DeepAI AI Chat
Log In Sign Up

Vulnerability of Complex Networks in Center-Based Attacks

12/12/2017
by   Kannan Balakrishnan, et al.
0

We study the vulnerability of synthetic as well as real-world networks in center-based attacks. These attacks are node-removal attacks which involve identifying the central node set and removing them from the network.

READ FULL TEXT

page 1

page 2

page 3

page 4

10/11/2022

Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger

In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- ...
06/02/2019

Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning

A membership inference attack (MIA) against a machine learning model ena...
08/04/2021

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

This work proposes a new class of proactive attacks called the Informati...
08/20/2019

Node Overlap Removal Algorithms: A Comparative Study

Many algorithms have been designed to remove node overlapping, and many ...
01/22/2022

Long-term Data Sharing under Exclusivity Attacks

The quality of learning generally improves with the scale and diversity ...
09/09/2023

Towards Robust Model Watermark via Reducing Parametric Vulnerability

Deep neural networks are valuable assets considering their commercial be...
07/20/2018

TCP SYN Cookie Vulnerability

TCP SYN Cookies were implemented to mitigate against DoS attacks. It ens...