Articles with "attacks using" as a keyword



Strengthening Robustness Under Adversarial Attacks Using Brain Visual Codes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204995

Abstract: The vulnerability of computational models to adversarial examples highlights the differences in the ways humans and machines process visual information. Motivated by human perception invariance in object recognition, we aim to incorporate human brain representations… read more here.

Keywords: adversarial attacks; brain; using brain; attacks using ... See more keywords

Secure Indoor Localization Against Adversarial Attacks Using DCGAN

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2024.3503721

Abstract: The vulnerability of deep learning-based indoor Wi-Fi fingerprint localization methods to adversarial attacks significantly reduces localization performance. To overcome this challenge, we propose a defense strategy employing a deep convolutional generative adversarial network (DCGAN) to… read more here.

Keywords: indoor localization; localization adversarial; secure indoor; localization ... See more keywords

XSShield: Defending Against Stored XSS Attacks Using LLM-Based Semantic Understanding

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Sciences"

DOI: 10.3390/app15063348

Abstract: Cross-site scripting attacks represent one of the major security threats facing web applications, with Stored XSS attacks becoming the predominant form. Compared to reflected XSS, stored XSS attack payloads exhibit temporal and spatial asynchrony between… read more here.

Keywords: stored xss; xss attacks; using llm; xsshield defending ... See more keywords