To see the other types of publications on this topic, follow the link: Noise attack.

Dissertations / Theses on the topic 'Noise attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 dissertations / theses for your research on the topic 'Noise attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Basu, Prabal. "Toward Reliable, Secure, and Energy-Efficient Multi-Core System Design." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7517.

Full text
Abstract:
Computer hardware researchers have perennially focussed on improving the performance of computers while stipulating the energy consumption under a strict budget. While several innovations over the years have led to high performance and energy efficient computers, more challenges have also emerged as a fallout. For example, smaller transistor devices in modern multi-core systems are afflicted with several reliability and security concerns, which were inconceivable even a decade ago. Tackling these bottlenecks happens to negatively impact the power and performance of the computers. This dissertation explores novel techniques to gracefully solve some of the pressing challenges of the modern computer design. Specifically, the proposed techniques improve the reliability of on-chip communication fabric under a high power supply noise, increase the energy-efficiency of low-power graphics processing units, and demonstrate an unprecedented security loophole of the low-power computing paradigm through rigorous hardware-based experiments.
APA, Harvard, Vancouver, ISO, and other styles
2

Pokorný, Martin. "Návrh a realizace filtru ADSR." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218044.

Full text
Abstract:
The master´s thesis is focused on design of ADSR filter and voltage controlled amplifier (VCA). Three additional circuits performing analog signal processing are added. Functionality of designed circuits is verified in simulation program. All designed circuits are practically realized. Thesis includes complete design of the mentioned circuits and all necessary informations for its practical realization. All designed circuits are measured and the results are presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Cler, Gauthier. "Horizontal Side Channel Attacks on Noisy Traces." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2024. http://www.theses.fr/2024UMONS010.

Full text
Abstract:
Récemment, l'utilisation de réseaux de neurones dans le cadre des attaques par canaux auxiliaires de type profilées sur systèmes ouverts a démontré son efficacité jusqu'à presque remplacer les techniques précédemment utilisées. Néanmoins, lorsqu'il n'est pas possible d'avoir accès à un système ouvert et lorsque les attaques dites verticales ne sont pas envisageables, la principale option restante est de mettre en oeuvre des attaques horizontales. C'est généralement le cas pour des implémentations d'algorithmes de cryptographie asymétrique (RSA, ECC). Les attaques horizontales existantes s'appuient sur des techniques de classification ou clustering issues du monde des statistiques. Même s'il a été apporté l'efficacité de ces techniques dans certaines circonstances, en pratique le taux de succès d'attaques basés sur ces techniques reste tout de même relativement faible, en particulier dans le cas d'environements avec la présence de hauts niveaux de bruits. Il existe toutefois une autre catégorie de réseaux de neurones dit à apprentissage non-supervisé, pour lesquels l'accès à un système ouvert n'est pas nécessaire. Il s'agit alors de déterminer si ce type de réseau peut être utilisé dans le contexte des attaques par canaux auxiliaire et, le cas échéant, si le gain par rapport aux techniques d'attaques déjà utilisées est suffisant. L'objectif de ces travaux est donc de valider cette idée en identifiant et en proposant une ou plusieurs topologies de réseaux de neurones adaptées aux attaques horizontales par clustering et d'en vérifier l'efficacité sur l'implémentation d'algorithmes cryptographiques asymétrique. De plus, une méthodologie alternative pour la sélection univariée de points d'intérêts basée sur des méthodes statistique est proposée, ainsi qu'une nouvelle métrique pour la quantification de fuite et l'exploitabilité des points sélectionnés. Les résultats obtenus montrent une amélioration des taux de succès obtenus par rapport aux méthodes proposées dans l'état de l'art<br>Recently introduced to the field of side channel analysis, neural networks have showed to be a powerful and relevant alternative to template attacks. However, their applicability is limited to profiled attack context, as supervised training is needed in order to build a relevant generalized model. When profiling on an open device is not possible, and vertical attacks cannot be applied, the only left possible approach is horizontal attacks. While several contributions have been made for tackling horizontal attacks on asymmetric cryptography algorithms implementations such as RSA or elliptic curve cryptography, their performance remains low and their applicability hard in real life scenario with the presence of high noise. Still, another neural network family known as unsupervised learning neural networks exists, which would not require an open device access and. It must be known if these networks unsupervised learning paradigm and their associated topology can be applied to the context of side-channel attacks and if such is the case, whether or not they can provide better results than traditional methods. Thus, In this work, several approaches are considered to improve clustering based horizontal side channel attacks efficiency. A novel methodology based on statistical analysis is also introduced for univariate points of interest selection. Additionally, an alternative metric for quantifying points of interest exploitability in a clustering attack is proposed and compared to commonly used metrics. The proposed methods allow providing significant improvement over state of the art attacks performance and giving a better explainability of obtained results
APA, Harvard, Vancouver, ISO, and other styles
4

