The Naked Sun: Malicious Cooperation Between Benign-Looking Processes Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06 Process Partitioning MethodAttack TypeAttack Detection 2019.11.06 2025.05.28 Literature Database
Network entity characterization and attack prediction Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17 Data Selection StrategyAttack DetectionMachine Learning Method 2019.09.17 2025.05.28 Literature Database
Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16 Secure Communication ChannelAttack DetectionMachine Learning Method 2019.09.16 2025.05.28 Literature Database
Inspecting adversarial examples using the Fisher information Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12 Fisher Information SensitivityAttack DetectionAdversarial Example 2019.09.12 2025.05.28 Literature Database
Stateful Detection of Black-Box Adversarial Attacks Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12 PoisoningAttack DetectionAdversarial attack 2019.07.12 2025.05.28 Literature Database
On Designing Machine Learning Models for Malicious Network Traffic Classification Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad | Published: 2019-07-10 Data Extraction and AnalysisAttack DetectionMachine Learning Framework 2019.07.10 2025.05.28 Literature Database
Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection Authors: Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha | Published: 2019-07-07 Attack DetectionMachine Learning FrameworkFeature Selection Method 2019.07.07 2025.05.28 Literature Database
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06 Dataset AnalysisModel EvaluationAttack Detection 2019.05.28 2025.05.28 Literature Database
Thwarting finite difference adversarial attacks with output randomization Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener | Published: 2019-05-23 Model Performance EvaluationAttack DetectionAdversarial Example 2019.05.23 2025.05.28 Literature Database
Adversarially Robust Distillation Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein | Published: 2019-05-23 | Updated: 2019-12-02 Model Performance EvaluationAttack DetectionAdversarial Example 2019.05.23 2025.05.28 Literature Database