A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12 Attack Methods against DFLCyber ThreatAttack Type 2022.05.01 2025.05.28 Literature Database
Adversarial attacks on an optical neural network Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29 Cyber ThreatAttack TypeImage Feature Extraction 2022.04.29 2025.05.28 Literature Database
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06 ML-Based IDSCyber ThreatMalware Detection 2021.09.06 2025.05.28 Literature Database
Detection of Insider Threats using Artificial Intelligence and Visualisation Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06 Cyber ThreatUser Behavior AnalysisLog Analysis Method 2021.09.06 2025.05.28 Literature Database
Predicting Process Name from Network Data Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03 Cyber ThreatFundamentals of Machine LearningDefense Mechanism 2021.09.03 2025.05.28 Literature Database
Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16 Cyber ThreatData Contamination DetectionResource Consumption Analysis 2021.08.02 2025.05.28 Literature Database
Formalizing Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-06-07 | Updated: 2021-09-24 Cyber ThreatProperty Inference AttackRisk Assessment Method 2021.06.07 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 Cyber AttackCyber ThreatData Collection 2021.05.25 2025.05.28 Literature Database
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05 Cyber ThreatModel EnsembleFeature Importance Analysis 2019.10.18 2025.05.28 Literature Database
Heterogeneous Graph Matching Networks Authors: Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-10-17 Graph Neural NetworkGraph Representation LearningCyber Threat 2019.10.17 2025.05.28 Literature Database