Vulnerability of Complex Networks in Center-Based Attacks

12/12/2017
by   Kannan Balakrishnan, et al.
0

We study the vulnerability of synthetic as well as real-world networks in center-based attacks. These attacks are node-removal attacks which involve identifying the central node set and removing them from the network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/11/2022

Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger

In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- ...
research
06/02/2019

Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning

A membership inference attack (MIA) against a machine learning model ena...
research
08/04/2021

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

This work proposes a new class of proactive attacks called the Informati...
research
08/20/2019

Node Overlap Removal Algorithms: A Comparative Study

Many algorithms have been designed to remove node overlapping, and many ...
research
01/22/2022

Long-term Data Sharing under Exclusivity Attacks

The quality of learning generally improves with the scale and diversity ...
research
09/09/2023

Towards Robust Model Watermark via Reducing Parametric Vulnerability

Deep neural networks are valuable assets considering their commercial be...
research
07/20/2018

TCP SYN Cookie Vulnerability

TCP SYN Cookies were implemented to mitigate against DoS attacks. It ens...

Please sign up or login with your details

Forgot password? Click here to reset