A Convolutional Transformation Network for Malware Classification Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16 Security AnalysisClassification of Malicious ActorsMachine Learning Method 2019.09.16 2025.05.28 Literature Database
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 Security AnalysisPerformance EvaluationAdversarial Learning 2019.09.13 2025.05.28 Literature Database
An Empirical Investigation of Randomized Defenses against Adversarial Attacks Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12 Security AnalysisAdversarial ExampleMachine Learning Technology 2019.09.12 2025.05.28 Literature Database
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28 Security AnalysisUser Authentication SystemDynamic Access Control 2019.07.28 2025.05.28 Literature Database
Attacking Machine Learning models as part of a cyber kill chain Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07 Security AnalysisDetection of Model Extraction AttacksAttack Detection 2017.05.01 2025.05.28 Literature Database
Intrusion Prevention and Detection in Grid Computing – The ALICE Case Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20 Security AnalysisProactive DefenseMachine Learning 2017.04.20 2025.05.28 Literature Database
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 Security AnalysisStrategic GameAttack Pattern Extraction 2017.03.27 2025.05.28 Literature Database
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10 Security AnalysisPerformance EvaluationBehavioral Authentication System 2017.03.10 2025.05.28 Literature Database