期刊文献+
共找到158篇文章
< 1 2 8 >
每页显示 20 50 100
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
1
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks 被引量:2
2
作者 Vennam Ratna Kumari Aitha Nagaraju Gaurav Pareek 《Journal of Sensor Technology》 2014年第2期48-58,共11页
Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localizat... Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are also prone to attacks. We target a localization scheme for mobile sensor networks called Monte-Carlo Localization, which study its behavior under the most dangerous attack on localization called Wormhole Attack, also known as Collusion Attack and propose a modified algorithm that can help the localization system retain its accuracy level even in the presence of attacks. Our algorithm has communication cost almost equal to that of original localization algorithm (in this case MCL) in the absence of attacks. 展开更多
关键词 localIZATION SENSOR NETWORKS COLLUSION attack
暂未订购
Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle
3
作者 杨芳丽 郭迎 +2 位作者 石金晶 王焕礼 潘矜矜 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期54-60,共7页
A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy A... A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator (LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection. 展开更多
关键词 continuous-variable quantum key distribution local oscillator intensity attack entanglement in the middle
原文传递
Cooperative guidance of seeker-less missile considering localization error 被引量:5
4
作者 Jianbo ZHAO Shuxing YANG Fenfen XIONG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第8期1933-1945,共13页
To perform an accurate fire-and-forget attack of seeker-less missile with the consideration of the localization error, a new cooperative guidance strategy of multi-missiles is proposed in this work. Firstly, an estima... To perform an accurate fire-and-forget attack of seeker-less missile with the consideration of the localization error, a new cooperative guidance strategy of multi-missiles is proposed in this work. Firstly, an estimated position of the seeker-less missile is carefully selected, based on which the slant angle of the line between the estimated and real positions of the seeker-less missile is approximately derived inspired by the localization