Attack Evaluation

Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02
Dataset evaluation
Model Performance Evaluation
Attack Evaluation

Gradient-Free Adversarial Attacks for Bayesian Neural Networks

Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23
Attack Evaluation
Adversarial Example
Defense Method

Asymptotic Behavior of Adversarial Training in Binary Classification

Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14
Attack Evaluation
Adversarial Example
Regularization

Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30
Watermarking
Robustness Improvement Method
Attack Evaluation

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27
Algorithm
Attack Evaluation
Optimization Methods

Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models

Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan | Published: 2020-05-19
Attack Evaluation
Adversarial Example
Vulnerability of Adversarial Examples

Stealing Links from Graph Neural Networks

Authors: Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang | Published: 2020-05-05 | Updated: 2020-10-05
Model Inversion
Link Prediction Method
Attack Evaluation

Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey

Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11
Security Analysis
Attack Evaluation
Attack Detection

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
Attack Evaluation
Attack Detection
Defense Method