Academic literature on the topic 'Noise attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Noise attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Noise attack"

1

Han, Jaeseung, and Dong-Guk Han. "Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm." Sensors 25, no. 13 (2025): 4170. https://doi.org/10.3390/s25134170.

Full text
Abstract:
Deterministic random bit generators (DRBG) play a crucial role in device security because they generate secret information cryptographic systems, e.g., secret keys and parameters. Thus, attacks on DRBGs can result in the exposure of important secret values, which can threaten the entire cryptographic system of the target Internet of Things (IoT) equipment and smart devices. In 2020, Meyer proposed a side-channel attack (SCA) method that recovers the output random bits by analyzing the power consumption traces of the NIST standard AES CTR DRBG. In addition, most algorithmic countermeasures agai
APA, Harvard, Vancouver, ISO, and other styles
2

Mike, Hamburg, Hermelink Julius, Primas Robert, et al. "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber." IACR Transactions on Cryptographic Hardware and Embedded Systems 2021, no. 4 (2021): 8–113. https://doi.org/10.46586/tches.v2021.i4.88-113.

Full text
Abstract:
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood. Two recent works have presented successful single-trace attacks targeting the Number Theoretic Transform (NTT), which is at the heart of many lattice-based schemes. However, these attacks either require a quite powerful side-channel adversary or are restricted to specific scenarios such as the encryption of ephemeral secrets. It is still an open question if such attacks can be performed by simpler adversaries while
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Lin, Teyi Liao, and Jianfeng He. "Defending Adversarial Attacks against DNN Image Classification Models by a Noise-Fusion Method." Electronics 11, no. 12 (2022): 1814. http://dx.doi.org/10.3390/electronics11121814.

Full text
Abstract:
Adversarial attacks deceive deep neural network models by adding imperceptibly small but well-designed attack data to the model input. Those attacks cause serious problems. Various defense methods have been provided to defend against those attacks by: (1) providing adversarial training according to specific attacks; (2) denoising the input data; (3) preprocessing the input data; and (4) adding noise to various layers of models. Here we provide a simple but effective Noise-Fusion Method (NFM) to defend adversarial attacks against DNN image classification models. Without knowing any details abou
APA, Harvard, Vancouver, ISO, and other styles
4

Dayananda, Prakyath, Mallikarjunaswamy Srikantaswamy, Sharmila Nagaraju, Rekha Velluri, and Doddananjedevaru Mahesh Kumar. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems (IJPEDS) 13, no. 4 (2022): 2086. http://dx.doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.

Full text
Abstract:
The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random attack is reduced. The monitoring and security of smart grid systems are improved using reconfigurable Kalman filter. Methods: A sinusoidal voltage signal with random Gaussian noise is applied to the Reconfigurable Euclidean detector (RED) evaluator. The MATLAB function randn() has been used to produce sequence distribution channel noise with mean value zero to analysed the amplitude variation with respect to evolution state variable. The detector noise rate is analysed with respect to threshold. Th
APA, Harvard, Vancouver, ISO, and other styles
5

Prakyath, Dayananda, Srikantaswamy Mallikarjunaswamy, Nagaraju Sharmila, Velluri Rekha, and Mahesh Kumar Doddananjedevaru. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems 13, no. 4 (2022): 2086~2097. https://doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.

Full text
Abstract:
The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random attack is reduced. The monitoring and security of smart grid systems are improved using reconfigurable Kalman filter. Methods: A sinusoidal voltage signal with random Gaussian noise is applied to the Reconfigurable Euclidean detector (RED) evaluator. The MATLAB function randn() has been used to produce sequence distribution channel noise with mean value zero to analysed the amplitude variation with respect to evolution state variable. The detector noise rate is analysed with respect to threshold. Th
APA, Harvard, Vancouver, ISO, and other styles
6

Karpenko, A. P., and V. A. Ovchinnikov. "How to Trick a Neural Network? Synthesising Noise to Reduce the Accuracy of Neural Network Image Classification." Herald of the Bauman Moscow State Technical University. Series Instrument Engineering, no. 1 (134) (March 2021): 102–19. http://dx.doi.org/10.18698/0236-3933-2021-1-102-119.

