Cyber Threat

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12
Attack Methods against DFL
Cyber Threat
Attack Type

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29
Cyber Threat
Attack Type
Image Feature Extraction

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06
ML-Based IDS
Cyber Threat
Malware Detection

Detection of Insider Threats using Artificial Intelligence and Visualisation

Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06
Cyber Threat
User Behavior Analysis
Log Analysis Method

Predicting Process Name from Network Data

Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03
Cyber Threat
Fundamentals of Machine Learning
Defense Mechanism

Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles

Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16
Cyber Threat
Data Contamination Detection
Resource Consumption Analysis

Formalizing Distribution Inference Risks

Authors: Anshuman Suri, David Evans | Published: 2021-06-07 | Updated: 2021-09-24
Cyber Threat
Property Inference Attack
Risk Assessment Method

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25
Cyber Attack
Cyber Threat
Data Collection

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05
Cyber Threat
Model Ensemble
Feature Importance Analysis

Heterogeneous Graph Matching Networks

Authors: Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-10-17
Graph Neural Network
Graph Representation Learning
Cyber Threat