Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection, and adversarial removal. The first… More >

  • Open Access

    ARTICLE

    A LARGE PARAMETER SPECTRAL PERTURBATION METHOD FOR NONLINEAR SYSTEMS OF PARTIAL DIFFERENTIAL EQUATIONS THAT MODELS BOUNDARY LAYER FLOW PROBLEMS

    T. M. Agbajea,b, S. S. Motsaa,* , S. Mondalc,† , P. Sibandaa

    Frontiers in Heat and Mass Transfer, Vol.9, pp. 1-13, 2017, DOI:10.5098/hmt.9.36

    Abstract In this work, we present a compliment of the spectral perturbation method (SPM) for solving nonlinear partial differential equations (PDEs) with applications in fluid flow problems. The (SPM) is a series expansion based approach that uses the Chebyshev spectral collocation method to solve the governing sequence of differential equation generated by the perturbation series approximation. Previously the SPM had the limitation of being used to solve problems with small parameters only. This current investigation seeks to improve the performance of the SPM by doing the series expansion about a large parameter. The new method namely the large parameter spectral perturbation… More >

  • Open Access

    ARTICLE

    A STUDY OF MAGNETIC EFFECT ON FLOW BETWEEN TWO PLATES WITH SUCTION OR INJECTION WITH SPECIAL REFERENCE TO CASSON FLUID

    V. S. Sampath Kumar, N. P. Pai

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-9, 2019, DOI:10.5098/hmt.12.23

    Abstract The present paper encorporates the effet of magnetic field on the incompressible Casson fluid flow between two parallel infinite rectangular plates approaching towards or away from each other with suction or injection at the porous plates. Using similarity transformations the governing Navier-Stokes equations are reduced to a nonlinear ordinary differential equation. Semi-analytical solution is obtained based on the Homotopy perturbation method. Further, the solution is compared with the classical finite difference method separately. The effect of magnetic field on velocity, skin friction and pressure is analysed on flow between two plates with suction or injection, where two plates moving towards… More >

  • Open Access

    ARTICLE

    HEAT TRANSFER ANALYSIS OF MHD CASSON FLUID FLOW BETWEEN TWO POROUS PLATES WITH DIFFERENT PERMEABILITY

    V.S. Sampath Kumar, N.P. Pai , B. Devaki

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-13, 2023, DOI:10.5098/hmt.20.30

    Abstract In the present study, we consider Casson fluid flow between two porous plates with permeability criteria in the presence of heat transfer and magnetic effect. A proper set of similarity transformations simplify the Navier-Stokes equations to non-linear ODEs with boundary conditions. The homotopy perturbation method is an efficient and stable method which is used to get solutions. Further, the results obtained are compared with the solution computed through an effective and efficient finite difference approach. The purpose of this analysis is to study the four different cases arise viz: suction, injection, mixed suction and mixed injection in this problem, along… More >

  • Open Access

    ARTICLE

    Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification

    Jiangchuan Li, Peisong He*, Jiayong Liu, Jie Luo, Qiang Xia

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4893-4915, 2023, DOI:10.32604/cmc.2023.036819

    Abstract Steganography techniques, such as audio steganography, have been widely used in covert communication. However, the deep neural network, especially the convolutional neural network (CNN), has greatly threatened the security of audio steganography. Besides, existing adversarial attacks-based countermeasures cannot provide general perturbation, and the transferability against unknown steganography detection methods is weak. This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues. Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation, which applies adversarial attack techniques, such as Deepfool. Moreover, the sample diversification strategy is designed to improve… More >

  • Open Access

    ARTICLE

    ANALYSIS OF MHD FLOW AND HEAT TRANSFER OF LAMINAR FLOW BETWEEN POROUS DISKS

    V. S. Sampath Kumara , N. P. Paia,† , B. Devakia

    Frontiers in Heat and Mass Transfer, Vol.16, pp. 1-7, 2021, DOI:10.5098/hmt.16.3

    Abstract A study is carried out for the two dimensional laminar flow of conducting fluid in presence of magnetic field. The governing non-linear equations of motion are transformed in to dimensionaless form. A solution is obtained by homotopy perturbation method and it is valid for moderately large Reynolds numbers for injection at the wall. Also an efficient algorithm based finite difference scheme is developed to solve the reduced coupled ordinary differential equations with necessary boundary conditions. The effects of Reynolds number, the magnetic parameter and the pradantle number on flow velocity and tempratare distribution is analysed by both the methods and… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

  • Open Access

    ARTICLE

    Ensemble Classifier Design Based on Perturbation Binary Salp Swarm Algorithm for Classification

    Xuhui Zhu1,3, Pingfan Xia1,3, Qizhi He2,4,*, Zhiwei Ni1,3, Liping Ni1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 653-671, 2023, DOI:10.32604/cmes.2022.022985

    Abstract Multiple classifier system exhibits strong classification capacity compared with single classifiers, but they require significant computational resources. Selective ensemble system aims to attain equivalent or better classification accuracy with fewer classifiers. However, current methods fail to identify precise solutions for constructing an ensemble classifier. In this study, we propose an ensemble classifier design technique based on the perturbation binary salp swarm algorithm (ECDPB). Considering that extreme learning machines (ELMs) have rapid learning rates and good generalization ability, they can serve as the basic classifier for creating multiple candidates while using fewer computational resources. Meanwhile, we introduce a combined diversity measure… More >

  • Open Access

    ARTICLE

    Unsteady Flow and Heat Transfer of a Casson Micropolar Nanofluid over a Curved Stretching/Shrinking Surface

    Muhammad A. Sadiq1,2,*, Nadeem Abbas3, Haitham M. S. Bahaidarah4, Mohammad Amjad5

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 471-486, 2023, DOI:10.32604/fdmp.2022.021133

    Abstract We present the results of an investigation into the behavior of the unsteady flow of a Casson Micropolar nanofluid over a shrinking/stretching curved surface, together with a heat transfer analysis of the same problem. The body force acting perpendicular to the surface wall is in charge of regulating the fluid flow rate. Curvilinear coordinates are used to account for the considered curved geometry and a set of balance equations for mass, momentum, energy and concentration is obtained accordingly. These are turned into ordinary differential equations using a similarity transformation. We show that these equations have dual solutions for a number… More >

  • Open Access

    VIEWPOINT

    Long term immunological perturbations post DAA therapy in chronic HCV/HIV co-infected patients

    SONIA MORETTI, FLAVIA MANCINI, ALESSANDRA BORSETTI*

    BIOCELL, Vol.46, No.12, pp. 2695-2699, 2022, DOI:10.32604/biocell.2022.022257

    Abstract Direct-acting antiviral (DAA) therapies are efficacious for the achievement of sustained virologic response (SVR) in almost all treated hepatitis C virus (HCV)-infected patients. However, the impacts of HCV eradication on immune function and chronic immune activation in the long-term remain controversial and limited, especially in patients co-infected with human immunodeficiency virus (HIV). Indeed, although restoration of many immune responses clearly can be observed, several features of immune perturbations persist over time after HCV clearance. Understanding the degree and reasons of the partial recovery of the immune system in chronic HCV/HIV co-infection after HCV elimination is pivotal to avoid disease progression… More >

Displaying 1-10 on page 1 of 56. Per Page