Articles with "evasion attacks" as a keyword



Photo by samaustin from unsplash

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2021.3138628

Abstract: Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and… read more here.

Keywords: evasion attacks; attack effectiveness; crystal ball; innovative attacks ... See more keywords
Photo by worldsbetweenlines from unsplash

Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3189046

Abstract: With advanced 5G/6G networks, data-driven interconnected devices will increase exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure information extraction to apply digital services, medical diagnoses, and financial forecasting. This introduction… read more here.

Keywords: industrial internet; mitigating malicious; evasion attacks; internet things ... See more keywords
Photo by fresonneveld from unsplash

Robust Data-Driven Detection of Electricity Theft Adversarial Evasion Attacks in Smart Grids

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3193989

Abstract: Existing machine learning-based detectors of electricity theft cyberattacks are trained to detect only simple traditional types of cyberattacks while neglecting complex ones like evasion attacks. This paper analyzes the robustness of electricity theft detectors against… read more here.

Keywords: evasion attacks; electricity theft; tex math; inline formula ... See more keywords