Filters








1,396 Hits in 7.2 sec

ALA: Adversarial Lightness Attack via Naturalness-aware Regularizations [article]

Liangru Sun, Felix Juefei-Xu, Yihao Huang, Qing Guo, Jiayi Zhu, Jincao Feng, Yang Liu, Geguang Pu
2022 arXiv   pre-print
To obtain adversarial examples with high image quality, we craft a naturalness-aware regularization.  ...  To generate unrestricted adversarial examples with high image quality and good transferability, in this paper, we propose Adversarial Lightness Attack (ALA), a white-box unrestricted adversarial attack  ...  . • We propose a specialized unrestricted filter with customized naturalness-aware regularization.  ... 
arXiv:2201.06070v1 fatcat:336ua4a6tfhcterah4bbgjq2ny

Secure and Robust Machine Learning for Healthcare: A Survey [article]

Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha
2020 arXiv   pre-print
of recent results that have shown that ML/DL are vulnerable to adversarial attacks.  ...  still lingering doubts regarding the robustness of ML/DL in healthcare settings (which is traditionally considered quite challenging due to the myriad security and privacy issues involved), especially in light  ...  Furthermore, in [99] , authors highlighted various potential incentives for adversaries via adversarial attacks in clinical trials that will rise with the increasing use of ML in the future, particularly  ... 
arXiv:2001.08103v1 fatcat:u6obszbeajcp5asciz5z5unmlq

Secure and Robust Machine Learning for Healthcare: A Survey

Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al Fuqaha
2020 IEEE Reviews in Biomedical Engineering  
of recent results that have shown that ML/DL are vulnerable to adversarial attacks.  ...  still lingering doubts regarding the robustness of ML/DL in healthcare settings (which is traditionally considered quite challenging due to the myriad security and privacy issues involved), especially in light  ...  Furthermore, in [104] , authors highlighted various potential incentives for adversaries via adversarial attacks in clinical trials that will rise with the increasing use of ML in the future, particularly  ... 
doi:10.1109/rbme.2020.3013489 pmid:32746371 fatcat:wd2flezcjng4jjsn46t24c5yb4

Alas, Poor Ghost! Traditions of Belief in Story and Discourse

Elizabeth Wein, Gillian Bennett
2001 Journal of American Folklore  
"Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!"  ...  "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!" "Alas, Poor Ghost!"  ... 
doi:10.2307/542072 fatcat:hsn6hs7mrjah3hvaa4sp36pueq

Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Interpretability, and Ethical Challenges [article]

Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, Khalil Khan, Junaid Qadir, Ala Al-Fuqaha
2021 arXiv   pre-print
In the light of these observations, addressing the philosophical and ethical questions involved in ensuring the security, safety, and interpretability of such AI algorithms that will form the technological  ...  However, ML algorithms are not safe by nature since the adversarial attacks have been approved in different smart domains.  ...  via a domain-specific deep learning architecture.  ... 
arXiv:2012.09110v4 fatcat:yxh5tvpehbgldcblweoovbvdsq

Healthcare Professionals and In-Flight Medical Emergencies: Resources, Responsibilities, Goals, and Legalities as a Good Samaritan

Pascal Joseph de Caprariis, Angela de Caprariis-Salerno, Claudia Lyon
2019 Southern medical journal (Birmingham, Ala. Print)  
Types of Radiation Natural radiation in the form of light and heat are essential to life.  ...  MEDICATION In light of the constantly changing range and nature of medications available around the world, prescribing for aircrew presents a series of challenges.  ...  (c) Meda desk takes the regular booking data and ask the passenger or travel agent to advise the treating physician that the airline RO will be in touch with him/her to get the medical details.  ... 
doi:10.14423/smj.0000000000000922 fatcat:mw7y722zrbay5nm3ygadz65mje

An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks [article]

Raz Lapid, Zvika Haramaty, Moshe Sipper
2022 arXiv   pre-print
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output  ...  This paper introduces Query-Efficient Evolutionary Attack, QuEry Attack, an untargeted, score-based, black-box attack.  ...  Gradient computation can only be executed if the attacker is fully aware of the model architecture and weights.  ... 
arXiv:2208.08297v2 fatcat:dkx5hoghtnbojpehbemy2rd3z4

