The ai-based cyber threat landscape: A survey

N Kaloudi, J Li - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Towards evaluating the robustness of neural networks

N Carlini, D Wagner - 2017 ieee symposium on security and …, 2017 - ieeexplore.ieee.org
Neural networks provide state-of-the-art results for most machine learning tasks.
Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and …

An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

Can I opt out yet? GDPR and the global illusion of cookie control

I Sanchez-Rola, M Dell'Amico, P Kotzias… - Proceedings of the …, 2019 - dl.acm.org
The European Union's (EU) General Data Protection Regulation (GDPR), in effect since May
2018, enforces strict limitations on handling users' personal data, hence impacting their …

Passgan: A deep learning approach for password guessing

B Hitaj, P Gasti, G Ateniese, F Perez-Cruz - Applied Cryptography and …, 2019 - Springer
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …

Tiresias: Predicting security events through deep learning

Y Shen, E Mariconti, PA Vervier… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …

Data breaches, phishing, or malware? Understanding the risks of stolen credentials

K Thomas, F Li, A Zand, J Barrett, J Ranieri… - Proceedings of the …, 2017 - dl.acm.org
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …

Automated crowdturfing attacks and defenses in online review systems

Y Yao, B Viswanath, J Cryan, H Zheng… - Proceedings of the 2017 …, 2017 - dl.acm.org
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation
online, but are limited by the costs of hiring and managing human workers. In this paper, we …