Full text
Abstract:
The study aims to develop an algorithm and then software to synthesise noise that could be used to attack deep learning neural networks designed to classify images. We present the results of our analysis of methods for conducting this type of attacks. The synthesis of attack noise is stated as a problem of multidimensional constrained optimization. The main features of the attack noise synthesis algorithm proposed are as follows: we employ the clip function to take constraints on noise into account; we use the top-1 and top-5 classification error ratings as attack noise efficiency criteria; we
APA, Harvard, Vancouver, ISO, and other styles
7

Sudha, M. S., and T. C. Thanuja. "Effect of different attacks on image watermarking using dual tree complex wavelet transform (DTCWT) and principle component analysis (PCA)." International Journal of Engineering & Technology 7, no. 2.9 (2018): 1. http://dx.doi.org/10.14419/ijet.v7i2-9.9249.

Full text
Abstract:
Perceptibility and robustness are two incongruous requirements demanded by digital image watermarking for digital right management and other applications. A realistic way to concurrently satisfy the two contradictory requirements is to use robust watermark algorithm. The developed algorithm uses DTCWT and PCA techniques to embed watermark signal in host signal. To prove the algorithm robustness without much affecting perceptibility several attacks like noises, cropping, blurring, rotation are applied and tested by varying attack parameters. Parameters like Peak signal noise ratio and Correlati
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Haigang, Kan He, Yuyang Hao, and Shuyuan Yang. "Quantum tomography with Gaussian noise." Quantum Information and Computation 22, no. 13&14 (2022): 1144–57. http://dx.doi.org/10.26421/qic22.13-14-4.

Full text
Abstract:
In this paper, we propose an estimation of quantum resources necessary for recovering a key using Known Plain Text Attack (KPA) model for SPARKLE family of LWC authenticated block ciphers - SCHWAEMM. The procedure is based on a general attack using Grover's search algorithm with encryption oracle over key space in superposition. The paper explains step by step how to evaluate the cost of each operation type in encryption oracle in terms of various quantum and reversible gates. The result of this paper is an implementation of the simplified version of this cipher using quantum computer and summ
APA, Harvard, Vancouver, ISO, and other styles
9

Usenko, Vladyslav C. "Redundancy and Synergy of an Entangling Cloner in Continuous-Variable Quantum Communication." Entropy 24, no. 10 (2022): 1501. http://dx.doi.org/10.3390/e24101501.

Full text
Abstract:
We address minimization of information leakage from continuous-variable quantum channels. It is known, that regime of minimum leakage can be accessible for the modulated signal states with variance equivalent to a shot noise, i.e., vacuum fluctuations, in the case of collective attacks. Here we derive the same condition for the individual attacks and analytically study the properties of the mutual information quantities in and out of this regime. We show that in such regime a joint measurement on the modes of a two-mode entangling cloner, being the optimal individual eavesdropping attack in a
APA, Harvard, Vancouver, ISO, and other styles
10

Gao, Jiaqi, Kangfeng Zheng, Xiujuan Wang, Chunhua Wu, and Bin Wu. "EFSAttack: Edge Noise-Constrained Black-Box Attack Using Artificial Fish Swarm Algorithm." Electronics 13, no. 13 (2024): 2446. http://dx.doi.org/10.3390/electronics13132446.

Full text
Abstract:
Black-box attacks generate adversarial examples by querying the target model and updating the noise according to the feedback. However, the current black-box attack methods require excessive queries to generate adversarial examples, increasing the risk of detection by target defense systems. Furthermore, the current black-box attack methods primarily focus on controlling the magnitude of perturbations while neglecting the impact of perturbation placement on the stealthiness of adversarial examples. To this end, we propose a novel edge noise-constrained black-box attack method using the artific
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Noise attack"

1

Basu, Prabal. "Toward Reliable, Secure, and Energy-Efficient Multi-Core System Design." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7517.

Full text
Abstract:
Computer hardware researchers have perennially focussed on improving the performance of computers while stipulating the energy consumption under a strict budget. While several innovations over the years have led to high performance and energy efficient computers, more challenges have also emerged as a fallout. For example, smaller transistor devices in modern multi-core systems are afflicted with several reliability and security concerns, which were inconceivable even a decade ago. Tackling these bottlenecks happens to negatively impact the power and performance of the computers. This disserta
APA, Harvard, Vancouver, ISO, and other styles
2

Pokorný, Martin. "Návrh a realizace filtru ADSR." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218044.

