Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures Authors: Sudeep Pasricha, John Jose, Sujay Deb | Published: 2022-08-18 DoS MitigationMalicious Node DetectionAttack Detection 2022.08.18 2025.05.28 Literature Database
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17 Data Protection MethodPoisoningAttack Detection 2022.08.17 2025.05.28 Literature Database
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16 Relationship of AI SystemsAttack DetectionVulnerability detection 2022.08.16 2025.05.28 Literature Database
Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14 Malicious Node DetectionAttack DetectionThreat modeling 2022.08.14 2025.05.28 Literature Database
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31 DNN IP Protection MethodAttack DetectionAdversarial Example 2022.07.31 2025.05.28 Literature Database
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 Membership InferencePerformance EvaluationAttack Detection 2022.05.18 2025.05.28 Literature Database
Adaptive Hybrid Heterogeneous IDS for 6LoWPAN Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18 Online Decision MakingAttack DetectionAdaptive Retraining Mechanism 2022.05.18 2025.05.28 Literature Database
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 Performance EvaluationAttack Detectionevaluation metrics 2022.05.15 2025.05.28 Literature Database
A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data Authors: Nassir Mohammad | Published: 2022-05-13 RobustnessAttack DetectionSelf-Supervised Learning 2022.05.13 2025.05.28 Literature Database
DNS based In-Browser Cryptojacking Detection Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10 Performance EvaluationPrompt InjectionAttack Detection 2022.05.10 2025.05.28 Literature Database