Attack Type

Process Mining Algorithm for Online Intrusion Detection System

Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24
Data Collection
Network Threat Detection
Attack Type

Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19
Attack Methods against DFL
Attack Type
Adversarial Example

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12
Attack Methods against DFL
Cyber Threat
Attack Type

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29
Cyber Threat
Attack Type
Image Feature Extraction

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

Machine Learning Security against Data Poisoning: Are We There Yet?

Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08
Poisoning
Attack Type
Defense Method

Unsupervised Detection of Adversarial Examples with Model Explanations

Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22
Membership Inference
Attack Type
Adversarial Example

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19
Attack Type
Machine Learning Method
Vulnerability Management

Voting based ensemble improves robustness of defensive models

Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28
Model Performance Evaluation
Attack Type
Adversarial attack