DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks Authors: Zirui Xu, Fuxun Yu, Xiang Chen | Published: 2019-05-21 | Updated: 2019-08-28 Vulnerability of CNNAttack DetectionPhysical Adversarial Attack 2019.05.21 2025.05.28 Literature Database
On the Activity Privacy of Blockchain for IoT Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14 IoT Traffic CharacteristicsUser Behavior AnalysisAttack Detection 2018.12.21 2025.05.28 Literature Database
Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks Authors: Akash Raj Narayanadoss, Tram Truong-Huu, Purnima Murali Mohan, Mohan Gurusamy | Published: 2018-12-10 | Updated: 2019-02-14 Traffic Characteristic AnalysisAttack DetectionDeep Learning 2018.12.10 2025.05.28 Literature Database
Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments Authors: Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka | Published: 2018-10-23 Multi-Class ClassificationInformation SecurityAttack Detection 2018.10.23 2025.05.28 Literature Database
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05 Data PreprocessingAttack DetectionFeature Selection Method 2018.05.26 2025.05.28 Literature Database
Secure Mobile Edge Computing in IoT via Collaborative Online Learning Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09 CybersecurityInformation SecurityAttack Detection 2018.05.09 2025.05.28 Literature Database
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12 CybersecurityAttack DetectionRobustness of Watermarking Techniques 2018.05.07 2025.05.28 Literature Database
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23 Model Performance EvaluationAttack DetectionUnknown Attack Detection 2017.09.23 2025.05.28 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Detection of Unauthorized IoT Devices Using Machine Learning Techniques Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14 Backdoor DetectionModel Performance EvaluationAttack Detection 2017.09.14 2025.05.28 Literature Database