Full text
Abstract:
The master´s thesis is focused on design of ADSR filter and voltage controlled amplifier (VCA). Three additional circuits performing analog signal processing are added. Functionality of designed circuits is verified in simulation program. All designed circuits are practically realized. Thesis includes complete design of the mentioned circuits and all necessary informations for its practical realization. All designed circuits are measured and the results are presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Cler, Gauthier. "Horizontal Side Channel Attacks on Noisy Traces." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2024. http://www.theses.fr/2024UMONS010.

Full text
Abstract:
Récemment, l'utilisation de réseaux de neurones dans le cadre des attaques par canaux auxiliaires de type profilées sur systèmes ouverts a démontré son efficacité jusqu'à presque remplacer les techniques précédemment utilisées. Néanmoins, lorsqu'il n'est pas possible d'avoir accès à un système ouvert et lorsque les attaques dites verticales ne sont pas envisageables, la principale option restante est de mettre en oeuvre des attaques horizontales. C'est généralement le cas pour des implémentations d'algorithmes de cryptographie asymétrique (RSA, ECC). Les attaques horizontales existantes s'appu
APA, Harvard, Vancouver, ISO, and other styles
4

Gabriel, Tomáš. "Konstrukce zkušebního zařízení pro testování adheze a hluku v kontaktu kola a kolejnice." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2020. http://www.nusl.cz/ntk/nusl-417765.

Full text
Abstract:
This master’s thesis is dedicated to the design of an experimental rig that allows investigation of causes for noise during tram’s passing of a track curve and the developement of means to mitigate this noise. The opening section of this thesis contains theoretical background for the tribological mechanics of wheel-rail contact with emphasis on the process of noise generation, followed by an overview of laboratory tst rigs with similar purpose. Design itself is centered around the implementation of the dynamic model of wheel-rail contact using real tram wheel. Resulting test rig allows measure
APA, Harvard, Vancouver, ISO, and other styles
5

Stucke, Russell Andrew. "High Angle-of-Attack Yaw Control Using Strakes on Blunt-Nose Bodies." University of Toledo / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1167777201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garcia-Patron, Sanchez Raul. "Quantum information with optical continuous variables: from Bell tests to key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210655.

Full text
Abstract:
In this thesis we have studied different aspects of the novel field of quantum information with continuous variables. The higher efficiency and bandwidth of homodyne detection combined with the easiness of generation and manipulation of Gaussian states makes continuous-variable quantum information a promising and flourishing field of research. This dissertation is divided in two parts. The first part explores two applications of the “photon subtraction” operation; Firstly, a technique to generate highly non-Gaussian single-mode states of light; Secondly, an experimental setup capable of realiz
APA, Harvard, Vancouver, ISO, and other styles
7

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020/document.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation effic
APA, Harvard, Vancouver, ISO, and other styles
8

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation effic
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Jurdi Wissam. "Towards next generation recommender systems through generic data quality." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD005.

Full text
Abstract:
Les systèmes de recommandation sont essentiels pour filtrer les informations en ligne et fournir un contenu personnalisé, réduisant ainsi l’effort nécessaire pour trouver des informations pertinentes. Ils jouent un rôle crucial dans divers domaines, dont le commerce électronique, en aidant les clients à trouver des produits pertinents, améliorant l’expérience utilisateur et augmentant les ventes. Un aspect significatif de ces systèmes est le concept d’inattendu, qui implique la découverte d’éléments nouveaux et surprenants. Cependant, il est complexe et subjectif, nécessitant une compréhension
APA, Harvard, Vancouver, ISO, and other styles
10

Camurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.

Full text
Abstract:
Les ordiphones et les objets connectés utilisent des radio pour communiquer avec d’autres appareils électroniques. Ces radio sont placées à côté du processeur et des autres composants numériques. Par exemple, dans les ordiphones un processeur, une mémoire et plusieurs émetteurs-récepteurs radio se trouvent sur la même plateforme. Les systèmes embarquées, plus simples, utilisent souvent des puces à signaux mixtes contenant à la fois un microcontrôleur et un émetteur-récepteur. La proximité physique entre les blocs numériques, qui produisent un bruit électromagnétique très fort, et les émetteurs
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Noise attack"