Gabriel, Tomáš. "Konstrukce zkušebního zařízení pro testování adheze a hluku v kontaktu kola a kolejnice." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2020. http://www.nusl.cz/ntk/nusl-417765.

Full text
Abstract:
This master’s thesis is dedicated to the design of an experimental rig that allows investigation of causes for noise during tram’s passing of a track curve and the developement of means to mitigate this noise. The opening section of this thesis contains theoretical background for the tribological mechanics of wheel-rail contact with emphasis on the process of noise generation, followed by an overview of laboratory tst rigs with similar purpose. Design itself is centered around the implementation of the dynamic model of wheel-rail contact using real tram wheel. Resulting test rig allows measurement of the adhesion characteristic in tangential and lateral directions and recording of the generated noise while an angle of attack is set.
APA, Harvard, Vancouver, ISO, and other styles
5

Stucke, Russell Andrew. "High Angle-of-Attack Yaw Control Using Strakes on Blunt-Nose Bodies." University of Toledo / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1167777201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garcia-Patron, Sanchez Raul. "Quantum information with optical continuous variables: from Bell tests to key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210655.

Full text
Abstract:
In this thesis we have studied different aspects of the novel field of quantum information with continuous variables. The higher efficiency and bandwidth of homodyne detection combined with the easiness of generation and manipulation of Gaussian states makes continuous-variable quantum information a promising and flourishing field of research. This dissertation is divided in two parts. The first part explores two applications of the “photon subtraction” operation; Firstly, a technique to generate highly non-Gaussian single-mode states of light; Secondly, an experimental setup capable of realizing a loophole-free Bell test. The second part of this dissertation develops a detailed analysis of an important family of continuous-variable quantum key distribution protocols, namely those based on Gaussian modulation of Gaussian states./Dans cette thèse on a étudié différents aspects de l'information quantique à variables continues. Les meilleures efficacité et bande passante de la détection homodyne combinées à la simplicité de génération et de manipulation d'états gaussiens rend l'information quantique à variables continues un domaine de recherche très prometteur, qui est actuellement en plein essor. La dissertation est divisée en deux parties. La première explore deux applications de l'opération “soustraction de photon”; en premier lieu on présente une nouvelle technique capable de générer des états mono-modaux de la lumière hautement non-gaussiens; deuxiemement on présente un schéma expérimental capable de réaliser un test de Bell sans faille logique. La deuxième partie de cette dissertation développe une étude détaillée d'une famille très importante de protocoles de distribution quantique de clé à variables continues, ceux basés sur la modulation gaussienne d'états gaussiens.<br>Doctorat en Sciences de l'ingénieur<br>info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
7