theory of GPS(Global Position System).Then, respectively based on the guidance law considering the impact angle and time constraints, the consensus theory and the finite-time convergence approach, three cooperative guidance laws employing the previously obtained slant angle are derived for intensive attack to address either a stationary or maneuvering target. Simulation results well demonstrate the effectiveness and advantages of the proposed cooperative guidance strategy. 展开更多
关键词 Cooperative GUIDANCE Fire-and-forget INTENSIVE attack localization error MISSILE GUIDANCE Seeker-less
原文传递
Robust Image Watermarking Using Local Invariant Features and Independent Component Analysis 被引量:2
5
作者 ZHANG Hanling LIU Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1931-1934,共4页
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom... This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks. 展开更多
关键词 robust watermarking geometrical attack watermark synchronization local invariant features
在线阅读 下载PDF
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment 被引量:2
6
作者 Sanjeev Kumar Orifiel Gomez 《Journal of Information Security》 2010年第2期88-94,共7页
ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS ... ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer. 展开更多
关键词 ARP attack COMPUTER Network Security COMPUTER Systems DIRECT attack Distributed DENIAL of Service attackS (DDoS) Indirect attack local Area Networks
在线阅读 下载PDF
Lightweight jammer localization algorithm in wireless sensor networks
7
作者 成天桢 栗苹 朱森存 《Journal of Beijing Institute of Technology》 EI CAS 2013年第2期143-148,共6页
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr... In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions. 展开更多
关键词 jammer localization jamming attacks wireless sensor networks
在线阅读 下载PDF
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
8
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators 被引量:1
9
作者 Biao Huang Yongjun Zhu +2 位作者 Pu Tang Yongmei Huang Zhenming Peng 《Journal of Applied Mathematics and Physics》 2019年第11期2751-2759,共9页
Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecu... Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals. 展开更多
关键词 Continuous-Variable Quantum Key Distribution local Oscillator Reference Pulse PRACTICAL SECURITY Phase attack
