Jurdi Wissam. "Towards next generation recommender systems through generic data quality." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD005.
Full textCamurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.
Full textBooks on the topic "Noise attack"
United States. National Aeronautics and Space Administration., ed. Prediction of the noise from a propeller at angle of attack. National Aeronautics and Space Administration, 1990.
Find full textUnited States. National Aeronautics and Space Administration., ed. Cruise noise of counterrotation propeller at angle of attack in wind tunnel. National Aeronautics and Space Administration, 1987.
Find full textUnited States. National Aeronautics and Space Administration., ed. Prediction of noise field of a propfan at angle of attack. National Aeronautics and Space Administration, 1991.
Find full textCenter, Lewis Research, and United States. National Aeronautics and Space Administration. Scientific and Technical Information Division., eds. The radiation of sound from a propeller at angle of attack. National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1990.
Find full textM, Nallasamy, and United States. National Aeronautics and Space Administration., eds. Near-field noise of a single-rotation propfan at an angle of attack. National Aeronautics and Space Administration, 1990.
Find full textM, Nallasamy, and United States. National Aeronautics and Space Administration., eds. Near-field noise of a single-rotation propfan at an angle of attack. National Aeronautics and Space Administration, 1990.
Find full textJ, Kelly Jeffrey, and Langley Research Center, eds. A users guide for the NASA ANOPP Propeller Analysis System: Under contract NAS1-96014. National Aeronautics and Space Administration, Langley Research Center, 1997.
Find full textJ, Kelly Jeffrey, and Langley Research Center, eds. A users guide for the NASA ANOPP Propeller Analysis System: Under contract NAS1-96014. National Aeronautics and Space Administration, Langley Research Center, 1997.
Find full textNguyen, L. Cathy. A users guide for the NASA ANOPP propeller analysis system. NASA Langley Research Center, 1997.
Find full textNdaona, Chokani, and Langley Research Center, eds. Hypersonic boundary-layer stability experiments on a flared-cone model at angle of attack in a quiet wind tunnel. National Aeronautics and Space Administration, Langley Research Center, 1996.
Find full textBook chapters on the topic "Noise attack"
Okada, Satoshi, and Takuho Mitsunaga. "An Improved Technique for Generating Effective Noises of Adversarial Camera Stickers." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_21.
Full textWang, An, Man Chen, Zongyue Wang, and Yaoling Ding. "Overcoming Significant Noise: Correlation-Template-Induction Attack." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2_27.
Full textKo, Youngjoo, Sangwoo Ji, and Jong Kim. "Low-Noise LLC Side-Channel Attack with Perf." In Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39303-8_25.
Full textWei, Yier, Haichang Gao, Yufei Wang, et al. "TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack." In Artificial Neural Networks and Machine Learning – ICANN 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44192-9_16.
Full textKlingner, Marvin, and Tim Fingscheidt. "Improved DNN Robustness by Multi-task Training with an Auxiliary Self-Supervised Task." In Deep Neural Networks and Data for Automated Driving. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-01233-4_5.
Full textSong, Qianqian, Xiangwei Kong, and Ziming Wang. "Fooling Neural Network Interpretations: Adversarial Noise to Attack Images." In Artificial Intelligence. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93049-3_4.
Full textKorzhik, Valery, Guillermo Morales-Luna, Irina Marakova, and Carlos Patiño-Ruvalcaba. "Digital Watermarking under a Filtering and Additive Noise Attack Condition." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45215-7_32.
Full textChakravarty, Nidhi, and Mohit Dua. "NRASV: Noise Robust ASV System for Audio Replay Attack Detection." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60935-0_56.
Full textSpreeuwers, Luuk, Maikel Schils, Raymond Veldhuis, and Una Kelly. "Practical Evaluation of Face Morphing Attack Detection Methods." In Handbook of Digital Face Manipulation and Detection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_16.
Full textEnvia, Edmane. "Prediction of Noise Field of a Propfan at Angle of Attack." In Unsteady Aerodynamics, Aeroacoustics, and Aeroelasticity of Turbomachines and Propellers. Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9341-2_35.
Full textConference papers on the topic "Noise attack"
Bajpayee, Soumen, Sarbani Sen, Anipriyo Mandal, and Imon Mukherjee. "Quantum Teleportation under Siege: Analyzing Noise Attack with Virtual Entanglement." In 2024 IEEE Calcutta Conference (CALCON). IEEE, 2024. https://doi.org/10.1109/calcon63337.2024.10914263.
Full textShukla, Vinay, Sanjay Kumar, Sanjay Sharma, and Arihant Gupta. "A Noise Attack Resistant Blind 3D Watermarking Algorithm for IP Rights Protection." In 2024 International Conference on Computing, Sciences and Communications (ICCSC). IEEE, 2024. https://doi.org/10.1109/iccsc62048.2024.10830381.
Full textMalpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.
Full textPellicer, Alvaro Lopez, Kittipos Giatgong, Yi Li, Neeraj Suri, and Plamen Angelov. "UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification." In 2024 International Joint Conference on Neural Networks (IJCNN). IEEE, 2024. http://dx.doi.org/10.1109/ijcnn60899.2024.10651159.
Full textSmith, Morgan T., and Digby D. Macdonald. "Wavelet Analysis of Electrochemical Noise Data." In CORROSION 2005. NACE International, 2005. https://doi.org/10.5006/c2005-05355.
Full textWu, Ting, Jingyi Liu, Rui Zheng, Tao Gui, Qi Zhang, and Xuanjing Huang. "Enhancing Contrastive Learning with Noise-Guided Attack: Towards Continual Relation Extraction in the Wild." In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.acl-long.121.
Full textEden, D. A. "Electrochemical Noise - the First Two Octaves." In CORROSION 1998. NACE International, 1998. https://doi.org/10.5006/c1998-98386.
Full textEden, D. A., K. Hladky, D. G. John, and J. L. Dawson. "Electrochemical Noise - Simultaneous Monitoring of Potential and Current Noise Signals from Corroding Electrodes." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86274.
Full textUruchurtu, J., and J. L. Dawson. "Electrochemical Noise Monitoring for Sacrificial Anodes in Cathodic Protection Systems." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86293.
Full textPutla, Harsha, Chanakya Patibandla, Krishna Pratap Singh, and P. Nagabhushan. "Evaluating Data Poisoning Vulnerability in Selective Reincarnation within c-MARL to Salt and Pepper Noise Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723915.
Full textReports on the topic "Noise attack"
Soramäki, Kimmo. Financial Cartography. FNA, 2019. http://dx.doi.org/10.69701/ertx8007.
Full text