Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Gradient-Free Adversarial Attacks for Bayesian Neural Networks Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23 Attack EvaluationAdversarial ExampleDefense Method 2020.12.23 2025.05.28 Literature Database
Optimized Random Forest Model for Botnet Detection Based on DNS Queries Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16 DDoS AttackMachine Learning ApplicationDefense Method 2020.12.16 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
Protecting Classifiers From Attacks. A Bayesian Approach Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18 Multi-Class ClassificationAdversarial Perturbation TechniquesDefense Method 2020.04.18 2025.05.28 Literature Database
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15 Prompt InjectionAttack TypeDefense Method 2020.04.15 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10 Attack EvaluationAttack DetectionDefense Method 2020.04.10 2025.05.28 Literature Database
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 Attack EvaluationVulnerability Assessment MethodDefense Method 2020.04.09 2025.05.28 Literature Database