Journal articles on the topic 'Noise attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Noise attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Han, Jaeseung, and Dong-Guk Han. "Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm." Sensors 25, no. 13 (2025): 4170. https://doi.org/10.3390/s25134170.
Full textMike, Hamburg, Hermelink Julius, Primas Robert, et al. "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber." IACR Transactions on Cryptographic Hardware and Embedded Systems 2021, no. 4 (2021): 8–113. https://doi.org/10.46586/tches.v2021.i4.88-113.
Full textShi, Lin, Teyi Liao, and Jianfeng He. "Defending Adversarial Attacks against DNN Image Classification Models by a Noise-Fusion Method." Electronics 11, no. 12 (2022): 1814. http://dx.doi.org/10.3390/electronics11121814.
Full textDayananda, Prakyath, Mallikarjunaswamy Srikantaswamy, Sharmila Nagaraju, Rekha Velluri, and Doddananjedevaru Mahesh Kumar. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems (IJPEDS) 13, no. 4 (2022): 2086. http://dx.doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.
Full textPrakyath, Dayananda, Srikantaswamy Mallikarjunaswamy, Nagaraju Sharmila, Velluri Rekha, and Mahesh Kumar Doddananjedevaru. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems 13, no. 4 (2022): 2086~2097. https://doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.
Full textKarpenko, A. P., and V. A. Ovchinnikov. "How to Trick a Neural Network? Synthesising Noise to Reduce the Accuracy of Neural Network Image Classification." Herald of the Bauman Moscow State Technical University. Series Instrument Engineering, no. 1 (134) (March 2021): 102–19. http://dx.doi.org/10.18698/0236-3933-2021-1-102-119.
Full textSudha, M. S., and T. C. Thanuja. "Effect of different attacks on image watermarking using dual tree complex wavelet transform (DTCWT) and principle component analysis (PCA)." International Journal of Engineering & Technology 7, no. 2.9 (2018): 1. http://dx.doi.org/10.14419/ijet.v7i2-9.9249.
Full textWang, Haigang, Kan He, Yuyang Hao, and Shuyuan Yang. "Quantum tomography with Gaussian noise." Quantum Information and Computation 22, no. 13&14 (2022): 1144–57. http://dx.doi.org/10.26421/qic22.13-14-4.
Full textUsenko, Vladyslav C. "Redundancy and Synergy of an Entangling Cloner in Continuous-Variable Quantum Communication." Entropy 24, no. 10 (2022): 1501. http://dx.doi.org/10.3390/e24101501.
Full textGao, Jiaqi, Kangfeng Zheng, Xiujuan Wang, Chunhua Wu, and Bin Wu. "EFSAttack: Edge Noise-Constrained Black-Box Attack Using Artificial Fish Swarm Algorithm." Electronics 13, no. 13 (2024): 2446. http://dx.doi.org/10.3390/electronics13132446.
Full textZhang, Kangkang; Keliris Christodoulos; Parisini Thomas; Jiang Bin; Polycarpou Marios M. "Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks." IEEE/CAA Journal of Automatica Sinica 10, no. 4 (2023): 898–915. https://doi.org/10.1109/JAS.2023.123177.
Full textZhang, ShuaiWei, XiaoYuan Yang, Lin Chen, and Weidong Zhong. "A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition." Security and Communication Networks 2019 (October 30, 2019): 1–10. http://dx.doi.org/10.1155/2019/6124165.
Full textPotii, Oleksandr, Olena Kachko, Serhii Kandii, and Yevhenii Kaptol. "Determining the effect of a floating point on the Falcon digital signature algorithm security." Eastern-European Journal of Enterprise Technologies 1, no. 9 (127) (2024): 52–59. http://dx.doi.org/10.15587/1729-4061.2024.295160.
Full textAsghar, Hassan Jameel, and Dali Kaafar. "Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 358–78. http://dx.doi.org/10.2478/popets-2020-0031.
Full textLee, Woonghee, and Younghoon Kim. "Enhancing CT Segmentation Security against Adversarial Attack: Most Activated Filter Approach." Applied Sciences 14, no. 5 (2024): 2130. http://dx.doi.org/10.3390/app14052130.
Full textBalachandran, G., and Praveen Kumar Gupta. "FPGA – Based Electrocardiography Signal Analysis System using (FIR) Filter." International Journal of Advance Research and Innovation 8, no. 1 (2020): 44–48. http://dx.doi.org/10.51976/ijari.812008.
