• Title/Summary/Keyword: Noise Attack

Search Result 136, Processing Time 0.025 seconds

Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method (연속 웨이블릿 변환을 사용한 비프로파일링 기반 전력 분석 공격)

  • Bae, Daehyeon;Lee, Jaewook;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1127-1136
    • /
    • 2021
  • In the field of power analysis attacks, electrical noise and misalignment of the power consumption trace are the major factors that determine the success of the attack. Therefore, several studies have been conducted to overcome this problem, and one of them is a signal processing method based on wavelet transform. Up to now, discrete wavelet transform, which can compress the trace, has been mostly used for power side-channel power analysis because continuous wavelet transform techniques increase data size and analysis time, and there is no efficient scale selection method. In this paper, we propose an efficient scale selection method optimized for power analysis attacks. Furthermore, we show that the analysis performance can be greatly improved when using the proposed method. As a result of the CPA(Correlation Power Analysis) and DDLA(Differential Deep Learning Analysis) experiments, which are non-profiling attacks, we confirmed that the proposed method is effective for noise reduction and trace alignment.

Optimal Shape of Blunt Device for High Speed Vehicle

  • Rho, Joo-Hyun;Jeong, Seongmin;Kim, Kyuhong
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.3
    • /
    • pp.285-295
    • /
    • 2016
  • A contact strip shape of a high speed train pantograph system was optimized with CFD to increase the aerodynamic performance and stability of contact force, and the results were validated by a wind tunnel test. For design of the optimal contact strip shape, a Kriging model and genetic algorithm were used to ensure the global search of the optimal point and reduce the computational cost. To enhance the performance and robustness of the contact strip for high speed pantograph, the drag coefficient and the fluctuation of the lift coefficient along the angle of attack were selected as design objectives. Aerodynamic forces were measured by a load cell and HWA (Hot Wire Anemometer) was used to measure the Strouhal number of wake flow. PIV (Particle Image Velocimetry) was adopted to visualize the flow fields. The optimized contact strip shape was shown a lower drag with smaller fluctuation of vertical lift force than the general shaped contact strip. And the acoustic noise source strength of the optimized contact strip was also reduced. Finally, the reduction amount of drag and noise was assessed when the optimized contact strip was applied to three dimensional pantograph system.

Interference Pattern Analysis of the Radiated Noise in Submarine Passive Sonar (잠수함 수동소나에서 방사소음의 간섭패턴 분석)

  • Kim, ByoungUk;An, SangKyum;Lee, Kuenhwa;Seong, WooJae;Hahn, JooYoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.456-464
    • /
    • 2013
  • Passive sonar in submarine can detect the target in long range and can attack using it. There are many noises which can be received at passive sonar of submarine. When noise received in the sonar it make diverse interference pattern depend on the ocean ambient and movement scenario. Interference pattern can be explained by theory of waveguide invariant. In this paper, analyze the interference pattern according to the relative motions of surface ship and submarine. And analyze the occurrence reason of 2 kinds of interference patterns those are usually display on the submarine console. The results show that if relative speed of submarine and target increase then gradient of interference pattern will increase. And closest point approach of submarine and target decrease then gradient of interference pattern will increase. Bathtube pattern usually appear when target pass though close to submarine and Pinetree pattern appear target pass though above of submarine.

The Word Recognition Score According to Release Time on Automatic Gain Control (자동이득 조절에서 해제시간에 따른 어음인지점수 변화)

  • Hwang, S.M.;Jeon, Y.Y.;Park, H.J.;Song, Y.R.;Lee, S.M.
    • Journal of Biomedical Engineering Research
    • /
    • v.31 no.5
    • /
    • pp.385-394
    • /
    • 2010
  • Automatic gain control(AGC) is used in hearing aids to compensate for the hearing level as to reduced dynamic range. AGC is consisted of the main 4 factors which are compression threshold, compression ratio, attack time, and release time. This study especially focus on each individual need for optimum release time parameters that can be changed within 7 certain range such as 12, 64, 128, 512, 2094, and 4096ms. To estimate the effect of various release time in AGC, twelve normal hearing and twelve hearing impaired listeners are participated. The stimuli are used by one syllable and sentence which have the same acoustic energy respectively. Then, each of score of the word recognition score is checked in quiet and noise conditions. As a result, it is verified that most people have the different best recognition score on specific release time. Also, if hearing aids is set by the optimum release time in each person, it is helpful in speech recognition and discrimination.

Application of Flexible-Type Sintered Brake Pads (플렉서블 타입 소결 브레이크 패드의 적용 연구)

  • Kim, Soung-Kwon;Kim, Sang-Ho;Kwon, Seok-Jin;Lee, Hi-Sung
    • Tribology and Lubricants
    • /
    • v.27 no.1
    • /
    • pp.19-24
    • /
    • 2011
  • Metallic sintered brake pads are often applied to mid/high speed train due to their high strength and thermal characteristics. Imbalance contact between discs and pads can greatly influence the life span, one sided wear, discs attack/crack and threat the safety of the train during operation. In this research, we analyzed pressure/temperature distribution between brake pads and disks. Analyzed data had been verified and modified to conduct further tests of flexible brake pads with small/full-scale dynamo test. Flexible brake pads were installed to high speed train to conduct further tests to identify the differences between rigid brake pads and flexible brake pads. In result, Flexible brake pads showed outstanding disk thermal stability, one sided wear, noise and wear rate than rigid brake pad.