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020/document.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation efficace des interconnections entre les équipements réseaux, ou l’absorption de l’attaque par les ressources disponibles. Dans cette thèse, nous proposons un mécanisme de contrôle de dommages. Basé sur une nouvelle signature d’attaque et les fonctions réseaux du standard Multiprotocol Label Switching (MPLS), nous isolons le trafic malicieux du trafic légitime et appliquons des contraintes sur la transmission du trafic malicieux. Le but est de rejeter suffisamment de trafic d’attaque pour maintenir la stabilité du réseau tout en préservant le trafic légitime. La solution prend en compte des informations sur l’attaque, mais aussi les ressources réseaux. Considérant que les opérateurs réseaux n’ont pas une même visibilité sur leur réseau, nous étudions l’impact de contraintes opérationnelles sur l’efficacité d’une contre mesure régulièrement recommandée, le filtrage par liste noire. Les critères d’évaluation sont le niveau d’information sur l’attaque ainsi que sur le trafic réseau. Nous formulons des scénarios auxquels chaque opérateur peut s’identifier. Nous démontrons que la l’algorithme de génération des listes noires doit être choisi avec précaution afin de maximiser l’efficacité du filtrage<br>Massive Denial of Service attacks represent a genuine threat for Internet service, but also significantly impact network service providers and even threat the Internet stability. There is a pressing need to control damages caused by such attacks. Numerous works have been carried out, but were unable to combine the need for mitigation, the obligation to provide continuity of service and network constraints. Proposed countermeasures focus on authenticating legitimate traffic, filtering malicious traffic, making better use of interconnection between network equipment or absorbing attack with the help of available resources. In this thesis, we propose a damage control mechanism against volumetric Denial of Services. Based on a novel attack signature and with the help of Multiprotocol Label Switching (MPLS) network functions, we isolate malicious from legitimate traffic. We apply a constraint-based forwarding to malicious traffic. The goal is to discard enough attack traffic to sustain network stability while preserving legitimate traffic. It is not only aware of attack details but also network resource, especially available bandwidth. Following that network operators do not have equal visibility on their network, we also study the impact of operational constraints on the efficiency of a commonly recommended countermeasure, namely blacklist filtering. The operational criteria are the level of information about the attack and about the traffic inside the network. We then formulate scenario which operators can identify with. We demonstrate that the blacklist generation algorithm should be carefully chosen to fit the operator context while maximizing the filtering efficiency
APA, Harvard, Vancouver, ISO, and other styles
8

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation efficace des interconnections entre les équipements réseaux, ou l’absorption de l’attaque par les ressources disponibles. Dans cette thèse, nous proposons un mécanisme de contrôle de dommages. Basé sur une nouvelle signature d’attaque et les fonctions réseaux du standard Multiprotocol Label Switching (MPLS), nous isolons le trafic malicieux du trafic légitime et appliquons des contraintes sur la transmission du trafic malicieux. Le but est de rejeter suffisamment de trafic d’attaque pour maintenir la stabilité du réseau tout en préservant le trafic légitime. La solution prend en compte des informations sur l’attaque, mais aussi les ressources réseaux. Considérant que les opérateurs réseaux n’ont pas une même visibilité sur leur réseau, nous étudions l’impact de contraintes opérationnelles sur l’efficacité d’une contre mesure régulièrement recommandée, le filtrage par liste noire. Les critères d’évaluation sont le niveau d’information sur l’attaque ainsi que sur le trafic réseau. Nous formulons des scénarios auxquels chaque opérateur peut s’identifier. Nous démontrons que la l’algorithme de génération des listes noires doit être choisi avec précaution afin de maximiser l’efficacité du filtrage<br>Massive Denial of Service attacks represent a genuine threat for Internet service, but also significantly impact network service providers and even threat the Internet stability. There is a pressing need to control damages caused by such attacks. Numerous works have been carried out, but were unable to combine the need for mitigation, the obligation to provide continuity of service and network constraints. Proposed countermeasures focus on authenticating legitimate traffic, filtering malicious traffic, making better use of interconnection between network equipment or absorbing attack with the help of available resources. In this thesis, we propose a damage control mechanism against volumetric Denial of Services. Based on a novel attack signature and with the help of Multiprotocol Label Switching (MPLS) network functions, we isolate malicious from legitimate traffic. We apply a constraint-based forwarding to malicious traffic. The goal is to discard enough attack traffic to sustain network stability while preserving legitimate traffic. It is not only aware of attack details but also network resource, especially available bandwidth. Following that network operators do not have equal visibility on their network, we also study the impact of operational constraints on the efficiency of a commonly recommended countermeasure, namely blacklist filtering. The operational criteria are the level of information about the attack and about the traffic inside the network. We then formulate scenario which operators can identify with. We demonstrate that the blacklist generation algorithm should be carefully chosen to fit the operator context while maximizing the filtering efficiency
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Jurdi Wissam. "Towards next generation recommender systems through generic data quality." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD005.

