Defense Method

Statically Detecting Adversarial Malware through Randomised Chaining

Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04
Malware Detection Method
Adversarial attack
Defense Method

Deep Learning for Android Malware Defenses: a Systematic Literature Review

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09
Malware Detection
Deep Learning Method
Defense Method

Gradient-Free Adversarial Attacks for Bayesian Neural Networks

Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23
Attack Evaluation
Adversarial Example
Defense Method

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16
DDoS Attack
Machine Learning Application
Defense Method

Backdoor Attacks to Graph Neural Networks

Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17
Backdoor Detection
Backdoor Attack
Defense Method

EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks

Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21
Machine Learning
Deep Learning-Based IDS
Defense Method

Protecting Classifiers From Attacks. A Bayesian Approach

Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18
Multi-Class Classification
Adversarial Perturbation Techniques
Defense Method

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15
Prompt Injection
Attack Type
Defense Method

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
Attack Evaluation
Attack Detection
Defense Method

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
Attack Evaluation
Vulnerability Assessment Method
Defense Method