Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran | Published: 2019-07-28 Taxonomy of AttacksAdversarial ExampleAdversarial Training 2019.07.28 2025.05.13 Literature Database
Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03 Q-learning AlgorithmTaxonomy of AttacksAnomaly Detection Method 2019.07.27 2025.05.13 Literature Database
An Investigation of Data Poisoning Defenses for Online Learning Authors: Yizhen Wang, Somesh Jha, Kamalika Chaudhuri | Published: 2019-05-28 | Updated: 2020-02-19 Backdoor AttackPoisoningTaxonomy of Attacks 2019.05.28 2025.05.13 Literature Database
Snooping Attacks on Deep Reinforcement Learning Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15 Reinforcement Learning MethodTaxonomy of AttacksAdversarial Perturbation Techniques 2019.05.28 2025.05.13 Literature Database
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain Authors: Lei Bu, Yuchao Duan, Fu Song, Zhe Zhao | Published: 2019-05-19 | Updated: 2020-04-26 Model EvaluationPerformance Evaluation MetricsTaxonomy of Attacks 2019.05.19 2025.05.13 Literature Database
Applications of Machine Learning in Cryptography: A Survey Authors: Mohammed M. Alani | Published: 2019-02-11 Membership InferenceTaxonomy of AttacksHistory of Cryptography 2019.02.11 2025.05.13 Literature Database
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work Authors: Somdip Dey | Published: 2018-06-14 CybersecurityFraudulent TransactionTaxonomy of Attacks 2018.06.14 2025.05.13 Literature Database
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12 CybersecurityTaxonomy of AttacksAdversarial Learning 2018.06.12 2025.05.13 Literature Database
An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-06-11 FDI Attack Detection MethodsCybersecurityTaxonomy of Attacks 2018.06.11 2025.05.13 Literature Database