Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204995
Abstract: The vulnerability of computational models to adversarial examples highlights the differences in the ways humans and machines process visual information. Motivated by human perception invariance in object recognition, we aim to incorporate human brain representations…
read more here.
Keywords:
adversarial attacks;
brain;
using brain;
attacks using ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2024.3503721
Abstract: The vulnerability of deep learning-based indoor Wi-Fi fingerprint localization methods to adversarial attacks significantly reduces localization performance. To overcome this challenge, we propose a defense strategy employing a deep convolutional generative adversarial network (DCGAN) to…
read more here.
Keywords:
indoor localization;
localization adversarial;
secure indoor;
localization ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Applied Sciences"
DOI: 10.3390/app15063348
Abstract: Cross-site scripting attacks represent one of the major security threats facing web applications, with Stored XSS attacks becoming the predominant form. Compared to reflected XSS, stored XSS attack payloads exhibit temporal and spatial asynchrony between…
read more here.
Keywords:
stored xss;
xss attacks;
using llm;
xsshield defending ... See more keywords