Full text
Abstract:
Les systèmes de recommandation sont essentiels pour filtrer les informations en ligne et fournir un contenu personnalisé, réduisant ainsi l’effort nécessaire pour trouver des informations pertinentes. Ils jouent un rôle crucial dans divers domaines, dont le commerce électronique, en aidant les clients à trouver des produits pertinents, améliorant l’expérience utilisateur et augmentant les ventes. Un aspect significatif de ces systèmes est le concept d’inattendu, qui implique la découverte d’éléments nouveaux et surprenants. Cependant, il est complexe et subjectif, nécessitant une compréhension approfondie des recommandations fortuites pour sa mesure et son optimisation. Le bruit naturel, une variation imprévisible des données, peut influencer la sérendipité dans les systèmes de recommandation. Il peut introduire de la diversité et de l’inattendu dans les recommandations, conduisant à des surprises agréables. Cependant, il peut également réduire la pertinence de la recommandation. Par conséquent, il est crucial de concevoir des systèmes qui équilibrent le bruit naturel et la sérendipité. Cette thèse souligne le rôle de la sérendipité dans l’amélioration des systèmes de recommandation et la prévention des bulles de filtre. Elle propose des techniques conscientes de la sérendipité pour gérer le bruit, identifie les défauts de l’algorithme, suggère une méthode d’évaluation centrée sur l’utilisateur, et propose une architecture basée sur la communauté pour une performance améliorée<br>Recommender systems are essential for filtering online information and delivering personalized content, thereby reducing the effort users need to find relevant information. They can be content-based, collaborative, or hybrid, each with a unique recommendation approach. These systems are crucial in various fields, including e-commerce, where they help customers find pertinent products, enhancing user experience and increasing sales. A significant aspect of these systems is the concept of unexpectedness, which involves discovering new and surprising items. This feature, while improving user engagement and experience, is complex and subjective, requiring a deep understanding of serendipitous recommendations for its measurement and optimization. Natural noise, an unpredictable data variation, can influence serendipity in recommender systems. It can introduce diversity and unexpectedness in recommendations, leading to pleasant surprises. However, it can also reduce recommendation relevance, causing user frustration. Therefore, it is crucial to design systems that balance natural noise and serendipity. Inconsistent user information due to natural noise can negatively impact recommender systems, leading to lower-quality recommendations. Current evaluation methods often overlook critical user-oriented factors, making noise detection a challenge. To provide powerful recommendations, it’s important to consider diverse user profiles, eliminate noise in datasets, and effectively present users with relevant content from vast data catalogs. This thesis emphasizes the role of serendipity in enhancing recommender systems and preventing filter bubbles. It proposes serendipity-aware techniques to manage noise, identifies algorithm flaws, suggests a user-centric evaluation method, and proposes a community-based architecture for improved performance. It highlights the need for a system that balances serendipity and considers natural noise and other performance factors. The objectives, experiments, and tests aim to refine recommender systems and offer a versatile assessment approach
APA, Harvard, Vancouver, ISO, and other styles
10

Camurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.

Full text
Abstract:
Les ordiphones et les objets connectés utilisent des radio pour communiquer avec d’autres appareils électroniques. Ces radio sont placées à côté du processeur et des autres composants numériques. Par exemple, dans les ordiphones un processeur, une mémoire et plusieurs émetteurs-récepteurs radio se trouvent sur la même plateforme. Les systèmes embarquées, plus simples, utilisent souvent des puces à signaux mixtes contenant à la fois un microcontrôleur et un émetteur-récepteur. La proximité physique entre les blocs numériques, qui produisent un bruit électromagnétique très fort, et les émetteurs-récepteurs radio, qui sont sensibles à ce bruit, peut causer des problèmes de fonctionnement et de performance. En effet, il existe de nombreux chemins de couplage entre les composants sur le même système. Dans cette thèse, nous explorons les problèmes de sécurité qui naissent de l’interaction entre composants numériques et systèmes radio, et nous proposons deux nouvelles attaques. Avec Screaming Channels, nous démontrons que les émetteurs radio sur des puces à signaux mixtes peuvent diffuser des informations sur l'activité numérique de l'appareil. Cela permet de mener des attaques par canaux auxiliaires à grande distance. Avec Noise-SDR, nous montrons qu'il est possible de générer des signaux radio arbitraires à partir du bruit électromagnétique déclenché par un logiciel sans privilèges, pour interagir avec des récepteurs radio, éventuellement sur la même plateforme<br>Modern connected devices need both computing and communication capabilities. For example, smartphones carry a multi-core processor, memory, and several radio transceivers on the same platform. Simpler embedded systems often use a mixed-signal chip that contains both a microcontroller and a transceiver. The physical proximity between digital blocks, which are strong sources of electromagnetic noise, and radio transceivers, which are sensitive to such noise, can cause functional and performance problems. Indeed, there exist many noise coupling paths between components on the same platform or silicon die. In this thesis we explore the security issues that arise from the interaction between digital and radio blocks, and we propose two novel attacks. With Screaming Channels, we demonstrate that radio transmitters on mixed-signal chips might broadcast some information about the digital activity of the device, making side channel attacks possible from a large distance. With Noise-SDR, we show that attackers can shape arbitrary radio signals from the electromagnetic noise triggered by software execution, to interact with radio receivers, possibly on the same platform
APA, Harvard, Vancouver, ISO, and other styles
11

