Defense Method

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16
DDoS Attack
Machine Learning Application
Defense Method

Backdoor Attacks to Graph Neural Networks

Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17
Backdoor Detection
Backdoor Attack
Defense Method

EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks

Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21
Machine Learning
Deep Learning-Based IDS
Defense Method

Protecting Classifiers From Attacks. A Bayesian Approach

Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18
Multi-Class Classification
Adversarial Perturbation Techniques
Defense Method

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15
Prompt Injection
Attack Type
Defense Method

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
Attack Evaluation
Attack Detection
Defense Method

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
Attack Evaluation
Vulnerability Assessment Method
Defense Method

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07
Competitive Cooperative Systems
Computational Efficiency
Defense Method

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01
Poisoning
Attack Evaluation
Defense Method

Adversarial Perturbations Fool Deepfake Detectors

Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15
Adversarial Example
Adversarial Attack Methods
Defense Method