1

United States. National Aeronautics and Space Administration., ed. Prediction of the noise from a propeller at angle of attack. National Aeronautics and Space Administration, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Aeronautics and Space Administration., ed. Cruise noise of counterrotation propeller at angle of attack in wind tunnel. National Aeronautics and Space Administration, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. National Aeronautics and Space Administration., ed. Prediction of noise field of a propfan at angle of attack. National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Center, Lewis Research, and United States. National Aeronautics and Space Administration. Scientific and Technical Information Division., eds. The radiation of sound from a propeller at angle of attack. National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, Nallasamy, and United States. National Aeronautics and Space Administration., eds. Near-field noise of a single-rotation propfan at an angle of attack. National Aeronautics and Space Administration, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

M, Nallasamy, and United States. National Aeronautics and Space Administration., eds. Near-field noise of a single-rotation propfan at an angle of attack. National Aeronautics and Space Administration, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Kelly Jeffrey, and Langley Research Center, eds. A users guide for the NASA ANOPP Propeller Analysis System: Under contract NAS1-96014. National Aeronautics and Space Administration, Langley Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

J, Kelly Jeffrey, and Langley Research Center, eds. A users guide for the NASA ANOPP Propeller Analysis System: Under contract NAS1-96014. National Aeronautics and Space Administration, Langley Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, L. Cathy. A users guide for the NASA ANOPP propeller analysis system. NASA Langley Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ndaona, Chokani, and Langley Research Center, eds. Hypersonic boundary-layer stability experiments on a flared-cone model at angle of attack in a quiet wind tunnel. National Aeronautics and Space Administration, Langley Research Center, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Noise attack"

1

Okada, Satoshi, and Takuho Mitsunaga. "An Improved Technique for Generating Effective Noises of Adversarial Camera Stickers." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_21.

Full text
Abstract:
AbstractCyber-physical systems (CPS) represent the integration of the physical world with digital technologies and are expected to change our everyday lives significantly. With the rapid development of CPS, the importance of artificial intelligence (AI) has been increasingly recognized. Concurrently, adversarial attacks that cause incorrect predictions in AI models have emerged as a new risk. They are no longer limited to digital data and now extend to the physical environment. Thus, they are pointed out to pose serious practical threats to CPS. In this paper, we focus on the “adversarial camera stickers attack,” a type of physical adversarial attack. This attack directly affixes adversarial noise to a camera lens. Since the adversarial noise perturbs various images captured by the camera, it must be universal. To realize more effective adversarial camera stickers, we propose a new method for generating more universal adversarial noise compared to previous research. We first reveal that the existing method for generating noise of adversarial camera stickers does not always lead to the creation of universal perturbations. Then, we address this drawback by improving the optimization problem. Furthermore, we implement our proposed method, achieving an attack success rate 2.5 times higher than existing methods. Our experiments prove the capability of our proposed method to generate more universal adversarial noises, highlighting its potential effectiveness in enhancing security measures against adversarial attacks in CPS.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, An, Man Chen, Zongyue Wang, and Yaoling Ding. "Overcoming Significant Noise: Correlation-Template-Induction Attack." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ko, Youngjoo, Sangwoo Ji, and Jong Kim. "Low-Noise LLC Side-Channel Attack with Perf." In Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39303-8_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Yier, Haichang Gao, Yufei Wang, et al. "TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack." In Artificial Neural Networks and Machine Learning – ICANN 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44192-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Klingner, Marvin, and Tim Fingscheidt. "Improved DNN Robustness by Multi-task Training with an Auxiliary Self-Supervised Task." In Deep Neural Networks and Data for Automated Driving. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-01233-4_5.