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges

Hazim Shakhatreh, Ahmad H. Sawalmeh, Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani
2019 IEEE Access  
Moreover, protection against adversarial attacks on the employed machine learning techniques pose another important challenge.  ...  The proposed detection scheme for data integrity attacks and network availability attacks is proved to achieve high detection accuracy via simulations.  ... 
doi:10.1109/access.2019.2909530 fatcat:xgknpyuqazhpvferjkkdohxmtu

Building General Knowledge of Mechanisms in Information Security

Jonathan M. Spring, Phyllis Illari
2018 Philosophy & Technology  
attackers and commercial competitors.  ...  , and also by an ineliminable secrecy concerning the details of attacks not just by attackers (black hats), but also by information security defenders (white hats) as they protect their methods from both  ...  If practitioners could share detailed results widely without tipping off their adversaries, this daunting burden could be shared and made easier. Alas, this is not the case.  ... 
doi:10.1007/s13347-018-0329-z fatcat:j7mtbljg4vcmrnwfa7xpu5hzcm

Defending Against Advanced Persistent Threats Using Game-Theory

Stefan Rass, Sandra König, Stefan Schauer, Cheng-Yi Xia
2017 PLoS ONE  
Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an APT defense  ...  Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APT, such as disagreement among qualitative expert risk assessments, unknown adversarial  ...  The specification of losses and payoffs in a game is often difficult: how would we accurately quantify the results of a defense in light of an attack?  ... 
doi:10.1371/journal.pone.0168675 pmid:28045922 pmcid:PMC5207710 fatcat:4mljgzdfxvcutjt3nwc46ek6oy

An Experimental Security Analysis of an Industrial Robot Controller

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Then, we propose an attacker model and confront it with the minimal set of requirements that industrial robots should honor: precision in sensing the environment, correctness in execution of control logic  ...  Following an experimental and practical approach, we then show how our modeled attacker can subvert such requirements through the exploitation of software vulnerabilities, leading to severe consequences  ...  attacks.  ... 
doi:10.1109/sp.2017.20 dblp:conf/sp/QuartaPPMZZ17 fatcat:grkminso4feejeifi2uh57tae4

Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang
2013 International Journal of Distributed Sensor Networks  
To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and  ...  In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to  ...  The unattended nature of wireless sensor networks can be exploited by adversaries which are able to launch an array of different physical attacks including node replication attack, signal or radio jamming  ... 
doi:10.1155/2013/149023 fatcat:4yep4y7q2zdrvh6s3dolxlwcdm

Quantum Communications [chapter]

2021 Law and Policy for the Quantum Age  
Alas, quantum teleportation does not enable faster-than-light communication.  ...  Used with permission. xkcd.com/4 65/ (See the sidebar "Alas, Faster-than-light Communication Is Not Possible" on page 301.)  ... 
doi:10.1017/9781108883719.011 fatcat:g3b76a5hlvcchd23yy5liwqv3y

Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability [chapter]

Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2018 Lecture Notes in Computer Science  
In our first instantiation, these witnesses follow somewhat naturally from the lossiness of the encryption scheme, whereas in our second instantiation they follow from leveraging combinatorial properties  ...  In the attack, the adversary corrupts all but two users, and can predict with higher probability than he should where each honest user's vote was permuted.  ...  We assume that λ is the length of regular share of a key (if the length is p(λ), Setup H 2 samples ri ← {0, 1} p(λ) )  ... 
doi:10.1007/978-3-319-98113-0_15 fatcat:ta7ysaxvebbpzjbsdnlbm2jljq

Cryptographic Hardness of Random Local Functions–Survey [chapter]

Benny Applebaum
2013 Lecture Notes in Computer Science  
A natural way to obtain local cryptographic constructions is to use random local functions in which each output bit is computed by applying some fixed d-ary predicate P to a randomly chosen d-size subset  ...  In particular, we will survey known attacks and hardness results, discuss different flavors of hardness (one-wayness, pseudorandomness, collision resistance, public-key encryption), and mention applications  ...  Specifically, we are not aware of any local function f G,P with linear stretch that fools linear distinguishers but can be distinguished by some polynomialtime adversary. 8 One may conjecture that if  ... 
doi:10.1007/978-3-642-36594-2_33 fatcat:cnghkimszra2ljkp7ersxiwgoq
« Previous Showing results 1 — 15 out of 1,396 results