Results 1 - 10
of
332
Worst case attack on quantization based data hiding
- in Proceedings of the 8th IEEE International Symposium on Multimedia (ISM
, 2006
"... Currently, most quantization based data hiding al-gorithms are built assuming specific distributions of at-tacks, such as additive white Gaussian noise (AWGN), uniform noise, and so on. In this paper, we prove that the worst case additive attack for quantization based data hiding is a 3-δ function. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Currently, most quantization based data hiding al-gorithms are built assuming specific distributions of at-tacks, such as additive white Gaussian noise (AWGN), uniform noise, and so on. In this paper, we prove that the worst case additive attack for quantization based data hiding is a 3-δ function
WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES
"... This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri an ..."
Abstract
-
Cited by 15 (6 self)
- Add to MetaCart
This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri
Author manuscript, published in "IEEE International Workshop on Information Forensics and Security (2009)" WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES
, 2010
"... This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri an ..."
Abstract
- Add to MetaCart
This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri
A Worst-Case Worm
, 2004
"... Worms represent a substantial economic threat to the U.S. computing infrastructure. An important question is how much damage might be caused, as this figure can serve as a guide to evaluating how much to spend on defenses. We construct a parameterized worst-case analysis based on a simple damage mod ..."
Abstract
-
Cited by 32 (1 self)
- Add to MetaCart
model, combined with our understanding of what an attack could accomplish. Although our estimates are at best approximations, we speculate that a plausible worst-case worm could cause $50 billion or more in direct economic damage by attacking widelyused services in Microsoft Windows and carrying a
Worst-case background knowledge for privacy-preserving . . .
- IN ICDE
, 2007
"... Recent work has shown the necessity of considering an attacker’s background knowledge when reasoning about privacy in data publishing. However, in practice, the data publisher does not know what background knowledge the attacker possesses. Thus, it is important to consider the worst-case. In this pa ..."
Abstract
-
Cited by 96 (1 self)
- Add to MetaCart
Recent work has shown the necessity of considering an attacker’s background knowledge when reasoning about privacy in data publishing. However, in practice, the data publisher does not know what background knowledge the attacker possesses. Thus, it is important to consider the worst-case
Gaussian Estimation under Attack Uncertainty
"... Abstract—We consider the estimation of a standard Gaussian random variable under an observation attack where an adversary may add a zero mean Gaussian noise with variance in a bounded, closed interval to an otherwise noiseless observation. A straightforward approach would entail either ignoring the ..."
Abstract
- Add to MetaCart
the attack and simply using an optimal estimator under normal operation or taking the worst-case attack into account and using a minimax estimator that minimizes the cost under the worst-case attack. In contrast, we seek to characterize the optimal tradeoff between the MSE under normal operation and the MSE
Worst Case Additive Attack against Quantization-Based Data-Hiding Methods
, 2005
"... The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known as ..."
Abstract
-
Cited by 13 (4 self)
- Add to MetaCart
The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known
Automated Determination of Worst-case Design Scenarios
"... This paper describes readily available techniques for auto-mating the search for worst-case (e.g., “hot case”, “cold case”) design scenarios using only modest computational resources. These methods not only streamline a repetitive yet crucial task, they usually produce better results. The problems w ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This paper describes readily available techniques for auto-mating the search for worst-case (e.g., “hot case”, “cold case”) design scenarios using only modest computational resources. These methods not only streamline a repetitive yet crucial task, they usually produce better results. The problems
Detection and Performance Analysis of Greedy Individual and Colluding MAC Layer Attackers
"... Abstract — Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the problem of misbehavior detection at the MAC layer, focusing on the b ..."
Abstract
- Add to MetaCart
on the back-off manipulation by colluding selfish nodes. We cast the problem within a minimax robust detection framework, providing a detection rule of optimum performance for the worst-case attack. We analyze the effects of a single optimal attacker with respect to the detection delay and average number
Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids
"... Abstract—This paper generalizes Benders decomposition to maximize a nonconcave objective function and uses that decomposition to solve an “electric power grid interdiction problem.” Under one empirically verified assumption, the solution to this bilevel optimization problem identifies a set of compo ..."
Abstract
-
Cited by 33 (1 self)
- Add to MetaCart
of components, limited by cardinality or “interdiction resource, ” whose destruction maximizes economic losses to customers (and can thereby guide defensive measures). The decomposition subproblem typically incorporates a set of dc optimal power-flow models that cover various states of repair after an attack
Results 1 - 10
of
332