Gradient Masking of Label Smoothing in Adversarial Robustness
Deep neural networks (DNNs) have achieved impressive results in several image classification tasks. However, these architectures are unstable for adversarial examples (AEs) such as inputs crafted by a hardly perceptible perturbation with the intent of ...
Hyungyu Lee, Ho Bae, Sungroh Yoon
doaj +1 more source
Detecting Evasion Attacks in Deployed Tree Ensembles
sponsorship: This research is supported by the Research Foundation - Flanders (LD: 1SB1322N; LP: 1166222N), the Flemish Government under the "Onderzoeksprogramma Artificiele Intelligentie (AI) Vlaanderen" program (JD), the European Union's Horizon Europe Research and Innovation program under the grant agreement TUPLES No.
Devos, Laurens +3 more
openaire +1 more source
AppCon: Mitigating Evasion Attacks to ML Cyber Detectors [PDF]
Adversarial attacks represent a critical issue that prevents the reliable integration of machine learning methods into cyber defense systems. Past work has shown that even proficient detectors are highly affected just by small perturbations to malicious samples, and that existing countermeasures are immature.
Apruzzese G. +4 more
openaire +1 more source
Malware Collusion Attack against SVM: Issues and Countermeasures
Android has become the most popular mobile platform, and a hot target for malware developers. At the same time, researchers have come up with numerous ways to deal with malware.
Hongyi Chen +3 more
doaj +1 more source
Research on game strategy of underwater attack and defense process in typical situation
Aiming at the problem of underwater attack and defense in typical situations, a mathematical model of three-party attack and defense problem composed of torpedo, submarines and anti-torpedo torpedo is established. Under the condition of considering three-
WANG Zhong +3 more
doaj +1 more source
An Evasion and Counter-Evasion Study in Malicious Websites Detection [PDF]
Malicious websites are a major cyber attack vector, and effective detection of them is an important cyber defense task. The main defense paradigm in this regard is that the defender uses some kind of machine learning algorithms to train a detection model,
Xu, Li +3 more
core +2 more sources
Improving rotorcraft survivability to RPG attack using inverse methods [PDF]
This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs).
Anderson, D., Thomson, D.G.
core +1 more source
Dual-Targeted Textfooler Attack on Text Classification Systems
Deep neural networks provide good performance on classification tasks such as those for image, audio, and text classification. However, such neural networks are vulnerable to adversarial examples.
Hyun Kwon
doaj +1 more source
Deep learning-driven multi-layer intrusion detection and prevention framework for resilient defense against adaptive evasion techniques in modern networks [PDF]
Current network security technologies face new threats from determined attackers employing advanced evasion techniques such as IP spoofing, tiny fragment attacks, tunneling, and HTML smuggling. Conventional intrusion detection and prevention systems
Dena Abu Laila +5 more
doaj +1 more source
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning [PDF]
Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity.
Biggio, Battista, Roli, Fabio
core +2 more sources