Adversarial Detection with Gaussian Process Regression-based Detector

  • Lee, Sangheon;Kim, Noo-ri;Cho, Youngwha;Choi, Jae-Young;Kim, Suntae;Kim, Jeong-Ah;Lee, Jee-Hyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4285-4299
    • /
    • 2019
  • Adversarial attack is a technique that causes a malfunction of classification models by adding noise that cannot be distinguished by humans, which poses a threat to a deep learning model. In this paper, we propose an efficient method to detect adversarial images using Gaussian process regression. Existing deep learning-based adversarial detection methods require numerous adversarial images for their training. The proposed method overcomes this problem by performing classification based on the statistical features of adversarial images and clean images that are extracted by Gaussian process regression with a small number of images. This technique can determine whether the input image is an adversarial image by applying Gaussian process regression based on the intermediate output value of the classification model. Experimental results show that the proposed method achieves higher detection performance than the other deep learning-based adversarial detection methods for powerful attacks. In particular, the Gaussian process regression-based detector shows better detection performance than the baseline models for most attacks in the case with fewer adversarial examples.

Perceptual Ad-Blocker Design For Adversarial Attack (적대적 공격에 견고한 Perceptual Ad-Blocker 기법)

  • Kim, Min-jae;Kim, Bo-min;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.871-879
    • /
    • 2020
  • Perceptual Ad-Blocking is a new advertising blocking technique that detects online advertising by using an artificial intelligence-based advertising image classification model. A recent study has shown that these Perceptual Ad-Blocking models are vulnerable to adversarial attacks using adversarial examples to add noise to images that cause them to be misclassified. In this paper, we prove that existing perceptual Ad-Blocking technique has a weakness for several adversarial example and that Defense-GAN and MagNet who performed well for MNIST dataset and CIFAR-10 dataset are good to advertising dataset. Through this, using Defense-GAN and MagNet techniques, it presents a robust new advertising image classification model for adversarial attacks. According to the results of experiments using various existing adversarial attack techniques, the techniques proposed in this paper were able to secure the accuracy and performance through the robust image classification techniques, and furthermore, they were able to defend a certain level against white-box attacks by attackers who knew the details of defense techniques.

Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy (부대역 에너지 기반 웨이블릿 패킷 변환을 이용한 인증을 위한 세미 프레자일 영상 워터마킹)

  • Park, Sang-Ju;Kwon, Tae-Hyeon
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.421-428
    • /
    • 2005
  • A new method of Semi-fragile image watermarking which ensures the integrity of the contents of digital image is presented. Proposed watermarking scheme embeds watermark in the form of quantization noise on the wavelet transform coefficients in a specific mid frequency subbands selected from a wavelet packet decomposition based on energy distribution of wavelet transform coefficients. By controlling the strength of embedded watermark using HVS (Human Visual System) characteristic, it is imperceptible by a human viewer while robust against non-malicious attack such as compression for storage and/or transmission. When an attack is applied on the original image, it is highly probable that wavelet transform coefficients not only at the exact attack positions but also the neighboring ones are modified. Therefore, proposed authentication method utilizes whether both current coefficient and its neighbors are damaged. together. So it can efficiently detect and accurately localize attacks inflicted on the content of original image. Decision threshold for authentication can be user controlled for different application areas as needed.

Engagement Level Simulator Development for Wire-Guided Torpedo Performance Analysis (선유도어뢰 전술 효과도 분석을 위한 교전수준 모델 개발 연구)

  • Cho, Hyunjin
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.33-38
    • /
    • 2018
  • This paper introduces the simulation concepts and technical approach of wire-guided torpedo performance analysis simulator, as a consequence, provide a framework for understanding overall attack procedures and effectiveness of tactics to torpedo operator. It described the mathematical models of simulation components and weapon engagement principle, especially it derived the closed-form solution of time consumption and leading angle problem of torpedo attack situation based on geographical assumption. In addition, it adopted the proportional navigation guidance at final stage of torpedo attack and also consider the tradeoff relation between target ship speed(propeller noise level) and detection probability, so that it improves the fidelity of physical realism. Simulator is developed with high degree of freedom in the perspective of tactical situation, and it helps user to understand the overall situation and tactical effectiveness.

Detecting Adversarial Example Using Ensemble Method on Deep Neural Network (딥뉴럴네트워크에서의 적대적 샘플에 관한 앙상블 방어 연구)

  • Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.57-66
    • /
    • 2021
  • Deep neural networks (DNNs) provide excellent performance for image, speech, and pattern recognition. However, DNNs sometimes misrecognize certain adversarial examples. An adversarial example is a sample that adds optimized noise to the original data, which makes the DNN erroneously misclassified, although there is nothing wrong with the human eye. Therefore studies on defense against adversarial example attacks are required. In this paper, we have experimentally analyzed the success rate of detection for adversarial examples by adjusting various parameters. The performance of the ensemble defense method was analyzed using fast gradient sign method, DeepFool method, Carlini & Wanger method, which are adversarial example attack methods. Moreover, we used MNIST as experimental data and Tensorflow as a machine learning library. As an experimental method, we carried out performance analysis based on three adversarial example attack methods, threshold, number of models, and random noise. As a result, when there were 7 models and a threshold of 1, the detection rate for adversarial example is 98.3%, and the accuracy of 99.2% of the original sample is maintained.