Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24 Dataset evaluationAdversarial Example DetectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Detecting and Explaining Malware Family Evolution Using Rule-Based Drift Analysis Authors: Olha Jurečková, Martin Jureček | Published: 2026-02-03 マルウェアファミリールールベース分類Adversarial Example Detection 2026.02.03 2026.02.05 Literature Database
Security through the Eyes of AI: How Visualization is Shaping Malware Detection Authors: Asmitha K. A., Matteo Brosolo, Serena Nicolazzo, Antonino Nocera, Vinod P., Rafidha Rehiman K. A., Muhammed Shafi K. P | Published: 2025-05-12 Prompt InjectionMalware ClassificationAdversarial Example Detection 2025.05.12 2025.05.28 Literature Database
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24 Detection Rate of Phishing AttacksCertified RobustnessAdversarial Example Detection 2025.04.24 2025.05.27 Literature Database
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 Attack MethodAdversarial Example DetectionDeep Learning 2025.03.04 2025.05.27 Literature Database
ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21 Relationship between Robustness and PrivacyAdversarial Example DetectionDefense Mechanism 2023.08.09 2025.05.28 Literature Database
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24 PoisoningAdversarial Example Detectionevaluation metrics 2021.10.24 2025.05.28 Literature Database
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07 Performance EvaluationAttack Scenario AnalysisAdversarial Example Detection 2021.05.01 2025.05.28 Literature Database
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan | Published: 2021-04-26 PoisoningMulti-Class ClassificationAdversarial Example Detection 2021.04.26 2025.05.28 Literature Database
Random Noise Defense Against Query-Based Black-Box Attacks Authors: Zeyu Qin, Yanbo Fan, Hongyuan Zha, Baoyuan Wu | Published: 2021-04-23 | Updated: 2021-10-30 Convergence AnalysisAdversarial Example DetectionDefense Mechanism 2021.04.23 2025.05.28 Literature Database