MEDEIROS, Rex Antonio da Costa. "Zero-Error capacity of quantum channels." Universidade Federal de Campina Grande, 2008. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/1320.

Full text
Abstract:
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-08-01T21:11:37Z No. of bitstreams: 1 REX ANTONIO DA COSTA MEDEIROS - TESE PPGEE 2008..pdf: 1089371 bytes, checksum: ea0c95501b938e0d466779a06faaa4f6 (MD5)<br>Made available in DSpace on 2018-08-01T21:11:37Z (GMT). No. of bitstreams: 1 REX ANTONIO DA COSTA MEDEIROS - TESE PPGEE 2008..pdf: 1089371 bytes, checksum: ea0c95501b938e0d466779a06faaa4f6 (MD5) Previous issue date: 2008-05-09<br>Nesta tese, a capacidade erro-zero de canais discretos sem memória é generalizada para canais quânticos. Uma nova capacidade para a transmissão de informação clássica através de canais quânticos é proposta. A capacidade erro-zero de canais quânticos (CEZQ) é definida como sendo a máxima quantidade de informação por uso do canal que pode ser enviada através de um canal quântico ruidoso, considerando uma probabilidade de erro igual a zero. O protocolo de comunicação restringe palavras-código a produtos tensoriais de estados quânticos de entrada, enquanto que medições coletivas entre várias saídas do canal são permitidas. Portanto, o protocolo empregado é similar ao protocolo de Holevo-Schumacher-Westmoreland. O problema de encontrar a CEZQ é reformulado usando elementos da teoria de grafos. Esta definição equivalente é usada para demonstrar propriedades de famílias de estados quânticos e medições que atingem a CEZQ. É mostrado que a capacidade de um canal quântico num espaço de Hilbert de dimensão d pode sempre ser alcançada usando famílias compostas de, no máximo,d estados puros. Com relação às medições, demonstra-se que medições coletivas de von Neumann são necessárias e suficientes para alcançar a capacidade. É discutido se a CEZQ é uma generalização não trivial da capacidade erro-zero clássica. O termo não trivial refere-se a existência de canais quânticos para os quais a CEZQ só pode ser alcançada através de famílias de estados quânticos não-ortogonais e usando códigos de comprimento maior ou igual a dois. É investigada a CEZQ de alguns canais quânticos. É mostrado que o problema de calcular a CEZQ de canais clássicos-quânticos é puramente clássico. Em particular, é exibido um canal quântico para o qual conjectura-se que a CEZQ só pode ser alcançada usando uma família de estados quânticos não-ortogonais. Se a conjectura é verdadeira, é possível calcular o valor exato da capacidade e construir um código de bloco quântico que alcança a capacidade. Finalmente, é demonstrado que a CEZQ é limitada superiormente pela capacidade de Holevo-Schumacher-Westmoreland.
APA, Harvard, Vancouver, ISO, and other styles
12

(11178210), Li-Chi Chang. "Defending against Adversarial Attacks in Speaker Verification Systems." Thesis, 2021.

