Survey of Attacks and Defenses on Edge-Deployed Neural Networks Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27 Privacy-Preserving Data MiningAttack TypeVulnerability Analysis 2019.11.27 2025.05.28 Literature Database
Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.28 Literature Database
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress) Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10 Security Analysis MethodDevice Sensitivity AnalysisVulnerability Analysis 2017.04.10 2025.05.28 Literature Database