Full textKISH, L. B. "PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY." Fluctuation and Noise Letters 06, no. 01 (2006): L57—L63. http://dx.doi.org/10.1142/s0219477506003148.
Full textYu, Hongwei, Jiansheng Chen, Xinlong Ding, Yudong Zhang, Ting Tang, and Huimin Ma. "Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 7 (2024): 6791–99. http://dx.doi.org/10.1609/aaai.v38i7.28503.
Full textMafu, Mhlambululi, Comfort Sekga, and Makhamisa Senekane. "Security of Bennett–Brassard 1984 Quantum-Key Distribution under a Collective-Rotation Noise Channel." Photonics 9, no. 12 (2022): 941. http://dx.doi.org/10.3390/photonics9120941.
Full textFerdous, Shahriar, and Laszlo B. Kish. "Transient attacks against the Kirchhoff–Law–Johnson–Noise (KLJN) secure key exchanger." Applied Physics Letters 122, no. 14 (2023): 143503. http://dx.doi.org/10.1063/5.0146190.
Full textLi, Jing, Yanru Feng, and Mengli Wang. "Semantic Web-Driven Targeted Adversarial Attack on Black Box Automatic Speech Recognition Systems." International Journal on Semantic Web and Information Systems 20, no. 1 (2024): 1–23. http://dx.doi.org/10.4018/ijswis.360651.
Full textXu, Hongyan. "Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection." Mathematical Biosciences and Engineering 18, no. 5 (2021): 6771–89. http://dx.doi.org/10.3934/mbe.2021336.
Full textSutanto, Richard Evan, and Sukho Lee. "Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network." Electronics 10, no. 1 (2020): 52. http://dx.doi.org/10.3390/electronics10010052.
Full textHou, Hanting, Huan Bao, Kaimin Wei, and Yongdong Wu. "Universal Low-Frequency Noise Black-Box Attack on Visual Object Tracking." Symmetry 17, no. 3 (2025): 462. https://doi.org/10.3390/sym17030462.
Full textLacagnina, Giovanni, Paruchuri Chaitanya, Jung-Hoon Kim, et al. "Leading edge serrations for the reduction of aerofoil self-noise at low angle of attack, pre-stall and post-stall conditions." International Journal of Aeroacoustics 20, no. 1-2 (2021): 130–56. http://dx.doi.org/10.1177/1475472x20978379.
Full textGaripay, Fikret, Kemal Uzgören, and İsmail Kaya. "Side channel attack performance of correlation power analysis method in noise." International Journal on Information Technologies and Security 15, no. 1 (2023): 101–11. http://dx.doi.org/10.59035/uwcb7557.
Full textALSHEKH, MOKHTAR, and KÖKSAL ERENTÜRK. "DEFENSE AGAINST WHITE BOX ADVERSARIAL ATTACKS IN ARABIC NATURAL LANGUAGE PROCESSING (ANLP)." International Journal of Advanced Natural Sciences and Engineering Researches 7, no. 6 (2023): 151–55. http://dx.doi.org/10.59287/ijanser.1149.
Full textWei, Tianyi, Yong Li, and Yingtao Niu. "Adversarial Sample Generation Method for Modulated Signals Based on Edge-Linear Combination." Electronics 14, no. 7 (2025): 1260. https://doi.org/10.3390/electronics14071260.
Full textHassani, Ali, Jon Diedrich, and Hafiz Malik. "Improving Monocular Facial Presentation–Attack–Detection Robustness with Synthetic Noise Augmentations." Sensors 23, no. 21 (2023): 8914. http://dx.doi.org/10.3390/s23218914.
Full textMelhem, Mutaz, and Laszlo Kish. "A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System." Applied Sciences 9, no. 4 (2019): 666. http://dx.doi.org/10.3390/app9040666.
Full textSun, Tiankai, Xingyuan Wang, Da Lin, et al. "Medical image security authentication method based on wavelet reconstruction and fractal dimension." International Journal of Distributed Sensor Networks 17, no. 4 (2021): 155014772110141. http://dx.doi.org/10.1177/15501477211014132.
Full textFan, Di, Xiao Zhang, Wenshuo Kang, Huiyuan Zhao, and Yingjun Lv. "Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF." Sensors 22, no. 13 (2022): 4752. http://dx.doi.org/10.3390/s22134752.
