Linked e-resources

Details

Intro
Preface
Organization
Contents
AI Security
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning
1 Introduction
2 The Simon Family of Block Ciphers
2.1 Notations
2.2 A Short Description of Simon
2.3 Some Properties of Simon
3 Differential Distinguisher Based on Neural Network
3.1 Model Structure
3.2 Training Model
4 Polytope Distinguisher Based on Neural Network
4.1 Polytope Differential Neural Network Distinguisher
4.2 Result
5 Key Recovery on the Final Round
5.1 Wrong Key Randomization
5.2 Bayesian Optimization

5.3 Bayesian Key Research
5.4 Polytopic Attacks on Simon32/64
5.5 Analysis
5.6 Bayesian Key Research with Error
6 Conclusion
References
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation
1 Introduction
2 Related Work
3 Method
3.1 Preliminary
3.2 Framework Structure
3.3 Adaptive Softmax Transformation
4 Experiment and Analysis
4.1 Experiment Setup
4.2 Defense Evaluation
4.3 Defense Comparison
4.4 Defense Transferability
4.5 Defense Visual Analysis
5 Conclusion and Future Works
References

Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
1 Introduction
2 Related Work
3 Feint Attack Chains Construction and Detection Method
3.1 Alert Correlation Based on Fuzzy Clustering
3.2 Building the Virtual-Real Lib
3.3 Feint Attack Chain Construction and Detection Model
4 Experimental and Results
4.1 Experimental Setup
4.2 Experimental Result and Evaluation
5 Conclusion
References
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System
1 Introduction
2 Related Work
3 Proposed Method

3.1 Rolling Shutter Effect
3.2 Attack Scheme
3.3 Attack Methods
3.4 Threat Model
4 Experiments and Results
4.1 Experiment Scheme
4.2 Experiment for Dlib Face Recognition System
4.3 Experiment for DoS Attack
4.4 Experiment for Escape Attack
5 Conclusion
References
Asymmetric Cipher
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption
1 Introduction
2 Preliminaries
2.1 Revocable Hierarchical Identity-Based Encryption
2.2 Server-Aided Revocable Hierarchical Identity-Based Encryption

3 Generic Construction of Server-Aided Revocable HIBE with DKER
3.1 Generic Construction of SR-IBE
References
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack
1 Introduction
1.1 Related Work
1.2 Paper Organization
2 Preliminary
2.1 Notations
2.2 Definitions
3 ABE with Outsourced Decryption
3.1 Syntax of OD-ABE
3.2 Security Model for OD-ABE
4 An OD-CP-ABE Scheme with Full CPA Security
4.1 Construction
4.2 Security Analysis
5 An OD-CP-ABE Scheme with Full CCA Security
5.1 -protocol Used in the Schemes
5.2 Construction

Browse Subjects

Show more subjects...

Statistics

from
to
Export