Results 21 to 30 of about 1,173,800 (295)
Plasmodium parasites are the etiological agents of malaria, a disease responsible for over half a million deaths annually. Successful completion of the parasite’s life cycle in the vertebrate host and transmission to a mosquito vector is contingent upon ...
Medard Ernest +7 more
doaj +1 more source
Projective Ranking-based GNN Evasion Attacks
Graph neural networks (GNNs) offer promising learning methods for graph-related tasks. However, GNNs are at risk of adversarial attacks. Two primary limitations of the current evasion attack methods are highlighted: (1) The current GradArgmax ignores the "long-term" benefit of the perturbation.
He Zhang +3 more
openaire +3 more sources
Omni: automated ensemble with unexpected models against adversarial evasion attack [PDF]
Machine learning-based security detection models have become prevalent in modern malware and intrusion detection systems. However, previous studies show that such models are susceptible to adversarial evasion attacks. In this type of attack, inputs (i.e.,
Rui Shu +3 more
semanticscholar +1 more source
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion [PDF]
Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to
Nikolay Ivanov, Qiben Yan
semanticscholar +1 more source
OMG-Attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
ICCV 2023, AROW ...
Tal, Ofir Bar +2 more
openaire +2 more sources
Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning [PDF]
Machine learning is being integrated into a growing number of critical systems with far-reaching impacts on society. Unexpected behaviour and unfair decision processes are coming under increasing scrutiny due to this widespread use and its theoretical ...
Berendt, Bettina +5 more
core +5 more sources
Unmanned aerial vehicle evasion manoeuvres from enemy aircraft attack
One of the most important problems associated with the combat use of unmanned aerial vehicles remains to ensure their high survivability in conditions of deliberate countermeasures, the source of which can be both ground-based air defence systems and ...
Evdokimenkov Veniamin N. +2 more
doaj +1 more source
A Feasibility Study on Evasion Attacks Against NLP-Based Macro Malware Detection Algorithms
Machine learning-based models for malware detection have gained prominence in order to detect obfuscated malware. These models extract malicious features and endeavor to classify samples as either malware or benign entities.
Mamoru Mimura, Risa Yamamoto
doaj +1 more source
Optimized Adversarial Example With Classification Score Pattern Vulnerability Removed
Neural networks provide excellent service on recognition tasks such as image recognition and speech recognition as well as for pattern analysis and other tasks in fields related to artificial intelligence.
Hyun Kwon, Kyoungmin Ko, Sunghwan Kim
doaj +1 more source
Universal Evasion Attacks on Summarization Scoring
The automatic scoring of summaries is important as it guides the development of summarizers. Scoring is also complex, as it involves multiple aspects such as fluency, grammar, and even textual entailment with the source text. However, summary scoring has not been considered a machine learning task to study its accuracy and robustness. In this study, we
Mu, Wenchuan, Lim, Kwan Hui
openaire +2 more sources

