Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.28 Literature Database
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07 Model Performance EvaluationAttack DetectionMachine Learning Technology 2017.09.10 2025.05.28 Literature Database
Attacking Machine Learning models as part of a cyber kill chain Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07 Security AnalysisDetection of Model Extraction AttacksAttack Detection 2017.05.01 2025.05.28 Literature Database
A Security Monitoring Framework For Virtualization Based HEP Infrastructures Authors: A. Gomez Ramirez, M. Martinez Pedreira, C. Grigoras, L. Betev, C. Lara, U. Kebschull | Published: 2017-04-16 Security Analysis MethodDataset AnalysisAttack Detection 2017.04.16 2025.05.28 Literature Database
The Space of Transferable Adversarial Examples Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-04-11 | Updated: 2017-05-23 Model RobustnessAttack DetectionAdversarial Example Detection 2017.04.11 2025.05.28 Literature Database