Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

A detailed survey on federated learning attacks and defenses

HS Sikandar, H Waheed, S Tahir, SUR Malik… - Electronics, 2023 - mdpi.com
A traditional centralized method of training AI models has been put to the test by the
emergence of data stores and public privacy concerns. To overcome these issues, the …

Vulnerabilities in federated learning

N Bouacida, P Mohapatra - IEEe Access, 2021 - ieeexplore.ieee.org
With more regulations tackling the protection of users' privacy-sensitive data in recent years,
access to such data has become increasingly restricted. A new decentralized training …

A novel deep federated learning-based model to enhance privacy in critical infrastructure systems

A Sharma, SK Singh, A Chhabra, S Kumar… - International Journal of …, 2023 - igi-global.com
Deep learning (DL) can provide critical infrastructure operators with valuable insights and
predictive capabilities to help them make more informed decisions, improving system's …

Adversarial robustness for tabular data through cost and utility awareness

K Kireev, B Kulynych, C Troncoso - arxiv preprint arxiv:2208.13058, 2022 - arxiv.org
Many safety-critical applications of machine learning, such as fraud or abuse detection, use
data in tabular domains. Adversarial examples can be particularly damaging for these …

Towards resilient artificial intelligence: Survey and research issues

O Eigner, S Eresheim, P Kieseberg… - … on Cyber Security …, 2021 - ieeexplore.ieee.org
Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes.
Their resilience against attacks and other environmental influences needs to be ensured just …

Federated learning vulnerabilities, threats and defenses: A systematic review and future directions

S Almutairi, A Barnawi - Internet of Things, 2023 - Elsevier
Today, a broad range of items, ranging from smartphones to smart cars are connected
together via the Internet, also known as the Internet of Things (IoT). The IoT is powered by …

Amaretto: An active learning framework for money laundering detection

D Labanca, L Primerano… - IEEE …, 2022 - ieeexplore.ieee.org
Monitoring financial transactions is a critical Anti-Money Laundering (AML) obligation for
financial institutions. In recent years, machine learning-based transaction monitoring …

Lookin'Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors

M D'Onghia, F Di Cesare, L Gallo, M Carminati… - Proceedings of the 16th …, 2023 - dl.acm.org
Given their generalization capabilities, deep learning algorithms may represent a powerful
weapon in the arsenal of antivirus developers. Nevertheless, recent works in different …

[PDF][PDF] A Bayesian attack-network modeling approach to mitigating malware-based banking cyberattacks

A Zimba - Int J Comput Netw Inf Secur, 2022 - academia.edu
According to Cybersecurity Ventures, the damage related to cybercrime is projected to reach
$6 trillion annually by 2021. The majority of the cyberattacks are directed at financial …