Attackers and Malicious Devices

On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
データ毒性
Backdoor Attack
Attackers and Malicious Devices

Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
Proactive Defense
Attackers and Malicious Devices
評価メトリクス

Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search

Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25
Phishing Attack
Prompt Injection
Attackers and Malicious Devices

Toward a Multi-Layer ML-Based Security Framework for Industrial IoT

Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25
IoT Security Framework
Attackers and Malicious Devices
評価基準

The Cognitive Firewall:Securing Browser Based AI Agents Against Indirect Prompt Injection Via Hybrid Edge Cloud Defense

Authors: Qianlong Lan, Anuj Kaul | Published: 2026-03-24
Indirect Prompt Injection
Proactive Defense
Attackers and Malicious Devices

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27
Dataset Generation
Link Emulation
Attackers and Malicious Devices

You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas

Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26
Privacy Leakage
Loss Function
Attackers and Malicious Devices

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26
Poisoning
Attackers and Malicious Devices
Federated Learning

Policy Poisoning in Batch Reinforcement Learning and Control

Authors: Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu | Published: 2019-10-13 | Updated: 2019-10-31
Reinforcement Learning Environment
Attack Evaluation
Attackers and Malicious Devices

Membership Model Inversion Attacks for Deep Networks

Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09
Attack Evaluation
Attackers and Malicious Devices
Generative Adversarial Network