Full text
Abstract:
AbstractWhile deep neural networks for environment perception tasks in autonomous driving systems often achieve impressive performance on clean and well-prepared images, their robustness under real conditions, i.e., on images being perturbed with noise patterns or adversarial attacks, is often subject to a significantly decreased performance. In this chapter, we address this problem for the task of semantic segmentation by proposing multi-task training with the additional task of depth estimation with the goal to improve the DNN robustness. This method has a very wide potential applicability as the additional depth estimation task can be trained in a self-supervised fashion, relying only on unlabeled image sequences during training. The final trained segmentation DNN is, however, still applicable on a single-image basis during inference without additional computational overhead compared to the single-task model. Additionally, our evaluation introduces a measure which allows for a meaningful comparison between different noise and attack types. We show the effectiveness of our approach on the Cityscapes and KITTI datasets, where our method improves the DNN performance w.r.t. the single-task baseline in terms of robustness against multiple noise and adversarial attack types, which is supplemented by an improved absolute prediction performance of the resulting DNN.
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Qianqian, Xiangwei Kong, and Ziming Wang. "Fooling Neural Network Interpretations: Adversarial Noise to Attack Images." In Artificial Intelligence. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93049-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Korzhik, Valery, Guillermo Morales-Luna, Irina Marakova, and Carlos Patiño-Ruvalcaba. "Digital Watermarking under a Filtering and Additive Noise Attack Condition." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45215-7_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chakravarty, Nidhi, and Mohit Dua. "NRASV: Noise Robust ASV System for Audio Replay Attack Detection." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60935-0_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spreeuwers, Luuk, Maikel Schils, Raymond Veldhuis, and Una Kelly. "Practical Evaluation of Face Morphing Attack Detection Methods." In Handbook of Digital Face Manipulation and Detection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_16.

Full text
Abstract:
AbstractFace morphing is a technique to combine facial images of two (or more) subjects such that the result resembles both subjects. In a morphing attack, this is exploited by, e.g., applying for a passport with the morphed image. Both subjects who contributed to the morphed image can then travel using this passport. Many state-of-the-art face recognition systems are vulnerable to morphing attacks. Morphing attack detection (MAD) methods are developed to mitigate this threat. MAD methods published in literature are often trained on a limited number of or even a single dataset where all morphed faces are created using the same procedure. The resulting MAD methods work well for these specific datasets, with reported detection rates of over 99%, but their performance collapses for face morphs created using other procedures. Often even simple image manipulations, like adding noise or smoothing cause a serious degradation in performance of the MAD methods. In addition, more advanced tools exist to manipulate the face morphs, like manual retouching or morphing artifacts can be concealed by printing and scanning a photograph (as used in the passport application process in many countries). Furthermore, datasets for training and testing MAD methods are often created by morphing images from arbitrary subjects including even male-female morphs and morphs between subjects with different skin color. Although this may result in a large number of morphed faces, the created morphs are often not convincing and certainly don’t represent a best effort attack by a criminal. A far more realistic attack would include careful selection of subjects that look alike and create high quality morphs from images of these subjects using careful (manual) post-processing. In this chapter we therefore argue that for robust evaluation of MAD methods, we require datasets with morphed images created using a large number of different morphing methods, including various ways to conceal the morphing artifacts by, e.g., adding noise, smoothing, printing and scanning, various ways of pre- and post-processing, careful selection of the subjects and multiple facial datasets. We also show the sensitivity of various MAD methods to the mentioned variations and the effect of training MAD methods on multiple datasets.
APA, Harvard, Vancouver, ISO, and other styles
10

Envia, Edmane. "Prediction of Noise Field of a Propfan at Angle of Attack." In Unsteady Aerodynamics, Aeroacoustics, and Aeroelasticity of Turbomachines and Propellers. Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9341-2_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Noise attack"

1

Bajpayee, Soumen, Sarbani Sen, Anipriyo Mandal, and Imon Mukherjee. "Quantum Teleportation under Siege: Analyzing Noise Attack with Virtual Entanglement." In 2024 IEEE Calcutta Conference (CALCON). IEEE, 2024. https://doi.org/10.1109/calcon63337.2024.10914263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shukla, Vinay, Sanjay Kumar, Sanjay Sharma, and Arihant Gupta. "A Noise Attack Resistant Blind 3D Watermarking Algorithm for IP Rights Protection." In 2024 International Conference on Computing, Sciences and Communications (ICCSC). IEEE, 2024. https://doi.org/10.1109/iccsc62048.2024.10830381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.

Full text
Abstract:
This paper presents an acoustics parametric study of the effect of varying lateral and longitudinal rotor trim flapping angles (tip-path-plane tilt) on noise radiated by an isolated 26-ft diameter proprotor, similar to that of the AW609 tiltrotor, in edgewise flight. Three tip-path-plane angle of attack operating conditions of -9, 0 and 6 deg, at 80 knots, were investigated. Results showed that: 1) minimum noise was attained for the tip-path-plane angle of attack value of -9 deg, and 2) changing the cyclic trim state (i.e., controls) altered the airloads and produced noticeable changes to the
APA, Harvard, Vancouver, ISO, and other styles
4

Pellicer, Alvaro Lopez, Kittipos Giatgong, Yi Li, Neeraj Suri, and Plamen Angelov. "UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification." In 2024 International Joint Conference on Neural Networks (IJCNN). IEEE, 2024. http://dx.doi.org/10.1109/ijcnn60899.2024.10651159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Morgan T., and Digby D. Macdonald. "Wavelet Analysis of Electrochemical Noise Data." In CORROSION 2005. NACE International, 2005. https://doi.org/10.5006/c2005-05355.

