A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective
[article]
2014
arXiv
pre-print
We analyze the distinguishability of two sources in a Neyman-Pearson set-up when an attacker is allowed to modify the output of one of the two sources subject to a distortion constraint. ...
maximum average per-sample distortion introduced by the attacker for which the two sources can be distinguished ensuring arbitrarily small, yet positive, error exponents for type I and type II error probabilities ...
ACKNOWLEDGMENT We thank Alessandro Agnetis for the useful discussions on the optimization problems underlying the computation of the EMD. ...
arXiv:1407.3704v1
fatcat:324r5qzwi5g7ramezz5kxf5uvi
Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
[article]
2023
arXiv
pre-print
(e.g., adversary/attack models) altogether. ...
The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future. ...
Such distortions can result in under-or over-generation by the inverter, leading to uneconomic operation, and real or reactive power instabilities in the DER connected grid [74] .
D. ...
arXiv:2205.11171v3
fatcat:37p7yho57jg5jiq3air4t5cze4
Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations
[article]
2023
arXiv
pre-print
Consequently, an established body of literature has emerged that explores adversarial attacks targeting the underlying machine learning models. ...
EvilEye exploits the camera's optics to induce misclassifications under a variety of illumination conditions. ...
,; as well as the IoBT REIGN Collaborative Research Alliance funded by the Army Research Laboratory (ARL) under Cooperative Agreement W911NF1720196. ...
arXiv:2307.13131v2
fatcat:t6bmh5tdybbu3iyeagbrmdplmi
Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity
2022
ACM Computing Surveys
The framework is built from the perspective of cybersecurity so as to provide a lifecycle for adversarial attacks and defenses. ...
Most focus on evasion attacks, where the adversarial examples are found at test time, as opposed to poisoning attacks where poisoned data is inserted into the training data. ...
[34] proposed a targeted attack focusing on the perturbations under an L 0 distance metric, called Jacobian-based Saliency Map Approach (JSMA). ...
doi:10.1145/3547330
fatcat:d3x3oitysvb73ado5kuaqakgtu
A Taxonomy of Data Attacks in Power Systems
[article]
2020
arXiv
pre-print
In a macro-economic system, all major sectors: agriculture, extraction of natural resources, manufacturing, construction, transport, communication and health services, are dependent on a reliable supply ...
For each class, a comprehensive review of mathematical attack models is presented. ...
On the other hand, in energy supply deceiving attack, an attacker claims to provide additional or less energy than under normal circumstances. ...
arXiv:2002.11011v1
fatcat:qnh3li5os5b4tn2iadhy7f24ze
SVM Implementation for Ddos Attacks in Software Defined Networks
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
DDOS is an attack that in general leads to exhaust of the network resources in turn stopping the controller. ...
The more common attacks that corrupt the network and hinders the efficiency are distributed denial-of-service (DDOS) attacks. ...
Making sure about an application against DDoS attack is more diligently in the light of the fact that the created traffic doesn't appear to be changed both at system and transport levels. ...
doi:10.35940/ijitee.a8166.1110120
fatcat:uqgpckoqyrghxmic2cksyhb7di
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
[article]
2023
arXiv
pre-print
This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. ...
Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually ...
The defense effect under C&W attack is not optimal. Networks (AMM) are provided by Yan et al. ...
arXiv:2303.06302v1
fatcat:7kvsomuc7nghpmkh4krlplhnqu
Smart Grid Cyber-Physical Attack and Defense: A Review
2021
IEEE Access
an exception that the subscript a denotes the under attack status. ...
[82] proposed topology attacks in distinguishing from the FDI attack. ...
doi:10.1109/access.2021.3058628
fatcat:5p2dbk6dlnbnplungfhv6k55lu
Attacks classification and security mechanisms in Wireless Sensor Networks
2019
Advances in Science, Technology and Engineering Systems
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, ...
Simulations implemented under the NS3 simulator prove that the network lifetime can decrease by more than 45% in the presence of attacks. ...
Using a powerful signal, Hello flood attack broadcast the information of an optimal imaginary route according to which the sensors update their local tables. ...
doi:10.25046/aj040630
fatcat:vzooaabzxzdbfh5hkvvuyey36q
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures
2019
IEEE Communications Surveys and Tutorials
In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: "Passive Attacks" and "Active Attacks". ...
Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. ...
The receiver cannot distinguish legitimate fragments from spoofed duplicates. ...
doi:10.1109/comst.2019.2953364
fatcat:wi7zt3goknciplqc2nhgqdfdei
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions
[article]
2023
arXiv
pre-print
Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. ...
This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and FANETs. ...
An attack surface diagram offers a comprehensive perspective on all possible flaws within a system. ...
arXiv:2306.14281v3
fatcat:7md47g72hna7rkkguvs4z6jmgu
Anonymity with Tor: A Survey on Tor Attacks
[article]
2020
arXiv
pre-print
In this paper, we survey known Tor attacks and identify currently available techniques that lead to improved de-anonymisation of users and hidden services. ...
As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship ...
Traffic management -Tor's congestion control, quality of service, etc. are discussed in this category under application layer and transport layer approaches. 2. ...
arXiv:2009.13018v2
fatcat:eaijzylajvfxxluoueu3yf66mu
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
[article]
2022
arXiv
pre-print
Furthermore, our survey has enabled us to: (i) propose a taxonomy for security vulnerabilities, attack vectors and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures ...
Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems. ...
ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme. ...
arXiv:2104.11906v2
fatcat:nvz3bssy55fwlcwqzkd7n3zism
Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations
[article]
2022
arXiv
pre-print
Safe and reliable electric vehicle charging stations (EVCSs) have become imperative in an intelligent transportation infrastructure. ...
) algorithms for modeling the security attacks. ...
Moreover, the effectiveness of the proposed mitigations can be studied under realistic and sophisticated cyber attack scenarios. Fig. 1 . 1 Fig. 1. High-level overview of an EVCS. ...
arXiv:2208.10644v1
fatcat:phpjwuirnrgo5nhu2mwwtqadwq
The Security Margin: A measure of source distinguishability under adversarial conditions
2013
2013 IEEE Global Conference on Signal and Information Processing
attacker for which the two sources can be reliably distinguished. ...
We analyze the distinguishability of two sources under adversarial conditions, when the error exponents of type I and type II error probabilities are allowed to take an arbitrarily small, yet positive, ...
By adopting a slightly different perspective, given two sources X and Y , one may wonder which is the maximum attacking distortion for which D can distinguish X and Y despite the presence of the adversary ...
doi:10.1109/globalsip.2013.6736856
dblp:conf/globalsip/BarniT13
fatcat:6wreptp2argnxcxiv57cp2rx6m
« Previous
Showing results 1 — 15 out of 15,280 results