Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
161
-
162
L1 –stability of vortex sheets and entropy waves in steady supersonic Euler flows over Lipschitz walls
Published 2022“…We study the well-posedness of compressible vortex sheets and entropy waves in two-dimensional steady supersonic Euler flows over Lipschitz walls with BV incoming flows. …”
Journal article -
163
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks
Published 2024“…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). …”
Get full text
Article -
164
Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models
Published 2024“…Companies such as OpenAI employ manual tactics like red-teaming in order to enhance a LLM’s robustness against these attacks, however these tactics may fail to defend against all role-play based jailbreak attacks due to their potentially limited ability to predict unseen attacks. …”
Get full text
Thesis -
165
Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint
Published 2021“…In this paper, we propose a new glitch injection attack on DNN accelerator that is capable of misclassifying a target under variational viewpoints. …”
Get full text
Journal Article -
166
DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers
Published 2021“…In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the linear or non-linear functions that feedback to the shift registers (i.e. …”
Get full text
Journal Article -
167
Distributed control for voltage and current sharing islanded DC microgrids under cyber attacks
Published 2021“…As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure the security of MGs under these attacks, suitable control method must be designed to enhance the security of MG. …”
Get full text
Final Year Project (FYP) -
168
Cyber attacks and their impacts on the shipping industry : identify the risks and suggest ways to mitigate (port)
Published 2021“…Besides the benefits of being more digitalized and connected, this transformation has also created a new ecosystem where cyber-attack poses as the top risk in port that result in catastrophic consequences. …”
Get full text
Final Year Project (FYP) -
169
Universal adversarial network attacks on traffic light recognition of Apollo autonomous driving system
Published 2022“…A black-box Universal Adversarial Network (UAN) is first trained to create a universal perturbation, which will be used to attack the machine learning model that recognises traffic light signals. …”
Get full text
Final Year Project (FYP) -
170
Secure cooperative event-triggered control of linear multiagent systems under DoS attacks
Published 2022“…This paper studies secure cooperative event-triggered control of linear multiagent systems under denial-of-service (DoS) attacks. The DoS attacks refer to interruptions of communication channels carried out by an intelligent adversary. …”
Get full text
Journal Article -
171
Security protocol design against malicious attacks in neighborhood area network in smart grid
Published 2016“…However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. …”
Get full text
Thesis -
172
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
Published 2018“…SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. …”
Get full text
Get full text
Conference Paper -
173
Assault and battery: evaluating the security of power conversion systems against electromagnetic injection attacks
Published 2024“…We develop a novel multifrequency IEMI attack technique to effectively target devices with multiple sensors. …”
Conference item -
174
When mobile phone use becomes problematic : the influence of self, parents and peers on adolescents' mobile phone behavior in Singapore and Malaysia
Published 2018“…The second and third parts of this dissertation investigate the effects of adolescents’ personalities (such as self-esteem, extraversion, neuroticism, and self-control), parental influence (such as parental mobile phone use, parenting styles, and parental mediation), and peer influence (such as peer mediation, peer norms, and peer capital) on both mobile phone use and problematic mobile phone use among adolescents in Singapore and Malaysia. …”
Get full text
Thesis -
175
Is it who you know or what you know? Evidence from ipo allocations and mutual fund performance
Published 2019Subjects: Get full text
Get full text
Journal Article -
176
The Impact of Process Substitution on Manufacturing Costs: A Comparative Analysis of Sheet Metal Forming versus Extruded Steel Cutting
Published 2024“…Sheet metal manufacturers continuously seek methods to enhance automation and reduce costs. …”
Get full text
Thesis -
177
Cyber Security @ Higher Education – Developing a Preventive Model for Cyber Attack (S/O 13598)
Published 2019“…Cyber-attacks have increased significantly in the 21st centuries. …”
Get full text
Monograph -
178
Isolation forest-based mechanism to defend against interest flooding attacks in named data networking
Published 2020“…Interest flooding attacks (named as IFA) have been known as one of the most harmful security attacks in named data network (NDN), information-centric network and content-centric network. …”
Get full text
Thesis-Master by Coursework -
179
Cyber attacks and their impacts on the shipping industry. Identify the risks and suggest ways to mitigate. (maritime services)
Published 2021“…Hence, this paper aims to increase the maritime services sector’s awareness on cyber-attacks through the discussion of the potential impacts from the commonly used technologically – enabled solutions. …”
Get full text
Final Year Project (FYP) -
180
Development of a platform to educate, detect and mitigate a cyber security social engineering attack
Published 2022“…In recent years, social engineering attack (SEA) has been prevailing and more people fall victims to such scams. …”
Get full text
Final Year Project (FYP)