Find full text
Abstract:
<p>With the advance of the technologies of Internet of things, smart devices or virtual personal assistants at home, such as Google Assistant, Apple Siri, and Amazon Alexa, have been widely used to control and access different objects like door lock, blobs, air conditioner, and even bank accounts, which makes our life convenient. Because of its ease for operations, voice control becomes a main interface between users and these smart devices. To make voice control more secure, speaker verification systems have been researched to apply human voice as biometrics to accurately identify a legitimate user and avoid the illegal access. In recent studies, however, it has been shown that speaker verification systems are vulnerable to different security attacks such as replay, voice cloning, and adversarial attacks. Among all attacks, adversarial attacks are the most dangerous and very challenging to defend. Currently, there is no known method that can effectively defend against such an attack in speaker verification systems.</p> <p>The goal of this project is to design and implement a defense system that is simple, light-weight, and effectively against adversarial attacks for speaker verification. To achieve this goal, we study the audio samples from adversarial attacks in both the time domain and the Mel spectrogram, and find that the generated adversarial audio is simply a clean illegal audio with small perturbations that are similar to white noises, but well-designed to fool speaker verification. Our intuition is that if these perturbations can be removed or modified, adversarial attacks can potentially loss the attacking ability. Therefore, we propose to add a plugin-function module to preprocess the input audio before it is fed into the verification system. As a first attempt, we study two opposite plugin functions: denoising that attempts to remove or reduce perturbations and noise-adding that adds small Gaussian noises to an input audio. We show through experiments that both methods can significantly degrade the performance of a state-of-the-art adversarial attack. Specifically, it is shown that denoising and noise-adding can reduce the targeted attack success rate of the attack from 100% to only 56% and 5.2%, respectively. Moreover, noise-adding can slow down the attack 25 times in speed and has a minor effect on the normal operations of a speaker verification system. Therefore, we believe that noise-adding can be applied to any speaker verification system against adversarial attacks. To the best of our knowledge, this is the first attempt in applying the noise-adding method to defend against adversarial attacks in speaker verification systems.</p><br>
APA, Harvard, Vancouver, ISO, and other styles
13

Huang, Chia-Ming, and 黃佳民. "A 67% Output Voltage Ripple Reduction and True-Random-Noise Injection Stacked Digital Low Dropout Regulator for Power-Side Channel Attack Protection." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/rxw82q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rajan, Kuamr *. "Experimental Study Of Side Force Control On Slender Cones At High Angles Of Attack." Thesis, 2005. https://etd.iisc.ac.in/handle/2005/1475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rajan, Kuamr *. "Experimental Study Of Side Force Control On Slender Cones At High Angles Of Attack." Thesis, 2005. http://etd.iisc.ernet.in/handle/2005/1475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Nai-Chun, and 王迺君. "On the Design of Digital Color Watermark with Capability of Resisting Noise and Filtering Attacks." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/30239724916990401996.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>87<br>In recent years, due to the popularity of personal computer and World Wide Web, duplication and transmission of digital data have become easier and faster. In order to avoid unauthorized copy and protect the copyright of digital images, the watermarking techniques are important issues in the field of image processing. The digital watermarking technique is introduced by embedding some invisible or unobtrusive information in digital images to identify copyright ownership. Although traditional watermarking techniques could resist most attacks such as blurring and JPEG compression etc., during the noise and filtering attacks it is easy to destroy the embedded information. In this thesis, we propose a new approach to improve the embedding method of traditional watermark so that it can preserve embedding information under noise and filtering attacks. The simulation results show that our approach can enhance the robustness of watermarking techniques efficiently.
APA, Harvard, Vancouver, ISO, and other styles
17

Fonseca, Pedro Manuel Vasconcelos. "Performance of side-channel attacks on encrypted 802.11 web traffic and impact of network-level noise." Master's thesis, 2017. https://repositorio-aberto.up.pt/handle/10216/106919.

Full text
Abstract:
No mundo de hoje, as redes Wi-Fi estão difundidas por toda a parte e interligadas ao nosso dia-a-dia: acedemos-lhes através dos nossos smartphones, tablets e telemóveis. Isto significa que inevitavelmente muitos dados sensíveis são transmitidos através destas redes. A encriptação, que está presente em virtualmente todas as redes Wi-Fi, ajuda a proteger estes dados. Ainda assim, através de ataques side-channel é possível obter informação e potencialmente quebrar a privacidade de um utilizador. Esta tese tem o objetivo de desenvolver um destes ataques, de forma a identificar o website a que um utilizador está a aceder. Um dataset sólido, consistindo em numerosas capturas relativas a websites específicos, providencia os meios para que um algoritmo baseado em machine learning classifique uma captura de tráfego. Outro objetivo é estudar o efeito do ruído ao nível da rede na eficácia do algoritmo.<br>In today's world, Wi-Fi networks are widespread and intertwined with our daily lives: we access them through our smartphones, our tablets and our laptops. This means that inevitably a lot of sensitive data is transferred through these networks. Encryption, which is present in virtually every Wi-Fi network, helps protect this data. Nonetheless, through side-channel attacks it is possible to obtain information and potentially breach a user's privacy. This thesis has the objective of devising such an attack, in order to identify the website a given user is accessing. A solid dataset, consisting of numerous captures pertaining to a specific website, provides the means for an algorithm based on machine learning to classify a traffic capture. Another objective is to study the effect of network-level noise on the accuracy of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
18

