Attack Detection

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06
Process Partitioning Method
Attack Type
Attack Detection

Network entity characterization and attack prediction

Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17
Data Selection Strategy
Attack Detection
Machine Learning Method

Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication

Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16
Secure Communication Channel
Attack Detection
Machine Learning Method

Inspecting adversarial examples using the Fisher information

Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12
Fisher Information Sensitivity
Attack Detection
Adversarial Example

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12
Poisoning
Attack Detection
Adversarial attack

On Designing Machine Learning Models for Malicious Network Traffic Classification

Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad | Published: 2019-07-10
Data Extraction and Analysis
Attack Detection
Machine Learning Framework

Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection

Authors: Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha | Published: 2019-07-07
Attack Detection
Machine Learning Framework
Feature Selection Method

Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models

Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06
Dataset Analysis
Model Evaluation
Attack Detection

Thwarting finite difference adversarial attacks with output randomization

Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener | Published: 2019-05-23
Model Performance Evaluation
Attack Detection
Adversarial Example

Adversarially Robust Distillation

Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein | Published: 2019-05-23 | Updated: 2019-12-02
Model Performance Evaluation
Attack Detection
Adversarial Example