A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Adversarial deep ensemble: Evasion attacks and defenses for malware detection

D Li, Q Li - IEEE Transactions on Information Forensics and …, 2020 - ieeexplore.ieee.org
Malware remains a big threat to cyber security, calling for machine learning based malware
detection. While promising, such detectors are known to be vulnerable to evasion attacks …

Arms race in adversarial malware detection: A survey

D Li, Q Li, Y Ye, S Xu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Malicious software (malware) is a major cyber threat that has to be tackled with Machine
Learning (ML) techniques because millions of new malware examples are injected into …

A framework for enhancing deep neural networks against adversarial malware

D Li, Q Li, Y Ye, S Xu - IEEE Transactions on Network Science …, 2021 - ieeexplore.ieee.org
Machine learning-based malware detection is known to be vulnerable to adversarial
evasion attacks. The state-of-the-art is that there are no effective defenses against these …

Interpreting deep learning-based vulnerability detector predictions based on heuristic searching

D Zou, Y Zhu, S Xu, Z Li, H **, H Ye - ACM Transactions on Software …, 2021 - dl.acm.org
Detecting software vulnerabilities is an important problem and a recent development in
tackling the problem is the use of deep learning models to detect software vulnerabilities …

Improving Adversarial Robustness of Ensemble Classifiers by Diversified Feature Selection and Stochastic Aggregation

F Zhang, K Li, Z Ren - Mathematics, 2024 - mdpi.com
Learning-based classifiers are found to be vulnerable to attacks by adversarial samples.
Some works suggested that ensemble classifiers tend to be more robust than single …

Pad: Towards principled adversarial malware detection against evasion attacks

D Li, S Cui, Y Li, J Xu, F **ao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) techniques can facilitate the automation of mal icious soft ware
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …

Optimizing top precision performance measure of content-based image retrieval by learning similarity function

RZ Liang, L Shi, H Wang, J Meng… - 2016 23rd …, 2016 - ieeexplore.ieee.org
In this paper we study the problem of content-based image retrieval. In this problem, the
most popular performance measure is the top precision measure, and the most important …

Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers

F Song, Y Lei, S Chen, L Fan… - International Journal of …, 2021 - Wiley Online Library
Abstract Machine learning (ML) based classifiers are vulnerable to evasion attacks, as
shown by recent attacks. However, there is a lack of systematic study of evasion attacks on …