A survey on systems security metrics
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Adversarial deep ensemble: Evasion attacks and defenses for malware detection
Malware remains a big threat to cyber security, calling for machine learning based malware
detection. While promising, such detectors are known to be vulnerable to evasion attacks …
detection. While promising, such detectors are known to be vulnerable to evasion attacks …
Arms race in adversarial malware detection: A survey
Malicious software (malware) is a major cyber threat that has to be tackled with Machine
Learning (ML) techniques because millions of new malware examples are injected into …
Learning (ML) techniques because millions of new malware examples are injected into …
A framework for enhancing deep neural networks against adversarial malware
Machine learning-based malware detection is known to be vulnerable to adversarial
evasion attacks. The state-of-the-art is that there are no effective defenses against these …
evasion attacks. The state-of-the-art is that there are no effective defenses against these …
Interpreting deep learning-based vulnerability detector predictions based on heuristic searching
Detecting software vulnerabilities is an important problem and a recent development in
tackling the problem is the use of deep learning models to detect software vulnerabilities …
tackling the problem is the use of deep learning models to detect software vulnerabilities …
Improving Adversarial Robustness of Ensemble Classifiers by Diversified Feature Selection and Stochastic Aggregation
F Zhang, K Li, Z Ren - Mathematics, 2024 - mdpi.com
Learning-based classifiers are found to be vulnerable to attacks by adversarial samples.
Some works suggested that ensemble classifiers tend to be more robust than single …
Some works suggested that ensemble classifiers tend to be more robust than single …
Pad: Towards principled adversarial malware detection against evasion attacks
Machine Learning (ML) techniques can facilitate the automation of mal icious soft ware
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …
Optimizing top precision performance measure of content-based image retrieval by learning similarity function
In this paper we study the problem of content-based image retrieval. In this problem, the
most popular performance measure is the top precision measure, and the most important …
most popular performance measure is the top precision measure, and the most important …
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
Abstract Machine learning (ML) based classifiers are vulnerable to evasion attacks, as
shown by recent attacks. However, there is a lack of systematic study of evasion attacks on …
shown by recent attacks. However, there is a lack of systematic study of evasion attacks on …