Results 41 to 50 of about 1,173,800 (295)
On the Feasibility of Adversarial Sample Creation Using the Android System API
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications.
Fabrizio Cara +3 more
doaj +1 more source
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defenses escalate as well. Supervised classifiers are prone to adversarial evasion, and existing countermeasures suffer from many limitations. Most solutions degrade performance in the absence of adversarial perturbations; they are unable to face novel attack ...
Apruzzese G. +4 more
openaire +3 more sources
Attacks and Evasion in Wireless Security Network
Wireless Sensor Network is a vast topic with a lot of aspects. As Users of WSN are increasing Day by Day the threats of WSN are also increasing. The Architectural structure of WSN is very Unstable and therefore its Transmission is very Vulnerable. In this Study it is Evaluated the threats and Evasion from various type of Attacks. Due to the limitations
null Darshan Tumaney +1 more
openaire +1 more source
Testing the theory of immune selection in cancers that break the rules of transplantation [PDF]
Modification of cancer cells likely to reduce their immunogenicity, including loss or down-regulation of MHC molecules, is now well documented and has become the main support for the concept of immune surveillance.
A Garcia-Lora +84 more
core +2 more sources
Initiation and spread of escape waves within animal groups [PDF]
The exceptional reactivity of animal collectives to predatory attacks is thought to be due to rapid, but local, transfer of information between group members. These groups turn together in unison and produce escape waves.
Buhl, Jerome +4 more
core +2 more sources
Evading Classifiers by Morphing in the Dark
Learning-based systems have been shown to be vulnerable to evasion through adversarial data manipulation. These attacks have been studied under assumptions that the adversary has certain knowledge of either the target model internals, its training ...
Chang, Ee-Chien, Dang, Hung, Huang, Yue
core +1 more source
Summary: Skin is one of the most common sites of host immune response against Staphylococcus aureus infection. Here, through a combination of in vitro assays, mouse models, and intravital imaging, we find that S.
Jakub M. Kwiecinski +5 more
doaj +1 more source
Evasion Attacks against Machine Learning at Test Time [PDF]
In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimum-distance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely re-used in developing attacks against deep networks (even if not always ...
BIGGIO, BATTISTA +7 more
openaire +3 more sources
Detecting Backdoor Attacks via Class Difference in Deep Neural Networks
A backdoor attack implies that deep neural networks misrecognize data that have a specific trigger by additionally training the malicious training data, including the specific trigger to the deep neural network model.
Hyun Kwon
doaj +1 more source
The immune evasion ability of Delta variant is comparable to that of Beta variant in South Africa
Background The high immune evasion ability of SARS-COV-2 Omicron variant surprised the world and appears to be far stronger than any previous variant.
Daihai He +3 more
doaj +1 more source

