Attack Pattern Extraction

Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild

Authors: Giuseppe Siracusano, Davide Sanvito, Roberto Gonzalez, Manikantan Srinivasan, Sivakaman Kamatchi, Wataru Takahashi, Masaru Kawakita, Takahiro Kakumaru, Roberto Bifulco | Published: 2023-07-14
Dataset Generation
Prompt Injection
Attack Pattern Extraction

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

Targeted Adversarial Attacks on Wind Power Forecasts

Authors: René Heinrich, Christoph Scholz, Stephan Vogt, Malte Lehna | Published: 2023-03-29 | Updated: 2023-08-17
DNN IP Protection Method
Attack Pattern Extraction
Climate Data Collection

Explaining Machine Learning DGA Detectors from DNS Traffic Data

Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio | Published: 2022-08-10
Attack Pattern Extraction
Machine Learning Method
Explainability

On False Data Injection Attack against Building Automation Systems

Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25
Attack Evaluation
Attack Pattern Extraction
Machine Learning Method

BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning

Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08
Performance Evaluation
Privacy Assessment
Attack Pattern Extraction

Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability

Authors: Utku Ozbulak, Jonathan Peck, Wesley De Neve, Bart Goossens, Yvan Saeys, Arnout Van Messem | Published: 2020-07-07 | Updated: 2020-07-18
Attack Pattern Extraction
Adversarial Example
Adversarial Learning

Certifying Decision Trees Against Evasion Attacks by Program Analysis

Authors: Stefano Calzavara, Pietro Ferrara, Claudio Lucchese | Published: 2020-07-06
Program Analysis
Attack Pattern Extraction
Static Analysis

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29
Algorithm
Attack Pattern Extraction
Encryption Method

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12
Clustering methods
Attack Pattern Extraction
evaluation metrics