Showing 41 - 60 results of 6,717 for search '(((ceers OR sheers) OR (cheer OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.18s Refine Results
  1. 41

    Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques by Ma, Xinda, Au, Siu-Kui

    Published 2024
    “…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
    Get full text
    Journal Article
  2. 42

    A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems by Shu, Yantai, Gao, Lijun, Ma, Maode, Wei, Yuhua

    Published 2013
    “…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
    Get full text
    Get full text
    Journal Article
  3. 43
  4. 44

    Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims by Meng, Kevin, Jimenez, Damian, Devasier, Jacob, Naraparaju, Sai Sandeep, Arslan, Fatma, Obembe, Daniel, Li, Chengkai

    Published 2024
    “…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
    Get full text
    Article
  5. 45
  6. 46
  7. 47

    Demonstration of attacks on SSL-TLS protocols by Iyer Rajagopal Mahadevan

    Published 2022
    “…What is the impact of this attack? 5. What are some strategies to mitigate this attack?…”
    Get full text
    Final Year Project (FYP)
  8. 48

    Study on attacks against federated learning by Guo, Feiyan

    Published 2022
    “…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
    Get full text
    Final Year Project (FYP)
  9. 49

    Differential privacy and membership inference attacks by Ong, Ting Yu

    Published 2023
    “…Membership inference is a type of attack that identifies the members of the training dataset. …”
    Get full text
    Final Year Project (FYP)
  10. 50

    The political economy of FDI location : why don't political checks and balances and treaty constraints matter? by Walter, Andrew

    Published 2009
    “…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
    Get full text
    Get full text
    Working Paper
  11. 51

    Toward human-centered automated driving: a novel spatiotemporal vision transformer-enabled head tracker by Hu, Zhongxu, Zhang, Yiran, Xing, Yang, Zhao, Yifan, Cao, Dongpu, Lv, Chen

    Published 2022
    “…By analyzing the error distribution of the estimation model and the user experience of the head tracker, the proposed AKF includes an adaptive observation noise coefficient; this can adaptively moderate the smoothness of the curve. …”
    Get full text
    Journal Article
  12. 52
  13. 53
  14. 54

    2020 Jolo suicide attack : evolving tactics by Yeo, Kenneth, Mahzam, Remy

    Published 2020
    “…The 24 August 2020 suicide bombing in Jolo which involved female attackers has brought attention to the emergence of the pro-Islamic State (IS) Hatib Hajan Sawadjaan faction of the Abu Sayyaf Group and its tactic of engaging women for this role.…”
    Get full text
    Commentary
  15. 55

    Class-based attack on graph convolution network by He, HeFei

    Published 2022
    “…Recent study has been shown that graph convolutional networks are vulnerable to adversary attacks, causing a severe threat to real world application. …”
    Get full text
    Final Year Project (FYP)
  16. 56

    Protecting neural networks from adversarial attacks by Yeow, Zhong Han

    Published 2024
    “…This project investigates how Searchable Symmetric Encryption (SSE) can be applied to neural networks as a form of protection from adversarial attacks and the viability of such an implementation. …”
    Get full text
    Final Year Project (FYP)
  17. 57
  18. 58

    Collusion attacks for digital fingerprinting of image and video by Wahadaniah, Viktor

    Published 2008
    “…In this thesis, three existing linear and non-linear collusion attacks on image/video fingerprinting, namely averaging collusion attack, maximum-minimum collusion attack, and Stone's zero-correlation collusion attack, are studied and analysed. …”
    Get full text
    Thesis
  19. 59
  20. 60

    Co-resident attacks on public cloud infrastructures by Vu, Duc Long

    Published 2019
    “…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
    Get full text
    Final Year Project (FYP)