Full textRahimi, Parisa, Amit Kumar Singh, and Xiaohang Wang. "Selective Noise Based Power-Efficient and Effective Countermeasure against Thermal Covert Channel Attacks in Multi-Core Systems." Journal of Low Power Electronics and Applications 12, no. 2 (2022): 25. http://dx.doi.org/10.3390/jlpea12020025.
Full textMa, Yimin, and Shuli Sun. "Distributed Optimal and Self-Tuning Filters Based on Compressed Data for Networked Stochastic Uncertain Systems with Deception Attacks." Sensors 23, no. 1 (2022): 335. http://dx.doi.org/10.3390/s23010335.
Full textFan, Yuqi, Fuzhi He, and Zibang Nie. "Robustness analysis of Visual Transformer based on adversarial attacks." Applied and Computational Engineering 41, no. 1 (2024): 160–70. http://dx.doi.org/10.54254/2755-2721/41/20230737.
Full textSadi, Mehdi, Bashir Mohammad Sabquat Bahar Talukder, Kaniz Mishty, and Md Tauhidur Rahman. "Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation." Information 14, no. 9 (2023): 516. http://dx.doi.org/10.3390/info14090516.
Full textJiao, Jiajia, Ling Jiang, Quan Zhou, and Ran Wen. "Evaluating Large Language Model Application Impacts on Evasive Spectre Attack Detection." Electronics 14, no. 7 (2025): 1384. https://doi.org/10.3390/electronics14071384.
Full textBhavana Sharma. "Image Quality Enhancement using Deep learning-based Convolution Residual Networks Technique." Journal of Information Systems Engineering and Management 10, no. 40s (2025): 1246–66. https://doi.org/10.52783/jisem.v10i40s.7876.
Full textJackson, Beren R., and Sam M. Dakka. "Computational fluid dynamics investigation into flow behavior and acoustic mechanisms at the trailing edge of an airfoil." Noise & Vibration Worldwide 49, no. 1 (2018): 20–31. http://dx.doi.org/10.1177/0957456517751455.
Full textKanai, Sekitoshi, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, and Shuichi Adachi. "Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 4394–403. http://dx.doi.org/10.1609/aaai.v34i04.5865.
Full textYin, Heng, Hengwei Zhang, Jindong Wang, and Ruiyu Dou. "Boosting Adversarial Attacks on Neural Networks with Better Optimizer." Security and Communication Networks 2021 (June 7, 2021): 1–9. http://dx.doi.org/10.1155/2021/9983309.
Full textYuan, Ye, Liji Wu, Yijun Yang, and Xiangmin Zhang. "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism." Security and Communication Networks 2018 (June 5, 2018): 1–13. http://dx.doi.org/10.1155/2018/2483619.
Full textPriyanka, Mishra, and Ahuja Rakesh. "Highly Robust and Imperceptible Digital Watermark Technique by Exploiting Various Noise Attacks." International Journal of Innovative Science and Research Technology 7, no. 3 (2022): 987–93. https://doi.org/10.5281/zenodo.6433971.
Full textZimba, Aaron, and Mumbi Chishimba. "Exploitation of DNS Tunneling for Optimization of Data Exfiltration in Malware-free APT Intrusions." Zambia ICT Journal 1, no. 1 (2017): 51–56. http://dx.doi.org/10.33260/zictjournal.v1i1.26.
Full textKim, Minji, Youngho Cho, Hweerang Park, and Gang Qu. "ASIGM: An Innovative Adversarial Stego Image Generation Method for Fooling Convolutional Neural Network-Based Image Steganalysis Models." Electronics 14, no. 4 (2025): 764. https://doi.org/10.3390/electronics14040764.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textHuang, Hai, Jinming Wu, Xinling Tang, Shilei Zhao, Zhiwei Liu, and Bin Yu. "Deep learning-based improved side-channel attacks using data denoising and feature fusion." PLOS ONE 20, no. 4 (2025): e0315340. https://doi.org/10.1371/journal.pone.0315340.
Full textGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.
Full textKachko, Olena, Yurii Gorbenko, Serhii Kandii, and Yevhenii Kaptol. "Improving protection of falcon electronic signature software implementations against attacks based on floating point noise." Eastern-European Journal of Enterprise Technologies 4, no. 9 (130) (2024): 6–17. http://dx.doi.org/10.15587/1729-4061.2024.310521.
Full textMuñoz, Ernesto Cadena, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno, and Mónica Espinosa Buitrago. "PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks." Future Internet 15, no. 6 (2023): 202. http://dx.doi.org/10.3390/fi15060202.
Full text