Diffusion containment in complex networks through collective influence of connections

Y Liu, G Liang, X Wang, P Zhu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We study the containment of diffusion in a network immunization perspective, whose
solution also plays fundamental roles in scenarios such as the inference of rumor sources …

RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning

Y Zhong, Z Wang, X Shi, J Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fine-grained attack detection is an important network security task. A large number of
machine learning/deep learning (ML/DL) based algorithms have been proposed. However …

Guided erasable adversarial attack (GEAA) toward shared data protection

M Zhao, B Wang, W Wang, Y Kong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, there has been increasing interest in studying the adversarial attack, which
poses potential risks to deep learning applications and has stimulated numerous …

[HTML][HTML] Defeating deep learning based de-anonymization attacks with adversarial example

H Yin, Y Liu, Y Li, Z Guo, Y Wang - Journal of Network and Computer …, 2023 - Elsevier
Deep learning (DL) technologies bring new threats to network security. Website
fingerprinting attacks (WFA) using DL models can distinguish victim's browsing activities …

A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers

PP do Nascimento, P Pereira, JM Mialaret, I Ferreira… - Computers & …, 2021 - Elsevier
Web server outages caused by a Distributed Denial of Service (DDoS) attacks have
increased considerably over the years. Intrusion Detection Systems (IDS) are not sufficient to …

Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection

A Saadat, Y Faheem, Z Abaid, MM Fraz - Journal of Systems Architecture, 2024 - Elsevier
Recent advancements in cloud computing have underscored the critical need for robust
security mechanisms to counter evolving cyber-threats. Traditional security solutions such as …

Markov-based malware propagation modeling and analysis in multi-layer networks

S Karageorgiou, V Karyotis - Network, 2022 - mdpi.com
In this paper, we focus on the dynamics of the spread of malicious software (malware) in
multi-layer networks of various types, eg, cyber-physical systems. Recurring malware has …

From Traces to Packets: Realistic Deep Learning Based Multi-Tab Website Fingerprinting Attacks

H Yin, Y Liu, Z Guo, Y Wang - Tsinghua Science and …, 2024 - ieeexplore.ieee.org
Recent advancements in deep learning (DL) have introduced new security challenges in the
form of side-channel attacks. A prime example is the website fingerprinting attack (WFA) …

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI

C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …

Rethinking maximum-margin softmax for adversarial robustness

M Hassanin, N Moustafa, M Tahtali, KKR Choo - Computers & Security, 2022 - Elsevier
Learning discriminative features with adversarial behaviors can be extremely challenging to
build a robust learning model. This is partly evidenced by the difficulties in training robust …