在线阅读 下载PDF
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
10
作者 Nan Li Chunhe Xia +1 位作者 Yi Yang HaiQuan Wang 《Journal of Software Engineering and Applications》 2008年第1期76-82,共7页
This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based o... This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri-stage Gradual Multi-Sequence Alignment). With the inspiration of sequence alignment used in Bioinformatics, GASBSLA replaces global alignment and constant weight penalty model by local alignment and affine penalty model to improve the generality of attack signatures. TGMSA presents a new pruning policy to make the algorithm more insensitive to noises in the generation of attack signatures. In this paper, GASBSLA and TGMSA are described in detail and validated by experiments. 展开更多
关键词 attack SIGNATURES Generation Sequence local Alignment AFFINE PENALTY INTRUSION Detection PRUNING Policy
暂未订购
基于GBDT优化算法的多源网络攻击源定位研究
11
作者 卢燕 谢坚 +1 位作者 王飞 谌骅 《河南科技》 2025年第10期37-40,共4页
【目的】由于多源网络攻击手段多样且隐蔽,攻击者会利用多种技术手段进行伪装和隐藏,使得对攻击源头的定位变得异常困难。针对这一问题,提出了基于GBDT优化算法的多源网络攻击源定位方法。【方法】利用BPF技术实时捕获来自多元化网络数... 【目的】由于多源网络攻击手段多样且隐蔽,攻击者会利用多种技术手段进行伪装和隐藏,使得对攻击源头的定位变得异常困难。针对这一问题,提出了基于GBDT优化算法的多源网络攻击源定位方法。【方法】利用BPF技术实时捕获来自多元化网络数据源的数据包信息,将其作为输入数据,采用GBDT优化算法提取多源网络的运行特征,通过模式识别技术深入分析提取的特征向量,识别多源网络是否存在攻击行为。当存在攻击行为时,根据跳距追踪定位攻击源,完成多源网络攻击源定位。【结果】实验结果表明,该方法在包含4个攻击源的多源网络中,能够准确检测出所有攻击点,并精确定位,且所需收敛包数量最高不超过100个。【结论】该方法收敛速度较快,具有较高的定位准确性与效率,能够为网络安全防护提供有力的支持。 展开更多
关键词 GBDT优化算法 多源 网络 攻击源 定位
在线阅读 下载PDF
面向指纹室内定位的高鲁棒性集成对抗训练方法
12
作者 张学军 李梅 +1 位作者 陈惠 王国华 《通信学报》 北大核心 2025年第8期105-118,共14页
针对指纹室内定位模型容易遭受对抗样本攻击以及传统对抗训练资源开销大、泛化能力弱等问题,提出了一种基于数据增强与蒸馏技术的集成对抗防御方法EDEAD。该方法利用数据蒸馏技术改善增广数据的质量,融合提前停止算法节省训练成本,并引... 针对指纹室内定位模型容易遭受对抗样本攻击以及传统对抗训练资源开销大、泛化能力弱等问题,提出了一种基于数据增强与蒸馏技术的集成对抗防御方法EDEAD。该方法利用数据蒸馏技术改善增广数据的质量,融合提前停止算法节省训练成本,并引入相干性梯度对齐损失项增强子模型对抗响应一致性的同时保持模型间的多样性,以降低对抗样本在定位模型间的可转移性和提升整个室内定位系统的鲁棒性及泛化能力。实验结果表明,在抵御强大黑盒攻击时,EDEAD方法相比于传统高鲁棒性的集成策略GAL和DVERGE,分别节省了30.6%和26.1%的时间开销,同时提升了70.6%和28.3%的定位精度。这验证了所提EDEAD方法在保证高鲁棒性的同时实现了效率优化。 展开更多
关键词 室内定位 集成对抗训练 黑盒攻击 鲁棒性
在线阅读 下载PDF
基于共性伪造线索感知的物理和数字人脸攻击联合检测方法
13
作者 梁凤梅 潘正豪 刘阿建 《信息网络安全》 北大核心 2025年第10期1604-1614,共11页
