Cybersecurity for AI systems: A survey

RS Sangwan, Y Badr, SM Srinivasan - Journal of Cybersecurity and …, 2023 - mdpi.com
Recent advances in machine learning have created an opportunity to embed artificial
intelligence in software-intensive systems. These artificial intelligence systems, however …

Adapting membership inference attacks to GNN for graph classification: Approaches and implications

B Wu, X Yang, S Pan, X Yuan - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
In light of the wide application of Graph Neural Networks (GNNs), Membership Inference
Attack (MIA) against GNNs raises severe privacy concerns, where training data can be …

Random noise defense against query-based black-box attacks

Z Qin, Y Fan, H Zha, B Wu - Advances in Neural Information …, 2021 - proceedings.neurips.cc
The query-based black-box attacks have raised serious threats to machine learning models
in many real applications. In this work, we study a lightweight defense method, dubbed …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …

A novel multi-sample generation method for adversarial attacks

M Duan, K Li, J Deng, B **ao, Q Tian - ACM Transactions on Multimedia …, 2022 - dl.acm.org
Deep learning models are widely used in daily life, which bring great convenience to our
lives, but they are vulnerable to attacks. How to build an attack system with strong …

Reverse Engineering of Deceptions on Machine-and Human-Centric Attacks

Y Yao, X Guo, V Asnani, Y Gong, J Liu… - … and Trends® in …, 2024 - nowpublishers.com
This work presents a comprehensive exploration of Reverse Engineering of Deceptions
(RED) in the field of adversarial machine learning. It delves into the intricacies of machine …

EBSNN: Extended byte segment neural network for network traffic classification

X **ao, W **ao, R Li, X Luo, H Zheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network traffic classification is important to intrusion detection and network management.
Most of existing methods are based on machine learning techniques and rely on the …

Stateful defenses for machine learning models are not yet secure against black-box attacks

R Feng, A Hooda, N Mangaokar, K Fawaz… - Proceedings of the …, 2023 - dl.acm.org
Recent work has proposed stateful defense models (SDMs) as a compelling strategy to
defend against a black-box attacker who only has query access to the model, as is common …

Reverse engineering of imperceptible adversarial image perturbations

Y Gong, Y Yao, Y Li, Y Zhang, X Liu, X Lin… - arxiv preprint arxiv …, 2022 - arxiv.org
It has been well recognized that neural network based image classifiers are easily fooled by
images with tiny perturbations crafted by an adversary. There has been a vast volume of …

Transfer attacks revisited: A large-scale empirical study in real computer vision settings

Y Mao, C Fu, S Wang, S Ji, X Zhang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
One intriguing property of adversarial attacks is their “transferability”–an adversarial
example crafted with respect to one deep neural network (DNN) model is often found …