Attack Detection

Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures

Authors: Sudeep Pasricha, John Jose, Sujay Deb | Published: 2022-08-18
DoS Mitigation
Malicious Node Detection
Attack Detection

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17
Data Protection Method
Poisoning
Attack Detection

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16
Relationship of AI Systems
Attack Detection
Vulnerability detection

Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14
Malicious Node Detection
Attack Detection
Threat modeling

DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning

Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31
DNN IP Protection Method
Attack Detection
Adversarial Example

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18
Membership Inference
Performance Evaluation
Attack Detection

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18
Online Decision Making
Attack Detection
Adaptive Retraining Mechanism

Attack vs Benign Network Intrusion Traffic Classification

Authors: M. Andrecut | Published: 2022-05-15
Performance Evaluation
Attack Detection
evaluation metrics

A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data

Authors: Nassir Mohammad | Published: 2022-05-13
Robustness
Attack Detection
Self-Supervised Learning

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10
Performance Evaluation
Prompt Injection
Attack Detection