Vulnerability Analysis

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27
Privacy-Preserving Data Mining
Attack Type
Vulnerability Analysis

Models and Framework for Adversarial Attacks on Complex Adaptive Systems

Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13
Reinforcement Learning Algorithm
Attack Detection
Vulnerability Analysis

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)

Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10
Security Analysis Method
Device Sensitivity Analysis
Vulnerability Analysis