Full text
Abstract:
Abstract In this study, the electrochemical noise produced by general and localized corrosion (pitting) in the coupling current between identical electrodes of ASTM A516 steel in 5M NaOH with or without added chloride ion was examined using Wavelet analysis (WA) as a means of differentiating between the two forms of attack. It was found that, under pitting corrosion conditions (the presence of 0.1M Cl-), there was no high-frequency energy contribution seen, but there was an energy contribution of the low-frequency crystals. Additionally, visual time domain examination of the crystals produced
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Ting, Jingyi Liu, Rui Zheng, Tao Gui, Qi Zhang, and Xuanjing Huang. "Enhancing Contrastive Learning with Noise-Guided Attack: Towards Continual Relation Extraction in the Wild." In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.acl-long.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eden, D. A. "Electrochemical Noise - the First Two Octaves." In CORROSION 1998. NACE International, 1998. https://doi.org/10.5006/c1998-98386.

Full text
Abstract:
Abstract Electrochemical noise techniques have been used to study corrosion related processes since the early 1980's. Preliminary studies of the electrochemical characteristics of localised corrosion phenomena, in particular pitting and cavitation attack, established the sensitivity of the technique for the detection of spontaneous changes in corrosion processes. Throughout the last sixteen years, the fundamental principles and methodology behind the measurements has changed little, but with the advent of the computer age, improved data acquisition, signal processing, and fast analysis techniq
APA, Harvard, Vancouver, ISO, and other styles
8

Eden, D. A., K. Hladky, D. G. John, and J. L. Dawson. "Electrochemical Noise - Simultaneous Monitoring of Potential and Current Noise Signals from Corroding Electrodes." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86274.

Full text
Abstract:
Abstract Electrochemical noise is a generic term used to describe the spontaneous fluctuations of potential or current which occur at an electrode interface. The stochastic processes giving rise to the noise signals are related to the electrode kinetics, and in the case of a corroding system, may be related to the corrosion rate and mechanism. Analysis of the current and potential noise, around the free corrosion potentials, is shown to be a sensitive monitoring method. Problems associated with monitoring current noise on a freely corroding electrode may be overcome by coupling nominally ident
APA, Harvard, Vancouver, ISO, and other styles
9

Uruchurtu, J., and J. L. Dawson. "Electrochemical Noise Monitoring for Sacrificial Anodes in Cathodic Protection Systems." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86293.

Full text
Abstract:
Abstract This work attempts to assess the possibility of using reciprocal frequency (1/f) electrochemical noise as a monitoring technique in the performance of sacrificial anodes used in cathodic protection systems. Electrochemical noise data measured as the fluctuations of the anode potential was obtained for zinc sacrificial anodes immersed in artificial sea water. Good correlation was found between the galvanic current and the standard deviation of the potential fluctuations. The spectra obtained appeared to characterise the type of attack for the sacrificial anode in laboratory conditions.
APA, Harvard, Vancouver, ISO, and other styles
10

Putla, Harsha, Chanakya Patibandla, Krishna Pratap Singh, and P. Nagabhushan. "Evaluating Data Poisoning Vulnerability in Selective Reincarnation within c-MARL to Salt and Pepper Noise Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723915.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Noise attack"

1

Soramäki, Kimmo. Financial Cartography. FNA, 2019. http://dx.doi.org/10.69701/ertx8007.

Full text
Abstract:
Geographic maps have been of military and economic importance throughout the ages. Rulers have commissioned maps to control the financial, economic, political, and military aspects of their sovereign entities. Large scale projects like the Ordnance Survey in the UK in the late 18th century, and the Lewis and Clark Expedition a few decades later to map the American West, are early examples of trailblazing efforts to create accurate modern maps of high strategic importance. Digitalization, globalization, and a larger urban and educated workforce necessitate a new understanding of the world, beyo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!