The ai-based cyber threat landscape: A survey
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …
growth in innovation and automation. Although these AI technologies offer significant …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Towards evaluating the robustness of neural networks
Neural networks provide state-of-the-art results for most machine learning tasks.
Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and …
Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and …
An unexpectedly large count of trees in the West African Sahara and Sahel
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
Targeted online password guessing: An underestimated threat
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …
studies have examined targeted online guessing, where an attacker guesses a specific …
Can I opt out yet? GDPR and the global illusion of cookie control
The European Union's (EU) General Data Protection Regulation (GDPR), in effect since May
2018, enforces strict limitations on handling users' personal data, hence impacting their …
2018, enforces strict limitations on handling users' personal data, hence impacting their …
Passgan: A deep learning approach for password guessing
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …
users to check billions of passwords per second against password hashes. In addition to …
Tiresias: Predicting security events through deep learning
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …
only to detect malicious activity as it happens, but also to predict the specific steps that will …
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
Automated crowdturfing attacks and defenses in online review systems
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation
online, but are limited by the costs of hiring and managing human workers. In this paper, we …
online, but are limited by the costs of hiring and managing human workers. In this paper, we …