Showing 161 - 180 results of 6,940 for search '(((beers OR sheets) OR (cheer OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.21s Refine Results
  1. 161
  2. 162

    L1 –stability of vortex sheets and entropy waves in steady supersonic Euler flows over Lipschitz walls by Chen, G-QG, Kukreja, V

    Published 2022
    “…We study the well-posedness of compressible vortex sheets and entropy waves in two-dimensional steady supersonic Euler flows over Lipschitz walls with BV incoming flows. …”
    Journal article
  3. 163

    Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks by Zhang, Zhengyan, Xiao, Guangxuan, Li, Yongwei, Lv, Tian, Qi, Fanchao, Liu, Zhiyuan, Wang, Yasheng, Jiang, Xin, Sun, Maosong

    Published 2024
    “…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). …”
    Get full text
    Article
  4. 164

    Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models by Johnson, Zachary D.

    Published 2024
    “…Companies such as OpenAI employ manual tactics like red-teaming in order to enhance a LLM’s robustness against these attacks, however these tactics may fail to defend against all role-play based jailbreak attacks due to their potentially limited ability to predict unseen attacks. …”
    Get full text
    Thesis
  5. 165

    Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint by Liu, Wenye, Chang, Chip-Hong, Zhang, Fan

    Published 2021
    “…In this paper, we propose a new glitch injection attack on DNN accelerator that is capable of misclassifying a target under variational viewpoints. …”
    Get full text
    Journal Article
  6. 166

    DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers by Sim, Siang Meng, Jap, Dirmanto, Bhasin, Shivam

    Published 2021
    “…In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the linear or non-linear functions that feedback to the shift registers (i.e. …”
    Get full text
    Journal Article
  7. 167

    Distributed control for voltage and current sharing islanded DC microgrids under cyber attacks by Lim, Hui Jing

    Published 2021
    “…As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure the security of MGs under these attacks, suitable control method must be designed to enhance the security of MG. …”
    Get full text
    Final Year Project (FYP)
  8. 168

    Cyber attacks and their impacts on the shipping industry : identify the risks and suggest ways to mitigate (port) by Ye, Xin

    Published 2021
    “…Besides the benefits of being more digitalized and connected, this transformation has also created a new ecosystem where cyber-attack poses as the top risk in port that result in catastrophic consequences. …”
    Get full text
    Final Year Project (FYP)
  9. 169

    Universal adversarial network attacks on traffic light recognition of Apollo autonomous driving system by Chia, Yi You

    Published 2022
    “…A black-box Universal Adversarial Network (UAN) is first trained to create a universal perturbation, which will be used to attack the machine learning model that recognises traffic light signals. …”
    Get full text
    Final Year Project (FYP)
  10. 170

    Secure cooperative event-triggered control of linear multiagent systems under DoS attacks by Feng, Zhi, Hu, Guoqiang

    Published 2022
    “…This paper studies secure cooperative event-triggered control of linear multiagent systems under denial-of-service (DoS) attacks. The DoS attacks refer to interruptions of communication channels carried out by an intelligent adversary. …”
    Get full text
    Journal Article
  11. 171

    Security protocol design against malicious attacks in neighborhood area network in smart grid by Li, Xiaochen

    Published 2016
    “…However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. …”
    Get full text
    Thesis
  12. 172

    SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers by Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam

    Published 2018
    “…SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. …”
    Get full text
    Get full text
    Conference Paper
  13. 173

    Assault and battery: evaluating the security of power conversion systems against electromagnetic injection attacks by Szakály, M, Kohler, S, Strohmeier, M, Martinovic, I

    Published 2024
    “…We develop a novel multifrequency IEMI attack technique to effectively target devices with multiple sensors. …”
    Conference item
  14. 174

    When mobile phone use becomes problematic : the influence of self, parents and peers on adolescents' mobile phone behavior in Singapore and Malaysia by Chuah, Soo Fei

    Published 2018
    “…The second and third parts of this dissertation investigate the effects of adolescents’ personalities (such as self-esteem, extraversion, neuroticism, and self-control), parental influence (such as parental mobile phone use, parenting styles, and parental mediation), and peer influence (such as peer mediation, peer norms, and peer capital) on both mobile phone use and problematic mobile phone use among adolescents in Singapore and Malaysia. …”
    Get full text
    Thesis
  15. 175
  16. 176

    The Impact of Process Substitution on Manufacturing Costs: A Comparative Analysis of Sheet Metal Forming versus Extruded Steel Cutting by Talal, Omar

    Published 2024
    “…Sheet metal manufacturers continuously seek methods to enhance automation and reduce costs. …”
    Get full text
    Thesis
  17. 177
  18. 178

    Isolation forest-based mechanism to defend against interest flooding attacks in named data networking by Huang, Chaoran

    Published 2020
    “…Interest flooding attacks (named as IFA) have been known as one of the most harmful security attacks in named data network (NDN), information-centric network and content-centric network. …”
    Get full text
    Thesis-Master by Coursework
  19. 179

    Cyber attacks and their impacts on the shipping industry. Identify the risks and suggest ways to mitigate. (maritime services) by Poh, Sze Ping

    Published 2021
    “…Hence, this paper aims to increase the maritime services sector’s awareness on cyber-attacks through the discussion of the potential impacts from the commonly used technologically – enabled solutions. …”
    Get full text
    Final Year Project (FYP)
  20. 180

    Development of a platform to educate, detect and mitigate a cyber security social engineering attack by Lin, Xin Jie

    Published 2022
    “…In recent years, social engineering attack (SEA) has been prevailing and more people fall victims to such scams. …”
    Get full text
    Final Year Project (FYP)