WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07

Towards a secure behavior modeling for IoT networks using Blockchain

Authors: Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed | Published: 2020-01-06

Generating Semantic Adversarial Examples via Feature Manipulation

Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20

Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert

Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18

ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense

Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16

Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure

Authors: Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd | Published: 2019-12-31

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch | Published: 2019-12-31

privGAN: Protecting GANs from membership inference attacks at low cost

Authors: Sumit Mukherjee, Yixi Xu, Anusua Trivedi, Juan Lavista Ferres | Published: 2019-12-31 | Updated: 2020-12-13

Face X-ray for More General Face Forgery Detection

Authors: Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, Baining Guo | Published: 2019-12-31 | Updated: 2020-04-19

A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms

Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31