Search

Your search keyword '"evasion attack"' showing total 129 results

Search Constraints

Start Over You searched for: Descriptor "evasion attack" Remove constraint Descriptor: "evasion attack"
129 results on '"evasion attack"'

Search Results

2. Enhancing reinforcement learning based adversarial malware generation to evade static detection.

3. Enhancing reinforcement learning based adversarial malware generation to evade static detection

4. Evasion Attack Against Multivariate Singular Spectrum Analysis Based IDS

5. Adversarial Attacks and Defenses in Capsule Networks: A Critical Review of Robustness Challenges and Mitigation Strategies

6. A Deep Dive into Deep Learning-Based Adversarial Attacks and Defenses in Computer Vision: From a Perspective of Cybersecurity

7. AudioGuard: Speech Recognition System Robust against Optimized Audio Adversarial Examples.

8. An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection.

9. Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers

10. AdvGuard: Fortifying Deep Neural Networks Against Optimized Adversarial Example Attack

11. Amplification methods to promote the attacks against machine learning-based intrusion detection systems.

12. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers.

13. Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder.

14. Towards robust stacked capsule autoencoder with hybrid adversarial training.

15. Effects of dataset attacks on machine learning models in e-health.

16. Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags

17. RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries

18. Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems

19. Towards a General Black-Box Attack on Tabular Datasets

20. 对抗逃避攻击的过滤式对抗特征选择研究.

21. A Feasibility Study on Evasion Attacks Against NLP-Based Macro Malware Detection Algorithms

22. Dual-Targeted Textfooler Attack on Text Classification Systems

23. Black-Box Evasion Attack Method Based on Confidence Score of Benign Samples.

24. Adversarial image perturbations with distortions weighted by color on deep neural networks.

26. Adversarial Robustness of Image Based Android Malware Detection Models

27. DroidEnemy: Battling adversarial example attacks for Android malware detection

28. Kernel-based adversarial attacks and defenses on support vector classification

29. Defending malware detection models against evasion based adversarial attacks.

30. Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems.

31. Optimized Adversarial Example With Classification Score Pattern Vulnerability Removed

32. Feature partitioning for robust tree ensembles and their certification in adversarial scenarios

33. Gradient Masking of Label Smoothing in Adversarial Robustness

34. Evaluation of adversarial machine learning tools for securing AI systems.

35. Feature partitioning for robust tree ensembles and their certification in adversarial scenarios.

36. Detecting Backdoor Attacks via Class Difference in Deep Neural Networks

37. Evasion on general GAN-generated image detection by disentangled representation.

38. Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.

39. Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors.

40. Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network

41. Adversarial retraining attack of asynchronous advantage actor‐critic based pathfinding.

42. Classification score approach for detecting adversarial example in deep neural network.

43. Topological safeguard for evasion attack interpreting the neural networks' behavior.

44. Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

45. An Adversarial Machine Learning Model Against Android Malware Evasion Attacks

46. Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks.

47. An Evasion Attack against Stacked Capsule Autoencoder

48. Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

49. Adversarial machine learning for cybersecurity and computer vision: Current developments and challenges.

50. Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles.

Catalog

Books, media, physical & digital resources