人脸识别系统在实际应用中面临物理攻击与数字攻击的双重威胁。由于两类攻击存在显著异质性,通常需要依赖不同的模型分别应对。为了节约计算资源及硬件部署成本,针对物理攻击和数字攻击在特征空间中呈现显著分布差异且按攻击类型聚类的... 人脸识别系统在实际应用中面临物理攻击与数字攻击的双重威胁。由于两类攻击存在显著异质性,通常需要依赖不同的模型分别应对。为了节约计算资源及硬件部署成本,针对物理攻击和数字攻击在特征空间中呈现显著分布差异且按攻击类型聚类的特点,文章提出基于对比语言和图像预训练模型的物理和数字人脸攻击联合检测方法。首先,文章基于混合专家结构提出自适应特征提取模块,通过稀疏激活并结合共享分支实现攻击类型自适应的特征选择;然后,提出一种与攻击无关的可学习文本提示,探索物理和数字攻击的共性伪造线索,实现不同攻击特征簇的有效聚合;最后,引入残差自注意力机制,并设计了细粒度对齐损失,优化共性伪造线索提取过程。在UniAttackData和JFSFDB数据集的联合训练协议上的实验结果表明,相较于其他算法,该方法实现了较低的平均分类错误率。 展开更多
关键词 联合攻击检测 注意力机制 局部特征 深度学习 提示调优
在线阅读 下载PDF
恒流条件下三桩基础局部冲刷数值模拟
14
作者 刘钦 赵红宇 +4 位作者 余冰茜 张宁 王哲 刘磊 黄坤鹏 《哈尔滨工程大学学报》 北大核心 2025年第3期438-449,共12页
为研究不同水流攻角和桩间距对三桩局部冲刷的影响,本文采用计算流体动力学软件FLOW-3D,对恒流条件下砂质海床上等边三角布置的三桩基础进行了局部冲刷数值模拟。利用动量守恒方程、重整化群k-ε模型以及推移质和悬移质方程分别建立起... 为研究不同水流攻角和桩间距对三桩局部冲刷的影响,本文采用计算流体动力学软件FLOW-3D,对恒流条件下砂质海床上等边三角布置的三桩基础进行了局部冲刷数值模拟。利用动量守恒方程、重整化群k-ε模型以及推移质和悬移质方程分别建立起水动力模型和泥沙冲刷模型,用于模拟桩周的流场和局部冲刷。在进行数值模拟之前,利用冲刷试验对水动力模型和泥沙冲刷模型进行了验证,显示出良好的一致性。本文详细讨论了特定桩间距和水流攻角下三桩周围的局部冲刷特性。结果表明:三桩基础的局部冲刷存在着最优桩间距、最不利桩间距和最不利水流攻角。为减小局部冲刷对基础的影响,在三桩及多桩基础的设计施工中,应当根据水流方向合理选择各桩位布置。 展开更多
关键词 海上风电 三桩基础 局部冲刷 冲刷特性 桩间距 水流攻角 数值模拟
在线阅读 下载PDF
抗攻击的联邦学习隐私保护算法 被引量:2
15
作者 吴若岚 陈玉玲 +2 位作者 豆慧 张洋文 龙钟 《计算机工程》 北大核心 2025年第2期179-187,共9页
联邦学习作为新兴的分布式学习框架,允许多个客户端在不共享原始数据的情况下共同进行全局模型的训练,从而有效保护了数据隐私。然而,传统联邦学习仍然存在潜在的安全隐患,容易受到中毒攻击和推理攻击的威胁。因此,为了提高联邦学习的... 联邦学习作为新兴的分布式学习框架,允许多个客户端在不共享原始数据的情况下共同进行全局模型的训练,从而有效保护了数据隐私。然而,传统联邦学习仍然存在潜在的安全隐患,容易受到中毒攻击和推理攻击的威胁。因此,为了提高联邦学习的安全性和模型性能,需要准确地识别恶意客户端的行为,同时采用梯度加噪的方法来避免攻击者通过监控梯度信息来获取客户端的数据。结合恶意客户端检测机制和本地差分隐私技术提出了一种鲁棒的联邦学习框架。该算法首先利用梯度相似性来判断和识别潜在的恶意客户端,减小对模型训练任务产生的不良影响;其次,根据不同查询的敏感性以及用户的个体隐私需求,设计一种基于动态隐私预算的本地差分隐私算法,旨在平衡隐私保护和数据质量之间的权衡。在MNIST、CIFAR-10和MR文本分类数据集上的实验结果表明,与3种基准算法相比,该算法在准确性方面针对sP类客户端平均提高了3百分点,实现了联邦学习中更高的安全性水平,显著提升了模型性能。 展开更多
关键词 联邦学习 中毒攻击 推理攻击 本地差分隐私 隐私保护
在线阅读 下载PDF
深度强化学习认知不确定性的扰动生成方法 被引量:1
16
作者 许莉 柴霁轩 +2 位作者 常雨晴 宛旭 范纯龙 《计算机工程与设计》 北大核心 2025年第5期1349-1355,共7页
针对现有的强化学习攻击算法在攻击过程中由于扰动值过大易被察觉的问题,提出一种不确定性攻击算法UCA(uncertainty attack)。由于在强化学习场景中不确定性随处可见且是影响最终奖励的重要原因,利用该特点,从模型的最终概率输出中量化... 针对现有的强化学习攻击算法在攻击过程中由于扰动值过大易被察觉的问题,提出一种不确定性攻击算法UCA(uncertainty attack)。由于在强化学习场景中不确定性随处可见且是影响最终奖励的重要原因,利用该特点,从模型的最终概率输出中量化认知不确定性梯度,结合多边缘损失函数,以更少的迭代次数生成更隐蔽且高效的对抗样本。在Atari的6款游戏场景上进行了实验,其结果表明,UCA攻击算法在每次迭代中扰动更少数量的像素,可达到相同甚至更好的扰动效果。 展开更多
关键词 对抗攻击 深度强化学习 不确定性 安全性 神经网络 对抗样本 局部攻击
在线阅读 下载PDF
基于敏感区域的双掩码集合对抗攻击研究
17
作者 闫振豪 张晓琳 王永平 《内蒙古科技大学学报》 2025年第1期92-96,共5页
