期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
AMA:Adaptive Multimodal Adversarial Attack with Dynamic Perturbation Optimization
1
作者 Yufei Shi Ziwen He +2 位作者 Teng Jin Haochen Tong Zhangjie Fu 《Computer Modeling in Engineering & Sciences》 2025年第8期1831-1848,共18页
This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts... This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts perturbation amplitude based on task complexity and optimizes the perturbation direction based on the gradient direction in real time to enhance attack efficiency.Experimental results demonstrate that AMA elevates attack success rates from approximately 78.95%to 89.56%on visual question answering and from78.82%to 84.96%on visual reasoning tasks across representative vision-language benchmarks.These findings demonstrate AMA’s superior attack efficiency and reveal the vulnerability of current visual language models to carefully crafted adversarial examples,underscoring the need to enhance their robustness. 展开更多
关键词 Adversarial attack visual language model black-box attack adaptive multimodal attack disturbance intensity
在线阅读 下载PDF
An Efficient Conversion Scheme for Enhancing Security of Diffie-Hellman-Based Encryption 被引量:1
2
作者 ZHANG Xi,HANG Huanhua College of Computer and Software,Shenzhen University,Shenzhen 518060,Guangdong,China 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期415-421,共7页
Nowadays,indistinguishability against adaptive chosen-ciphertext attacks(IND-CCA2) has been widely accepted as a proper security criterion for encryption schemes.In this paper,an efficient conversion is proposed to ... Nowadays,indistinguishability against adaptive chosen-ciphertext attacks(IND-CCA2) has been widely accepted as a proper security criterion for encryption schemes.In this paper,an efficient conversion is proposed to satisfy the IND-CCA2 security.It uses the random oracle methodology and the idea of hybrid encryption,and can enhance any Diffie-Hellman based encryption scheme,which is only one-way under plaintext-checking attack.Compared with other existing conversions,this conversion has the advantages of short ciphertext and low computation overhead,especially when it is applied to the multi-recipient setting. 展开更多
关键词 Diffie-Hellman-based encryption adaptive chosenciphertext attack multi-recipient setting randomness-reusing
原文传递
Heuristics of node selection criteria to assess robustness of world airport network 被引量:3
3
作者 Manel SORIA Oriol LORDAN JosMaría SALLAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第4期1473-1480,共8页
The world airport network(WAN) is one of the networked infrastructures that shape today's economic and social activity, so its resilience against incidents affecting the WAN is an important problem. In this paper, ... The world airport network(WAN) is one of the networked infrastructures that shape today's economic and social activity, so its resilience against incidents affecting the WAN is an important problem. In this paper, the robustness of air route networks is extended by defining and testing several heuristics to define selection criteria to detect the critical nodes of the WAN.In addition to heuristics based on genetic algorithms and simulated annealing, custom heuristics based on node damage and node betweenness are defined. The most effective heuristic is a multiattack heuristic combining both custom heuristics. Results obtained are of importance not only for advance in the understanding of the structure of complex networks, but also for critical node detection. 展开更多
关键词 adaptive strategy Air route networks Complex networks Intentional attacks Network robustness
原文传递
Instantiate Random Oracles in OAEP with Pseudorandom Functions
4
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部