Articles with "attacks defenses" as a keyword



On Modeling Link Flooding Attacks and Defenses

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3131503

Abstract: The emerging link flooding attacks (LFAs) are one type of attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices)… read more here.

Keywords: attack interference; flooding attacks; modeling link; attacks defenses ... See more keywords

A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253559

Abstract: The attacks and defenses on the information of which website pages are visited by users are important research subjects in the field of privacy enhancing technologies, they are termed as website fingerprinting (WF) attacks and… read more here.

Keywords: survey deep; website fingerprinting; learning; deep learning ... See more keywords

Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3528993

Abstract: Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of structure to reduce space consumption… read more here.

Keywords: attacks defenses; bloom; learned bloom; bloom filters ... See more keywords

Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3198481

Abstract: With the unprecedented development of deep learning, autonomous vehicles (AVs) have achieved tremendous progress nowadays. However, AV supported by DNN models is vulnerable to data poisoning attacks, hindering the large-scale application of autonomous driving. For… read more here.

Keywords: attacks defenses; data poisoning; state art; poisoning attacks ... See more keywords