Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "interpolation attack"
@article{DBLP:journals/corr/abs-2402-16586, author = {Kefu Guo and Fengfan Zhou and Hefei Ling and Ping Li and Hui Liu}, title = {Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing}, journal = {CoRR}, volume = {abs/2402.16586}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.16586}, doi = {10.48550/ARXIV.2402.16586}, eprinttype = {arXiv}, eprint = {2402.16586}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-16586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWHZZ23, author = {Xinlei Wang and Xiaojuan Wang and Mingshu He and Min Zhang and Zhao Zhang}, title = {A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5272--5285}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3268882}, doi = {10.1109/TIFS.2023.3268882}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangWHZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06540, author = {Junpei Liao and Zhikai Chen and Liang Yi and Wenyuan Yang and Baoyuan Wu and Xiaochun Cao}, title = {Inter-frame Accelerate Attack against Video Interpolation Models}, journal = {CoRR}, volume = {abs/2305.06540}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06540}, doi = {10.48550/ARXIV.2305.06540}, eprinttype = {arXiv}, eprint = {2305.06540}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/AlmseidinA22, author = {Mohammad Almseidin and Mouhammd Alkasassbeh}, title = {An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method}, journal = {Inf.}, volume = {13}, number = {6}, pages = {300}, year = {2022}, url = {https://doi.org/10.3390/info13060300}, doi = {10.3390/INFO13060300}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/AlmseidinA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/XuHF0P22, author = {Jisheng Xu and Zhiyu He and Chongrong Fang and Jianping He and Yunfeng Peng}, title = {Inference Attack in Distributed Optimization via Interpolation and Manipulation}, booktitle = {61st {IEEE} Conference on Decision and Control, {CDC} 2022, Cancun, Mexico, December 6-9, 2022}, pages = {2250--2255}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CDC51059.2022.9993236}, doi = {10.1109/CDC51059.2022.9993236}, timestamp = {Wed, 18 Jan 2023 15:37:37 +0100}, biburl = {https://dblp.org/rec/conf/cdc/XuHF0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouZDJM21, author = {Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier}, title = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff}, journal = {Comput. J.}, volume = {64}, number = {4}, pages = {628--638}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa101}, doi = {10.1093/COMJNL/BXAA101}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouZDJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/NaikSJS21, author = {Nitin Naik and Changjing Shang and Paul Jenkins and Qiang Shen}, title = {Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {38}, number = {5}, year = {2021}, url = {https://doi.org/10.1111/exsy.12557}, doi = {10.1111/EXSY.12557}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/NaikSJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasII/ChenXZML21, author = {Jinyin Chen and Hui Xiong and Haibin Zheng and Zhaoyan Ming and Yi Liu}, title = {Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {68}, number = {7}, pages = {2670--2674}, year = {2021}, url = {https://doi.org/10.1109/TCSII.2021.3061154}, doi = {10.1109/TCSII.2021.3061154}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcasII/ChenXZML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/Al-KasassbehAAK20, author = {Mouhammd Al{-}Kasassbeh and Mohammad Almseidin and Khaled Alrfou and Szilveszter Kov{\'{a}}cs}, title = {Detection of IoT-botnet attacks using fuzzy rule interpolation}, journal = {J. Intell. Fuzzy Syst.}, volume = {39}, number = {1}, pages = {421--431}, year = {2020}, url = {https://doi.org/10.3233/JIFS-191432}, doi = {10.3233/JIFS-191432}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/Al-KasassbehAAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intap/SinghR020, author = {Jag Mohan Singh and Raghavendra Ramachandra and Christoph Busch}, editor = {Sule Yildirim Yayilgan and Imran Sarwar Bajwa and Filippo Sanfilippo}, title = {Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection}, booktitle = {Intelligent Technologies and Applications - Third International Conference, {INTAP} 2020, Gj{\o}vik, Norway, September 28-30, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1382}, pages = {203--214}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71711-7\_17}, doi = {10.1007/978-3-030-71711-7\_17}, timestamp = {Tue, 16 Aug 2022 16:54:22 +0200}, biburl = {https://dblp.org/rec/conf/intap/SinghR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouZDJM20, author = {Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier}, title = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2020}, url = {https://eprint.iacr.org/2020/781}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouZDJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Kell19, author = {Christian Kell}, title = {A Structure-based Attack on the Linearized Braid Group-based Diffie-Hellman Conjugacy Problem in Combination with an Attack using Polynomial Interpolation and the Chinese Remainder Theorem}, school = {University of Passau, Germany}, year = {2019}, url = {https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/647}, urn = {urn:nbn:de:bvb:739-opus4-6476}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Kell19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/Pan19, author = {Jonathan Pan}, title = {Physical Integrity Attack Detection of Surveillance Camera with Deep Learning based Video Frame Interpolation}, booktitle = {2019 {IEEE} International Conference on Internet of Things and Intelligence System, IoTaIS 2019, Bali, Indonesia, November 5-7, 2019}, pages = {79--85}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IoTaIS47347.2019.8980385}, doi = {10.1109/IOTAIS47347.2019.8980385}, timestamp = {Mon, 09 Mar 2020 13:24:15 +0100}, biburl = {https://dblp.org/rec/conf/iotais/Pan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LiP19, author = {Chaoyun Li and Bart Preneel}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {171--193}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_8}, doi = {10.1007/978-3-030-38471-5\_8}, timestamp = {Tue, 07 May 2024 20:12:23 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-06475, author = {Jonathan Pan}, title = {Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation}, journal = {CoRR}, volume = {abs/1906.06475}, year = {2019}, url = {http://arxiv.org/abs/1906.06475}, eprinttype = {arXiv}, eprint = {1906.06475}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-06475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiP19, author = {Chaoyun Li and Bart Preneel}, title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2019}, url = {https://eprint.iacr.org/2019/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DinurLMW15, author = {Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Optimized Interpolation Attacks on LowMC}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {535--560}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_22}, doi = {10.1007/978-3-662-48800-3\_22}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DinurLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurLMW15, author = {Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang}, title = {Optimized Interpolation Attacks on LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2015}, url = {http://eprint.iacr.org/2015/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoH14, author = {Weiwei Cao and Lei Hu}, title = {Projective interpolation of polynomial vectors and improved key recovery attack on {SFLASH}}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {719--730}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9819-2}, doi = {10.1007/S10623-013-9819-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaoH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiuCZ13, author = {Jingmei Liu and Shaopeng Chen and Linsen Zhao}, title = {Lagrange Interpolation Attack against 6 Rounds of Rijndael-128}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {652--655}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.122}, doi = {10.1109/INCOS.2013.122}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiuCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShresthaHMPS11, author = {Pradhumna Shrestha and Michael Hempel and Tao Ma and Dongming Peng and Hamid Sharif}, title = {A general attack method for steganography removal using Pseudo-CFA re-interpolation}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {454--459}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148481/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShresthaHMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Canniere11e, author = {Christophe De Canni{\`{e}}re}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Interpolation Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {620}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_584}, doi = {10.1007/978-1-4419-5906-5\_584}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Canniere11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaID05, author = {Kaoru Kurosawa and Tetsu Iwata and Quang Viet Duong}, title = {How to Improve Interpolation Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {9--15}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_9\&category=D\&year=2005\&lang=E\&abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaID05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Canniere05e, author = {Christophe De Canni{\`{e}}re}, editor = {Henk C. A. van Tilborg}, title = {Interpolation Attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_203}, doi = {10.1007/0-387-23483-7\_203}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Canniere05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/SuKH01, author = {Karen Su and Deepa Kundur and Dimitrios Hatzinakos}, title = {A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks}, booktitle = {Proceedings of the 2001 International Conference on Image Processing, {ICIP} 2001, Thessaloniki, Greece, October 7-10, 2001}, pages = {818--821}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICIP.2001.959171}, doi = {10.1109/ICIP.2001.959171}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/SuKH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoussefG00, author = {Amr M. Youssef and Guang Gong}, editor = {Bruce Schneier}, title = {On the Interpolation Attacks on Block Ciphers}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {109--120}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_8}, doi = {10.1007/3-540-44706-7\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoussefG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KurosawaIQ00, author = {Kaoru Kurosawa and Tetsu Iwata and Quang Viet Duong}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Root Finding Interpolation Attack}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {303--314}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_22}, doi = {10.1007/3-540-44983-3\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KurosawaIQ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MoriaiSK99, author = {Shiho Moriai and Takeshi Shimoyama and Toshinobu Kaneko}, editor = {Lars R. Knudsen}, title = {Interpolation Attacks of the Block Cipher: {SNAKE}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {275--289}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_20}, doi = {10.1007/3-540-48519-8\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/MoriaiSK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Aoki99, author = {Kazumaro Aoki}, editor = {Howard M. Heys and Carlisle M. Adams}, title = {Efficient Evaluation of Security against Generalized Interpolation Attack}, booktitle = {Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1758}, pages = {135--146}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46513-8\_10}, doi = {10.1007/3-540-46513-8\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Aoki99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobsenK97, author = {Thomas Jakobsen and Lars R. Knudsen}, editor = {Eli Biham}, title = {The Interpolation Attack on Block Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {28--40}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052332}, doi = {10.1007/BFB0052332}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobsenK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.