Augmented Reality (AR) and Virtual Reality (VR) are emerging technologies that combine digital and physical worlds to provide immersive and interactive experiences. Their use in education has been revolutionary, parti...
详细信息
In this paper, we studied the attack on shortest vector problem (SVP) of lattice using the machine-learning (ML) algorithm KNN. The prime number factoring assumption or the presumption that the discrete logarithm prob...
详细信息
Finger Vein ID is a biometric verification toolthat compares a person's finger vascular pattern to previously gathered data. Numerous applications, such as automated teller machines, computer and network authentic...
详细信息
In this work, we address the strategic placement and optimal sizing of electric vehicle charging stations for cities as well as highway traffic to minimize overall cost. We formulate the problem as a Mixed Integer Lin...
详细信息
Blockchain-enabled vault for evidence management systems have played an important role in the judicial system to provide an efficient, convenient, and secure access system over the cloud. Criminal record-keeping is a ...
详细信息
A patient's cognitive health may be better assessed using smart monitoring and assisted living technologies. Social skills, repetitive habits, verbal and nonverbal communication, and adjusting to new environments ...
详细信息
The burgeoning electric vehicle (EV) sector epitomizes a crucial transition towards more sustainable modes of transportation, underscored by the global imperative to mitigate carbon emissions. However, despite the tec...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
As digital infrastructure expands, the proliferation of malware files is escalating rapidly. Cyber-attacks have become increasingly complex and sophisticated, posing significant security challenges. Malware files can ...
详细信息
To guarantee patient safety and regulatory compliance, healthcare providers must accurately enter batch numbers and expiration dates from drug packaging. But manual entry is prone to mistakes, which could have unfavou...
详细信息
暂无评论