Results 51 to 60 of about 1,173,800 (295)

Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)

open access: yesSensors, 2023
Cyber-Physical Systems (CPS) are prone to many security exploitations due to a greater attack surface being introduced by their cyber component by the nature of their remote accessibility or non-isolated capability.
Zakir Ahmad Sheikh   +3 more
doaj   +1 more source

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks [PDF]

open access: yes, 2019
Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an ...
Biggio, Battista   +7 more
core   +1 more source

Modified Apriori Approach for Evade Network Intrusion Detection System

open access: yes, 2014
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network.
Chandankhede, Chaitali   +2 more
core   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Enhancing reinforcement learning based adversarial malware generation to evade static detection

open access: yesAlexandria Engineering Journal
The anti-detection capabilities of adversarial malware examples have drawn the attention of antivirus vendors and researchers. In black-box scenarios where internal information of the target model cannot be accessed, with the ability of the reinforcement
Dazhi Zhan   +6 more
doaj   +1 more source

GEAAD: generating evasive adversarial attacks against android malware defense. [PDF]

open access: yesSci Rep
Owing to the proliferation of mobile devices, Google's Android operating system has become a dominant force in global communication. However, its popularity makes it a prime target for cyberattacks. Effective malware detection systems are crucial for combating these escalating threats, particularly amid the evolving use of adversarial examples to evade
Ahmad N   +6 more
europepmc   +4 more sources

Day/night variations of myeloid and lymphoid cell subsets in the murine inguinal lymph node

open access: yesFEBS Open Bio, EarlyView.
The circadian system is involved in the temporal regulation of the immune system. Our study reveals that two innate immune populations, NKT cells and neutrophils, predominate at the beginning of the day in healthy mice, highlighting how the time of day influences immune responses.
Paula M. Wagner   +6 more
wiley   +1 more source

Research on filter-based adversarial feature selection against evasion attacks

open access: yesDianxin kexue, 2023
With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are
Qimeng HUANG, Miaomiao WU, Yun LI
doaj  

Generation of an Induced Pluripotent Stem Cell‐Derived Alveolar Type II In Vitro Model to Study Influenza A Virus Infection and Drug Treatments

open access: yesAdvanced Healthcare Materials, EarlyView.
Patient‐specific induced pluripotent stem cells (iPSCs) can be differentiated into alveolar type II cells (iAT2s), expanded as 3D alveolospheres, and grown at physiologically relevant air–liquid interface (ALI). This study shows for the first time the infectability of iAT2s by the influenza A virus (IAV) and proves their responsiveness to the well ...
Lena Gauthier   +7 more
wiley   +1 more source

Security Evaluation of Support Vector Machines in Adversarial Environments

open access: yes, 2014
Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering.
A. Barth   +23 more
core   +1 more source

Home - About - Disclaimer - Privacy