Fonseca, Pedro Manuel Vasconcelos. "Performance of side-channel attacks on encrypted 802.11 web traffic and impact of network-level noise." Dissertação, 2017. https://repositorio-aberto.up.pt/handle/10216/106919.

Full text
Abstract:
No mundo de hoje, as redes Wi-Fi estão difundidas por toda a parte e interligadas ao nosso dia-a-dia: acedemos-lhes através dos nossos smartphones, tablets e telemóveis. Isto significa que inevitavelmente muitos dados sensíveis são transmitidos através destas redes. A encriptação, que está presente em virtualmente todas as redes Wi-Fi, ajuda a proteger estes dados. Ainda assim, através de ataques side-channel é possível obter informação e potencialmente quebrar a privacidade de um utilizador. Esta tese tem o objetivo de desenvolver um destes ataques, de forma a identificar o website a que um utilizador está a aceder. Um dataset sólido, consistindo em numerosas capturas relativas a websites específicos, providencia os meios para que um algoritmo baseado em machine learning classifique uma captura de tráfego. Outro objetivo é estudar o efeito do ruído ao nível da rede na eficácia do algoritmo.<br>In today's world, Wi-Fi networks are widespread and intertwined with our daily lives: we access them through our smartphones, our tablets and our laptops. This means that inevitably a lot of sensitive data is transferred through these networks. Encryption, which is present in virtually every Wi-Fi network, helps protect this data. Nonetheless, through side-channel attacks it is possible to obtain information and potentially breach a user's privacy. This thesis has the objective of devising such an attack, in order to identify the website a given user is accessing. A solid dataset, consisting of numerous captures pertaining to a specific website, provides the means for an algorithm based on machine learning to classify a traffic capture. Another objective is to study the effect of network-level noise on the accuracy of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
19

Syu, Han Jhe, and 徐漢哲. "Analysis and Estimation of Noise and Vibration for the Small Wind Turbine Installed in Tall Bulidings-The Third Comprehensive Museum Attic in Formosa University as an Example." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5bgsxd.

Full text
Abstract:
碩士<br>國立虎尾科技大學<br>航空與電子科技研究所<br>103<br>Wind energy belongs inexhaustible in supply and always available for use ;In recent years, in addition to large wind turbine along the coast, the development of small wind turbine have become increasingly progressive. But when the wind turbine operation, vibration and noise generated by the wind turbines will affect residents living nearby;Therefore, the vibration and noise studies for wind turbines operate when generated is worth exploring. This research aims to examine the device difference between two different types of wind turbine, which are provided in Formosa Un iversity, the third comprehensive museum attic. The detection models selected for the following two : (1) WindTek Green Energy Technology Co., Ltd. Production - WT2000 model Horizontal Axis Wind Turbine(HAWT); (2) Hi-VAWT Technology Corp. Production - DS300 model Vertical Axis Wind Turbine(VAWT). The ambient wind speed range of actual observation is 4~14 m/s, and have a series of these models on vibration, noise and generation of records. The ambient wind speed range of actual observation is 4~14 m/s, and have a series of these models on vibration and noise of records. For different wind conditions, in order to record the instrument of wind turbine vibration condition by NI CompactDAQ , and use the cell phone to record different wind Institutional size at different wind noise values. In this study, statistical approach to record, summarize the results of comprehensive data, and further on the results of measurement and analysis of records of calculation and assessment. Different from the results that the wind Institutional noise impact on the environment, and the use of the software compiled vibration condition, made vibration response spectrum; to facilitate future trade-offs in the style of installation as the installation of data can be considered in accordance with the standard.
APA, Harvard, Vancouver, ISO, and other styles
20

Lamontagne, Philippe. "Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique." Thèse, 2017. http://hdl.handle.net/1866/21142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!