A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
A survey on adversarial attack in the age of artificial intelligence
Z Kong, J Xue, Y Wang, L Huang… - … and Mobile Computing, 2021 - Wiley Online Library
With the rapid evolution of the Internet, the application of artificial intelligence fields is more
and more extensive, and the era of AI has come. At the same time, adversarial attacks in the …
and more extensive, and the era of AI has come. At the same time, adversarial attacks in the …
{CADE}: Detecting and explaining concept drift samples for security applications
Concept drift poses a critical challenge to deploy machine learning models to solve practical
security problems. Due to the dynamic behavior changes of attackers (and/or the benign …
security problems. Due to the dynamic behavior changes of attackers (and/or the benign …
BODMAS: An open dataset for learning based temporal analysis of PE malware
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …
efforts in machine learning based malware analysis. By closely examining existing open PE …
Stealing links from graph neural networks
Graph data, such as chemical networks and social networks, may be deemed
confidential/private because the data owner often spends lots of resources collecting the …
confidential/private because the data owner often spends lots of resources collecting the …
PDF malware detection based on optimizable decision trees
Portable document format (PDF) files are one of the most universally used file types. This
has incentivized hackers to develop methods to use these normally innocent PDF files to …
has incentivized hackers to develop methods to use these normally innocent PDF files to …
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
RS-Del: Edit distance robustness certificates for sequence classifiers via randomized deletion
Randomized smoothing is a leading approach for constructing classifiers that are certifiably
robust against adversarial examples. Existing work on randomized smoothing has focused …
robust against adversarial examples. Existing work on randomized smoothing has focused …
Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …
is an essential part of automatic defense against network attacks. Powered by dedicated …