A systematic review of fuzzing based on machine learning techniques Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04 Data Generation MethodPerformance EvaluationMachine Learning 2019.08.04 2025.05.28 Literature Database
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks Authors: Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang | Published: 2019-08-03 Data Generation MethodMachine LearningFeature Interdependence 2019.08.03 2025.05.28 Literature Database
Exploring the Robustness of NMT Systems to Nonsensical Inputs Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28 BLEU Score EvaluationAdversarial attackMachine Learning 2019.08.03 2025.05.28 Literature Database
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 Data Collection MethodAttack EvaluationMachine Learning 2019.05.28 2025.05.28 Literature Database
CharBot: A Simple and Effective Method for Evading DGA Classifiers Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30 Malware DetectionAdversarial Attack DetectionMachine Learning 2019.05.03 2025.05.28 Literature Database
Locally Differentially Private Naive Bayes Classification Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03 Privacy TechniqueMachine LearningDimensionality Reduction Method 2019.05.03 2025.05.28 Literature Database
Generative Adversarial Network for Wireless Signal Spoofing Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07 Attack Scenario AnalysisMachine LearningPhysical layer security 2019.05.03 2025.05.28 Literature Database
Mimic Learning to Generate a Shareable Network Intrusion Detection Model Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18 PoisoningModel DesignMachine Learning 2019.05.02 2025.05.28 Literature Database
You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle Authors: Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, Bin Dong | Published: 2019-05-02 | Updated: 2019-11-01 Selection and Evaluation of Optimization AlgorithmsMachine LearningAdaptive Adversarial Training 2019.05.02 2025.05.28 Literature Database
Extracting vehicle sensor signals from CAN logs for driver re-identification Authors: Szilvia Lestyan, Gergely Acs, Gergely Biczok, Zsolt Szalay | Published: 2019-02-24 | Updated: 2019-10-25 Random ForestMachine LearningVehicle Network 2019.02.24 2025.05.28 Literature Database