Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems Authors: Mohamed ElShehaby, Ashraf Matrawy | Published: 2025-10-22 Network Threat DetectionModel RobustnessCertified Robustness 2025.10.22 2025.10.24 Literature Database
DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection Authors: Daniel Pulido-Cortázar, Daniel Gibert, Felip Manyà | Published: 2025-10-14 Backdoor DetectionCertified RobustnessRobustness 2025.10.14 2025.10.16 Literature Database
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation Authors: Tharcisse Ndayipfukamiye, Jianguo Ding, Doreen Sebastian Sarwatt, Adamu Gaston Philipo, Huansheng Ning | Published: 2025-09-24 | Updated: 2025-09-30 Prompt InjectionCertified RobustnessDefense Mechanism 2025.09.24 2025.10.02 Literature Database
Defending against Stegomalware in Deep Neural Networks with Permutation Symmetry Authors: Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen | Published: 2025-09-23 | Updated: 2025-10-15 Security Analysis MethodCertified RobustnessInformation Hiding Techniques 2025.09.23 2025.10.17 Literature Database
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20 Certified RobustnessRobustness Improvement MethodEvaluation Method 2025.08.20 2025.08.22 Literature Database
Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 Membership Disclosure RiskCertified RobustnessAdversarial attack 2025.06.23 2025.06.25 Literature Database
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Authors: Zhaoyang Xu, Yunbo Liu | Published: 2025-06-23 | Updated: 2025-08-11 Certified RobustnessPerformance Evaluation MethodAnomaly Detection Method 2025.06.23 2025.08.13 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 Model ArchitectureCertified RobustnessAdversarial Attack Analysis 2025.06.23 2025.06.25 Literature Database
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2025.06.12 2025.06.14 Literature Database
Adversarial Surrogate Risk Bounds for Binary Classification Authors: Natalie S. Frank | Published: 2025-06-11 Certified RobustnessConvergence AnalysisFunction Boundary Pair Formation 2025.06.11 2025.06.13 Literature Database