Results 251 to 260 of about 24,885,017 (322)
Some of the next articles are maybe not open access.

Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System

Computer Communications, 2023
Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks.
Khushnaseeb Roshan   +2 more
semanticscholar   +1 more source

Robustness Verification for Machine-Learning-Based Power System Dynamic Security Assessment Models Under Adversarial Examples

IEEE Transactions on Control of Network Systems, 2022
Based on machine learning (ML) technique, the data-driven power system dynamic security assessment (DSA) has received significant research interest. Yet, the well-trained ML-based models with high training and testing accuracy may be vulnerable to the ...
Chao Ren, Yan Xu
semanticscholar   +1 more source

Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System

IEEE Transactions on Dependable and Secure Computing, 2022
There has been an increasing interest in the use of data-driven techniques for classifying cyber-attacks and physical faults in cyber-physical systems.
Maryam Farajzadeh-Zanjani   +3 more
semanticscholar   +1 more source

MANDA: On Adversarial Example Detection for Network Intrusion Detection System

IEEE Conference on Computer Communications, 2021
With the rapid advancement in machine learning (ML), ML-based Intrusion Detection Systems (IDSs) are widely deployed to protect networks from various attacks.
Ning Wang   +4 more
semanticscholar   +1 more source

Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples

IEEE Transactions on Smart Grid, 2022
Based on machine learning (ML) technique, the data-driven power system stability assessment has received significant research interests in recent years.
Chao Ren   +5 more
semanticscholar   +1 more source

AdvDoor: adversarial backdoor attack of deep learning system

International Symposium on Software Testing and Analysis, 2021
Deep Learning (DL) system has been widely used in many critical applications, such as autonomous vehicles and unmanned aerial vehicles. However, their security is threatened by backdoor attack, which is achieved by adding artificial patterns on specific ...
Quan Zhang   +5 more
semanticscholar   +1 more source

Defending Against Adversarial Attacks via Neural Dynamic System

Neural Information Processing Systems, 2022
Although deep neural networks (DNN) have achieved great success, their applications in safety-critical areas are hindered due to their vulnerability to adversarial attacks. Some recent works have accordingly proposed to enhance the robustness of DNN from
Xiyuan Li, Xin Zou, Weiwei Liu
semanticscholar   +1 more source

The Adversary System: Cui Bono?

Annals of Internal Medicine, 1982
Excerpt The article by Richman in this issue(1) provides a dispassionate and objective review of compensation for industrial disease.
W. KEITH, C. MORGAN
openaire   +2 more sources

Adversarial-Example Attacks Toward Android Malware Detection System

IEEE Systems Journal, 2020
Recently, it was shown that the generative adversarial network (GAN) based adversarial-example attacks could thoroughly defeat the existing Android malware detection systems.
Heng Li   +4 more
semanticscholar   +1 more source

Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

Information Systems Frontiers, 2020
Since the inception of Andoroid OS, smartphones sales have been growing exponentially, and today it enjoys the monopoly in the smartphone marketplace.
Hemant Rathore   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy