Vulnerability Assessment Method

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications

Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30
Content Compression Techniques
User Behavior Analysis
Vulnerability Assessment Method

The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models

Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29
Indirect Prompt Injection
Secure Communication Channel
Vulnerability Assessment Method

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04
Data-Driven Vulnerability Assessment
Multi-Class Classification
Vulnerability Assessment Method

Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks

Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30
Data Contamination Detection
Adversarial attack
Vulnerability Assessment Method

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31
Risk Management
Vulnerability Assessment Method
Defense Mechanism

Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models

Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11
Adversarial Training
Vulnerability Assessment Method
Computational Efficiency

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
Poisoning
Adversarial attack
Vulnerability Assessment Method

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27
Privacy Protection Method
Information-Theoretic Evaluation
Vulnerability Assessment Method

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
Data Contamination Detection
Poisoning
Vulnerability Assessment Method

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
Poisoning
Optimization Methods
Vulnerability Assessment Method