Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02 Dataset evaluationModel Performance EvaluationAttack Evaluation 2021.07.02 2025.05.28 Literature Database
Gradient-Free Adversarial Attacks for Bayesian Neural Networks Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23 Attack EvaluationAdversarial ExampleDefense Method 2020.12.23 2025.05.28 Literature Database
Asymptotic Behavior of Adversarial Training in Binary Classification Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14 Attack EvaluationAdversarial ExampleRegularization 2020.10.26 2025.05.28 Literature Database
Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30 WatermarkingRobustness Improvement MethodAttack Evaluation 2020.09.30 2025.05.28 Literature Database
On the Difficulty of Membership Inference Attacks Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22 Performance EvaluationAttack EvaluationMachine Learning 2020.05.27 2025.05.28 Literature Database
Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27 AlgorithmAttack EvaluationOptimization Methods 2020.05.27 2025.05.28 Literature Database
Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan | Published: 2020-05-19 Attack EvaluationAdversarial ExampleVulnerability of Adversarial Examples 2020.05.19 2025.05.28 Literature Database
Stealing Links from Graph Neural Networks Authors: Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang | Published: 2020-05-05 | Updated: 2020-10-05 Model InversionLink Prediction MethodAttack Evaluation 2020.05.05 2025.05.28 Literature Database
Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11 Security AnalysisAttack EvaluationAttack Detection 2020.04.11 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10 Attack EvaluationAttack DetectionDefense Method 2020.04.10 2025.05.28 Literature Database