Results 261 to 270 of about 1,173,800 (295)
Some of the next articles are maybe not open access.
Persistent and Evasive Attacks Uncovered
Infosecurity, 2011APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger.
openaire +1 more source
ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion
IEEE International Conference on Computer Vision, 2023Adversarial camouflage has garnered attention for its ability to attack object detectors from any viewpoint by covering the entire object’s surface. However, universality and robustness in existing methods often fall short as the transferability aspect ...
Naufal Suryanto +8 more
semanticscholar +1 more source
Evasion Attack in Show and Tell Model
2020 22nd International Conference on Advanced Communication Technology (ICACT), 2020Recently, deep learning technology has been applied to various fields with high performance and various services. Image recognition is also used in various fields with high performance by incorporating deep learning technology. However, deep learning technology is vulnerable to evasion attacks that cause the model to be misclassified by modulating the ...
Dongseop Lee, Hyunjin Kim, Jaecheol Ryou
openaire +1 more source
Domain invariant feature extraction against evasion attack
International Journal of Machine Learning and Cybernetics, 2017In the security application, an attacker might violate the data stationary assumption that is a common assumption in the most machine learning techniques. This problem named as the domain shift problem arises when training (source) and test (target) data follow different distributions.
Zeinab Khorshidpour +3 more
openaire +1 more source
pFedDef: Characterizing evasion attack transferability in federated learning
Softw. Impacts, 2023Taejin Kim +3 more
semanticscholar +1 more source
Complex-based optimization strategy for evasion attack
2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), 2017Machine learning has been widely used in security related applications, such as spam filter, network intrusion detection. In machine learning process, the test set and the training set usually have the same probability distribution and through the information of learning the training set, the malicious samples in the machine learning algorithm can ...
Shu Li, Yun Li
openaire +1 more source
GZOO: Black-Box Node Injection Attack on Graph Neural Networks via Zeroth-Order Optimization
IEEE Transactions on Knowledge and Data EngineeringThe ubiquity of Graph Neural Networks (GNNs) emphasizes the imperative to assess their resilience against node injection attacks, a type of evasion attacks that impact victim models by injecting nodes with fabricated attributes and structures.
Hao Yu +6 more
semanticscholar +1 more source
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems
IEEE Transactions on Dependable and Secure ComputingNetwork intrusion detection systems (IDS) are often considered effective to thwart cyber attacks. Currently, state-of-the-art (SOTA) IDSs are mainly based on machine learning (ML) including deep learning (DL) models, which suffer from their own security ...
Haonan Yan +7 more
semanticscholar +1 more source
Evasion Attacks and Countermeasures in Deep Learning-Based Wi-Fi Gesture Recognition
IEEE Transactions on Mobile ComputingDeep learning-based Wi-Fi sensing has received massive interest thanks to the prevalence of Wi-Fi technology. While deep learning techniques provide promising results in Wi-Fi sensing, there are only very few studies on the vulnerabilities against Wi-Fi ...
Guolin Yin +3 more
semanticscholar +1 more source
IEEE Transactions on Artificial Intelligence
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs).
Abdulrahman Takiddin +3 more
semanticscholar +1 more source
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs).
Abdulrahman Takiddin +3 more
semanticscholar +1 more source

