Taxonomy of Attacks

A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms

Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System

Privacy Attacks on Network Embeddings

Authors: Michael Ellers, Michael Cochez, Tobias Schumacher, Markus Strohmaier, Florian Lemmerich | Published: 2019-12-23
Privacy Protection Method
Membership Inference
Taxonomy of Attacks

Explainability and Adversarial Robustness for RNNs

Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2019-12-20 | Updated: 2020-02-19
Taxonomy of Attacks
Adversarial Learning
Effectiveness Analysis of Defense Methods

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors

Authors: Ivan Homoliak, Petr Hanacek | Published: 2019-10-23
Modification of Network Traffic
Taxonomy of Attacks
Vulnerability Attack Method

Lower Bounds on Adversarial Robustness from Optimal Transport

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30
Taxonomy of Attacks
Adversarial attack
Machine Learning Application

GAMIN: An Adversarial Approach to Black-Box Model Inversion

Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26
Poisoning
Taxonomy of Attacks
Generative Adversarial Network

Sign-OPT: A Query-Efficient Hard-label Adversarial Attack

Authors: Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, Cho-Jui Hsieh | Published: 2019-09-24 | Updated: 2020-02-14
Convergence Analysis
Taxonomy of Attacks
Adversarial attack

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14
Poisoning
Taxonomy of Attacks
Adversarial attack

Adversarial Vulnerability Bounds for Gaussian Process Classification

Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19
Taxonomy of Attacks
Adversarial Example
Machine Learning Technology

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30
Taxonomy of Attacks
Adversarial Example
Adversarial Learning