Optimized Random Forest Model for Botnet Detection Based on DNS Queries Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16 DDoS AttackMachine Learning ApplicationDefense Method 2020.12.16 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
Protecting Classifiers From Attacks. A Bayesian Approach Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18 Multi-Class ClassificationAdversarial Perturbation TechniquesDefense Method 2020.04.18 2025.05.28 Literature Database
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15 Prompt InjectionAttack TypeDefense Method 2020.04.15 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10 Attack EvaluationAttack DetectionDefense Method 2020.04.10 2025.05.28 Literature Database
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 Attack EvaluationVulnerability Assessment MethodDefense Method 2020.04.09 2025.05.28 Literature Database
Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07 Competitive Cooperative SystemsComputational EfficiencyDefense Method 2020.04.07 2025.05.28 Literature Database
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 PoisoningAttack EvaluationDefense Method 2020.04.01 2025.05.28 Literature Database
Adversarial Perturbations Fool Deepfake Detectors Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15 Adversarial ExampleAdversarial Attack MethodsDefense Method 2020.03.24 2025.05.28 Literature Database