在黑盒场景下,现有集合攻击方法的迁移性能有限,大多数方法对整个图像添加扰动,容易破坏平滑背景,降低对抗样本的不可感知性。针对迁移性与不可感知性难以兼顾的问题,提出了一种基于敏感区域的双掩码集合对抗攻击方法。该方法通过融合... 在黑盒场景下,现有集合攻击方法的迁移性能有限,大多数方法对整个图像添加扰动,容易破坏平滑背景,降低对抗样本的不可感知性。针对迁移性与不可感知性难以兼顾的问题,提出了一种基于敏感区域的双掩码集合对抗攻击方法。该方法通过融合集合中每个代理模型的敏感区域,并利用硬掩码限制扰动区域。这种局部攻击策略减少了对平滑背景的修改,提高了对抗样本的不可感知性。同时,设计了特征正则化模块,利用软掩码筛选攻击特征,避免攻击陷入局部最优,提高了对抗样本的迁移性。在不同数据集上的实验结果表明,所提方法生成的对抗样本在黑盒模型中的攻击效果和不可感知性优于现有的集合攻击方法。 展开更多
关键词 对抗样本 集合攻击 局部攻击 迁移性 不可感知性
在线阅读 下载PDF
面向中文的多层次扰动定位文本对抗样本生成方法
18
作者 侯彦 车蕾 李慧 《计算机工程》 北大核心 2025年第7期232-243,共12页
为提升中文领域黑盒攻击下生成对抗样本过程中扰动定位精度,并解决现有方法在词重要度评估中忽视上下文关联度和语义密度的问题,提出一种具有多层次扰动定位能力的中文文本对抗样本生成方法(MDLM)。首先,通过整合多源异构深度学习模型,... 为提升中文领域黑盒攻击下生成对抗样本过程中扰动定位精度,并解决现有方法在词重要度评估中忽视上下文关联度和语义密度的问题,提出一种具有多层次扰动定位能力的中文文本对抗样本生成方法(MDLM)。首先,通过整合多源异构深度学习模型,构建一套融合不同特征提取能力的多层次判定模型;其次,在词重要度评估上新增3种评估函数,从多个维度评估词的重要度;最后,通过多层次判定模型与评估函数共同作用实现对原始文本扰动点的精准定位。在文本对抗样本生成策略上,MDLM融合了繁体字、拼音、多音词、同音词等多种文本替换策略,旨在确保攻击成功率的同时,提升生成对抗样本的多样性。实验结果显示,MDLM在多个数据集上针对多个目标模型进行攻击时扰动效果显著,最高攻击扰动率达到了43.5%,进一步增强了对抗样本的攻击能力。同时,针对多层次扰动定位能力的消融实验结果显示,将评估函数与判定模型进行多层次组合可以显著提高生成对抗样本的攻击效果。 展开更多
关键词 黑盒攻击 扰动定位 判定模型 词重要度评估 对抗样本生成
在线阅读 下载PDF
本地差分隐私频率估计伪数据攻击及防御方法
19
作者 王源源 朱友文 +2 位作者 吴启晖 王威 王箭 《软件学报》 北大核心 2025年第5期2212-2228,共17页
本地差分隐私被广泛地应用于保护用户隐私的同时收集和分析敏感数据,但是也易于受到恶意用户的伪数据攻击.子集选择机制和环机制是具有最优效用的频率估计本地差分隐私方案,然而,它们的抗伪数据攻击能力尚缺少深入地分析和评估.因此,针... 本地差分隐私被广泛地应用于保护用户隐私的同时收集和分析敏感数据,但是也易于受到恶意用户的伪数据攻击.子集选择机制和环机制是具有最优效用的频率估计本地差分隐私方案,然而,它们的抗伪数据攻击能力尚缺少深入地分析和评估.因此,针对子集选择机制和环机制,设计伪数据攻击方法,以评估其抗伪造攻击的能力.首先讨论随机扰动攻击和随机项目攻击,然后构建针对子集选择机制和环机制的攻击效用最大化伪数据攻击方法.攻击者可以利用该攻击方法,通过假用户向数据收集方发送精心制作的伪数据,最大化地提高攻击者所选目标值的频率.理论上严格分析和对比攻击效用,并通过实验评估伪数据攻击效果,展示伪数据攻击对子集选择机制和环机制的影响.最后,提出防御措施,可缓解伪数据攻击的效果. 展开更多
关键词 本地差分隐私 伪数据攻击 防御 子集选择机制 环机制
在线阅读 下载PDF
基于消除语义特征的图像篡改定位模型对抗攻击
20
作者 蒋伟豪 刘波 《计算机科学》 北大核心 2025年第S2期839-845,共7页
目前,公众对于日新月异的图像篡改技术越来越担忧,因为它会引发伦理和安全问题。利用深度神经网络可以定位图像篡改区域。然而,随着深度神经网络的发展,针对它的对抗性攻击也层出不穷,这些攻击方法也促进了模型的鲁棒性研究。现有的对... 目前,公众对于日新月异的图像篡改技术越来越担忧,因为它会引发伦理和安全问题。利用深度神经网络可以定位图像篡改区域。然而,随着深度神经网络的发展,针对它的对抗性攻击也层出不穷,这些攻击方法也促进了模型的鲁棒性研究。现有的对抗攻击方法主要关注篡改痕迹特征,然而不同图像篡改定位模型关注的篡改痕迹特征有所不同,导致对抗攻击的迁移能力不足。由于卷积神经网络或Transformer网络也能够提取语义特征,而图像篡改定位模型往往将这些模型作为基线模型,因此模型在提取篡改特征时会不可避免地提取到部分语义特征。为了提高对抗样本的泛化能力,提出一种攻击方法,重点关注消除篡改图像的语义特征,训练一个语义分割网络作为攻击目标,提出一种攻击中间语义特征的损失函数,使得模型难以识别出图像篡改部分的语义信息。这种攻击方法具有较高的迁移能力,可以更好地隐藏扰动并生成更具攻击性的对抗样本,在多种实验下被证明可以攻击绝大多数现有模型并优于其他对抗攻击方法,并为图像篡改定位任务提供了更新颖的见解。 展开更多
关键词 对抗攻击 深度学习 图像篡改定位
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部