Process Mining Algorithm for Online Intrusion Detection System Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24 Data CollectionNetwork Threat DetectionAttack Type 2022.05.24 2025.05.28 Literature Database
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 Attack Methods against DFLAttack TypeAdversarial Example 2022.05.19 2025.05.28 Literature Database
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12 Attack Methods against DFLCyber ThreatAttack Type 2022.05.01 2025.05.28 Literature Database
Adversarial attacks on an optical neural network Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29 Cyber ThreatAttack TypeImage Feature Extraction 2022.04.29 2025.05.28 Literature Database
Backdooring Explainable Machine Learning Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20 Backdoor AttackAttack TypeExplainability 2022.04.20 2025.05.28 Literature Database
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19 User Behavior AnalysisAttack TypeMachine Learning Method 2022.04.19 2025.05.28 Literature Database
Machine Learning Security against Data Poisoning: Are We There Yet? Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08 PoisoningAttack TypeDefense Method 2022.04.12 2025.05.28 Literature Database
Unsupervised Detection of Adversarial Examples with Model Explanations Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22 Membership InferenceAttack TypeAdversarial Example 2021.07.22 2025.05.28 Literature Database
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.28 Literature Database
Voting based ensemble improves robustness of defensive models Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28 Model Performance EvaluationAttack TypeAdversarial attack 2020.11.28 2025.05.28 Literature Database