Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …

A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

[HTML][HTML] Adversarial attacks on machine learning cybersecurity defences in industrial control systems

E Anthi, L Williams, M Rhode, P Burnap… - Journal of Information …, 2021 - Elsevier
The proliferation and application of machine learning-based Intrusion Detection Systems
(IDS) have allowed for more flexibility and efficiency in the automated detection of cyber …

Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca

M Kravchik, A Shabtai - IEEE transactions on dependable and …, 2021 - ieeexplore.ieee.org
Industrial control systems (ICSs) are widely used and vital to industry and society. Their
failure can have severe impact on both the economy and human life. Hence, these systems …

[HTML][HTML] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks

E Anthi, L Williams, A Javed, P Burnap - computers & security, 2021 - Elsevier
Abstract Machine learning based Intrusion Detection Systems (IDS) allow flexible and
efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However …

Sponge examples: Energy-latency attacks on neural networks

I Shumailov, Y Zhao, D Bates… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The high energy costs of neural network training and inference led to the use of acceleration
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …

Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)

PH Mirzaee, M Shojafar, H Cruickshank… - IEEE access, 2022 - ieeexplore.ieee.org
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of
energy and information between customers and suppliers. The integration of power …

Conaml: Constrained adversarial machine learning for cyber-physical systems

J Li, Y Yang, JS Sun, K Tomsovic, H Qi - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Recent research demonstrated that the superficially well-trained machine learning (ML)
models are highly vulnerable to adversarial examples. As ML techniques are becoming a …

Poisoning attacks on cyber attack detectors for industrial control systems

M Kravchik, B Biggio, A Shabtai - Proceedings of the 36th Annual ACM …, 2021 - dl.acm.org
Recently, neural network (NN)-based methods, including autoencoders, have been
proposed for the detection of cyber attacks targeting industrial control systems (ICSs). Such …

Probabilistic jacobian-based saliency maps attacks

T Combey, A Loison, M Faucher, H Hajri - Machine learning and …, 2020 - mdpi.com
Simple Summary This paper introduces simple, faster and more efficient versions of the
known targeted and untargeted Jacobian-based Saliency Map Attacks (JSMA). Despite …