Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05 Attack DetectionMachine LearningAnomaly Detection Method 2020.08.05 2025.05.28 Literature Database
Perturbing Inputs to Prevent Model Stealing Authors: Justin Grana | Published: 2020-05-12 Membership InferenceAttack DetectionLinear Model 2020.05.12 2025.05.28 Literature Database
Robustness Verification for Classifier Ensembles Authors: Dennis Gross, Nils Jansen, Guillermo A. Pérez, Stephan Raaijmakers | Published: 2020-05-12 | Updated: 2020-07-09 Robustness Improvement MethodAttack DetectionDeep Learning 2020.05.12 2025.05.28 Literature Database
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 AlgorithmAttack DetectionAdversarial Training 2020.05.11 2025.05.28 Literature Database
Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06 Energy ManagementRobustness Improvement MethodAttack Detection 2020.04.29 2025.05.28 Literature Database
Minority Reports Defense: Defending Against Adversarial Patches Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28 Attack DetectionAdversarial Attack DetectionDefense Effectiveness Analysis 2020.04.28 2025.05.28 Literature Database
Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11 Security AnalysisAttack EvaluationAttack Detection 2020.04.11 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10 Attack EvaluationAttack DetectionDefense Method 2020.04.10 2025.05.28 Literature Database
Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms Authors: Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi | Published: 2019-12-08 Attack DetectionMachine Learning TechnologyIndustrial Control System 2019.12.08 2025.05.28 Literature Database
AutoIDS: Auto-encoder Based Method for Intrusion Detection System Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08 Security MetricAttack DetectionFundamentals of Machine Learning 2019.11.08 2025.05.28 Literature Database