Showing 8,161 - 8,180 results of 8,391 for search '(((((beens OR been) OR beans) OR (shears OR shear)) OR (cheer OR (attackers OR check))) OR beer)', query time: 0.23s Refine Results
  1. 8161

    Blockchain-enabled peer-to-peer energy trading and resilient control of microgrids by Veerasamy, Veerapandiyan, Hu, Zhijian, Qiu, Haifeng, Murshid, Shadab, Gooi, Hoay Beng, Nguyen, Hung Dinh

    Published 2024
    “…The results divulge that the LDP of the proposed controller can provide a robust and secure solution of MGs with P2P trading, even in the presence of adversarial attacks.…”
    Get full text
    Journal Article
  2. 8162

    Privacy-preserving graph representation learning by Lan, Xin

    Published 2024
    “…The second aspect is to introduce a graph attack strategy, which attacks the target graph against the graph neural network algorithm in order to reduce the accuracy of the link prediction of the graph neural network, so that a certain degree of privacy protection can be realized.…”
    Get full text
    Thesis-Master by Coursework
  3. 8163

    Security enhancement of fingerprint authentication by Alias, Joe

    Published 2009
    “…In spite of their numerous advantages, the fingerprint systems are vulnerable to some attacks, which can decrease their security level. …”
    Get full text
    Final Year Project (FYP)
  4. 8164

    As firm as their foundations: creating transferable adversarial examples across downstream tasks with CLIP by Hu, A, Gu, J, Pinto, F, Kamnitsas, K, Torr, PHS

    Published 2024
    “…In this work, we expose such vulnerabilities among CLIP's downstream models and show that foundation models can serve as a basis for attacking their downstream systems. In particular, we propose a simple yet alarmingly effective adversarial attack strategy termed Patch Representation Misalignment (PRM). …”
    Conference item
  5. 8165

    Digital image watermarking based on fractal transform by Ni, Zhicheng.

    Published 2008
    “…This algorithm can successfully resist the geometric attacks on the watermarked image. This algorithm can be used on both color and gray images and it does not need the original image in the stage of watermark extraction.…”
    Get full text
    Thesis
  6. 8166

    Exploring differential-based distinguishers and forgeries for ascon by Gerault, David, Peyrin, Thomas, Tan, Quan Quan

    Published 2022
    “…Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-HAsh.…”
    Get full text
    Journal Article
  7. 8167

    Wireless network security analysis by Zhou, Gang.

    Published 2008
    “…Security flaws and some of the known attacking methods are revealed.…”
    Get full text
    Thesis
  8. 8168

    The struggle for Syria : Iran-Qatar ties come under stress by James M. Dorsey

    Published 2012
    “…Qatar increasingly becomes a potential target for retaliation should the US and/or Israel attack Iranian nuclear facilities.…”
    Get full text
    Get full text
    Commentary
  9. 8169

    Trump’s Ill-Fated China-North Korea Gambit by Resnick, Evan N.

    Published 2017
    “…Ahead of a summit with his Chinese counterpart Xi Jinping, President Trump has threatened that if China does not impose crippling economic sanctions against North Korea, the US will launch a preventive attack against Pyongyang’s nuclear installations. …”
    Get full text
    Get full text
    Commentary
  10. 8170

    Effect of recycled fine aggregates on concrete properties by Lau, Jing Xi.

    Published 2009
    “…Chemical tests such as chloride and sulfate test is also carried out to compare the extent of chloride attack n sulfate attack of concrete made from recycled aggregates and of those from natural aggregates.…”
    Get full text
    Final Year Project (FYP)
  11. 8171

    2D + 3D approach in face verification algorithm by Hendinata, Joshua

    Published 2015
    “…However, due to its nature, 2D face recognition is often prone to spoof attack such as photo and video attack. This project aimed to combine best of both worlds by using ubiquitous gadget such as laptop and mobile camera to create a low-cost and robust, yet accurate face verification system. …”
    Get full text
    Final Year Project (FYP)
  12. 8172

    Channelized coinShuffle++ : practical unlinkability in the ethereum blockchain by Xiong, Luoyuan

    Published 2019
    “…The duplication of ledger provides public verifiability while also give rise to deanonymization attacks and unlinkability violations, where users’ real world identities are linked to their pseudonymous blockchain accounts. …”
    Get full text
    Final Year Project (FYP)
  13. 8173

    The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul by Coco, A

    Published 2013
    “…When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
    Journal article
  14. 8174

    A stochastic programming approach for risk management in mobile cloud computing by Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, Wang, Shaun Shuxun, Nguyen, Diep, Dutkiewicz, Eryk

    Published 2020
    “…In particular, this framework allows the cloud service provider to select appropriate security solutions, e.g., security software/hardware implementation and insurance policies, to deal with different types of attacks. Furthermore, the stochastic programming approach is adopted to minimize the expected total loss for the cloud service provider under its financial capability and uncertainty of attacks and their potential losses. …”
    Get full text
    Conference Paper
  15. 8175

    Insurgency in Southern Thailand: More Unrest Ahead? by Rajakumar, Vikram

    Published 2016
    “…Growing discontent in Southern Thailand has led to a significant increase in the number of attacks in the region, a surge in radical online activity as well as the revival of militant groups that are thought to be defunct or dormant. …”
    Get full text
    Get full text
    Commentary
  16. 8176

    A multi-view context-aware approach to Android malware detection and malicious code localization by Narayanan, Annamalai, Chandramohan, Mahinthan, Chen, Lihui, Liu, Yang

    Published 2020
    “…Meaning, some views are more amenable to detect certain attacks but may not be suitable to characterize several other attacks. …”
    Get full text
    Journal Article
  17. 8177

    Securing untrusted memories in embedded systems by Vig, Saru

    Published 2020
    “…This thesis aims to address this challenge by proposing compile-time and runtime strategies for securing untrusted memories from active memory attacks (e.g. replay, spoo ng and splicing attacks) that can compromise the con dentiality and integrity of the memory data. …”
    Get full text
    Thesis-Doctor of Philosophy
  18. 8178

    End of Al Qaeda era? by Pantucci, Raffaello

    Published 2021
    “…The reported passing of more of Al Qaeda’s senior leadership marks the almost complete passing of a generation. Yet a series of attacks in Europe point to a threat now happening beyond directed terrorist networks. …”
    Get full text
    Commentary
  19. 8179

    Global Fight Against IS: Singapore’s Role in Counter-Terrorism by Ahuja, Juhi

    Published 2016
    “…This has raised concerns that it would make the island more susceptible to terror attacks. However, this was a strategic decision which both intensifies Singapore’s defence against IS, and its relationship with the US.…”
    Get full text
    Get full text
    Commentary
  20. 8180

    Nonequilibrium hyperuniform fluids by Lei, Yusheng

    Published 2024
    “…The first one is the systems stemmed from random organization (RO) dynamics, which is a model originally proposed to describe the chaotic particle motion in sheared non-Brownian suspensions. The subsequent one is the hyperuniform systems found in active particle systems, including hyperuniform reactive particle fluids and the chiral active brownian systems and biological algae systems, etc. …”
    Get full text
    Thesis-Doctor of Philosophy