Search alternatives:
beens » teens (Expand Search), bees (Expand Search), beers (Expand Search)
beans » means (Expand Search), beams (Expand Search), beads (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » peer (Expand Search), bee (Expand Search), bear (Expand Search)
beens » teens (Expand Search), bees (Expand Search), beers (Expand Search)
beans » means (Expand Search), beams (Expand Search), beads (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » peer (Expand Search), bee (Expand Search), bear (Expand Search)
-
8161
Blockchain-enabled peer-to-peer energy trading and resilient control of microgrids
Published 2024“…The results divulge that the LDP of the proposed controller can provide a robust and secure solution of MGs with P2P trading, even in the presence of adversarial attacks.…”
Get full text
Journal Article -
8162
Privacy-preserving graph representation learning
Published 2024“…The second aspect is to introduce a graph attack strategy, which attacks the target graph against the graph neural network algorithm in order to reduce the accuracy of the link prediction of the graph neural network, so that a certain degree of privacy protection can be realized.…”
Get full text
Thesis-Master by Coursework -
8163
Security enhancement of fingerprint authentication
Published 2009“…In spite of their numerous advantages, the fingerprint systems are vulnerable to some attacks, which can decrease their security level. …”
Get full text
Final Year Project (FYP) -
8164
As firm as their foundations: creating transferable adversarial examples across downstream tasks with CLIP
Published 2024“…In this work, we expose such vulnerabilities among CLIP's downstream models and show that foundation models can serve as a basis for attacking their downstream systems. In particular, we propose a simple yet alarmingly effective adversarial attack strategy termed Patch Representation Misalignment (PRM). …”
Conference item -
8165
Digital image watermarking based on fractal transform
Published 2008“…This algorithm can successfully resist the geometric attacks on the watermarked image. This algorithm can be used on both color and gray images and it does not need the original image in the stage of watermark extraction.…”
Get full text
Thesis -
8166
Exploring differential-based distinguishers and forgeries for ascon
Published 2022“…Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-HAsh.…”
Get full text
Journal Article -
8167
Wireless network security analysis
Published 2008“…Security flaws and some of the known attacking methods are revealed.…”
Get full text
Thesis -
8168
The struggle for Syria : Iran-Qatar ties come under stress
Published 2012“…Qatar increasingly becomes a potential target for retaliation should the US and/or Israel attack Iranian nuclear facilities.…”
Get full text
Get full text
Commentary -
8169
Trump’s Ill-Fated China-North Korea Gambit
Published 2017“…Ahead of a summit with his Chinese counterpart Xi Jinping, President Trump has threatened that if China does not impose crippling economic sanctions against North Korea, the US will launch a preventive attack against Pyongyang’s nuclear installations. …”
Get full text
Get full text
Commentary -
8170
Effect of recycled fine aggregates on concrete properties
Published 2009“…Chemical tests such as chloride and sulfate test is also carried out to compare the extent of chloride attack n sulfate attack of concrete made from recycled aggregates and of those from natural aggregates.…”
Get full text
Final Year Project (FYP) -
8171
2D + 3D approach in face verification algorithm
Published 2015“…However, due to its nature, 2D face recognition is often prone to spoof attack such as photo and video attack. This project aimed to combine best of both worlds by using ubiquitous gadget such as laptop and mobile camera to create a low-cost and robust, yet accurate face verification system. …”
Get full text
Final Year Project (FYP) -
8172
Channelized coinShuffle++ : practical unlinkability in the ethereum blockchain
Published 2019“…The duplication of ledger provides public verifiability while also give rise to deanonymization attacks and unlinkability violations, where users’ real world identities are linked to their pseudonymous blockchain accounts. …”
Get full text
Final Year Project (FYP) -
8173
The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul
Published 2013“…When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
Journal article -
8174
A stochastic programming approach for risk management in mobile cloud computing
Published 2020“…In particular, this framework allows the cloud service provider to select appropriate security solutions, e.g., security software/hardware implementation and insurance policies, to deal with different types of attacks. Furthermore, the stochastic programming approach is adopted to minimize the expected total loss for the cloud service provider under its financial capability and uncertainty of attacks and their potential losses. …”
Get full text
Conference Paper -
8175
Insurgency in Southern Thailand: More Unrest Ahead?
Published 2016“…Growing discontent in Southern Thailand has led to a significant increase in the number of attacks in the region, a surge in radical online activity as well as the revival of militant groups that are thought to be defunct or dormant. …”
Get full text
Get full text
Commentary -
8176
A multi-view context-aware approach to Android malware detection and malicious code localization
Published 2020“…Meaning, some views are more amenable to detect certain attacks but may not be suitable to characterize several other attacks. …”
Get full text
Journal Article -
8177
Securing untrusted memories in embedded systems
Published 2020“…This thesis aims to address this challenge by proposing compile-time and runtime strategies for securing untrusted memories from active memory attacks (e.g. replay, spoo ng and splicing attacks) that can compromise the con dentiality and integrity of the memory data. …”
Get full text
Thesis-Doctor of Philosophy -
8178
End of Al Qaeda era?
Published 2021“…The reported passing of more of Al Qaeda’s senior leadership marks the almost complete passing of a generation. Yet a series of attacks in Europe point to a threat now happening beyond directed terrorist networks. …”
Get full text
Commentary -
8179
Global Fight Against IS: Singapore’s Role in Counter-Terrorism
Published 2016“…This has raised concerns that it would make the island more susceptible to terror attacks. However, this was a strategic decision which both intensifies Singapore’s defence against IS, and its relationship with the US.…”
Get full text
Get full text
Commentary -
8180
Nonequilibrium hyperuniform fluids
Published 2024“…The first one is the systems stemmed from random organization (RO) dynamics, which is a model originally proposed to describe the chaotic particle motion in sheared non-Brownian suspensions. The subsequent one is the hyperuniform systems found in active particle systems, including hyperuniform reactive particle fluids and the chiral active brownian systems and biological algae systems, etc. …”
Get full text
Thesis-Doctor of Philosophy