Attacker Behavior Analysis

CheatAgent: Attacking LLM-Empowered Recommender Systems via LLM Agent

Authors: Liang-bo Ning, Shijie Wang, Wenqi Fan, Qing Li, Xin Xu, Hao Chen, Feiran Huang | Published: 2025-04-13 | Updated: 2025-04-24
Indirect Prompt Injection
Prompt Injection
Attacker Behavior Analysis

Models That Are Interpretable But Not Transparent

Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26
Method for Providing Explainability while Keeping Model Information Confidential
Information Security
Attacker Behavior Analysis

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
Risk Management
Attacker Behavior Analysis
Threat Model

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22
Attacker Behavior Analysis
Vulnerability Analysis
Vulnerability detection

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11
Data Extraction and Analysis
Attacker Behavior Analysis
Machine Learning Framework

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
Backdoor Attack
Discussion on Protocol Vulnerabilities and Attack Scenarios
Attacker Behavior Analysis

Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection

Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26
Model Performance Evaluation
Attacker Behavior Analysis
Anomaly Detection Method