Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
A review of deep learning security and privacy defensive techniques
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
[HTML][HTML] Adversarial attacks on machine learning cybersecurity defences in industrial control systems
The proliferation and application of machine learning-based Intrusion Detection Systems
(IDS) have allowed for more flexibility and efficiency in the automated detection of cyber …
(IDS) have allowed for more flexibility and efficiency in the automated detection of cyber …
Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca
Industrial control systems (ICSs) are widely used and vital to industry and society. Their
failure can have severe impact on both the economy and human life. Hence, these systems …
failure can have severe impact on both the economy and human life. Hence, these systems …
[HTML][HTML] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
Abstract Machine learning based Intrusion Detection Systems (IDS) allow flexible and
efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However …
efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However …
Sponge examples: Energy-latency attacks on neural networks
The high energy costs of neural network training and inference led to the use of acceleration
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …
Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of
energy and information between customers and suppliers. The integration of power …
energy and information between customers and suppliers. The integration of power …
Conaml: Constrained adversarial machine learning for cyber-physical systems
Recent research demonstrated that the superficially well-trained machine learning (ML)
models are highly vulnerable to adversarial examples. As ML techniques are becoming a …
models are highly vulnerable to adversarial examples. As ML techniques are becoming a …
Poisoning attacks on cyber attack detectors for industrial control systems
Recently, neural network (NN)-based methods, including autoencoders, have been
proposed for the detection of cyber attacks targeting industrial control systems (ICSs). Such …
proposed for the detection of cyber attacks targeting industrial control systems (ICSs). Such …
Probabilistic jacobian-based saliency maps attacks
T Combey, A Loison, M Faucher, H Hajri - Machine learning and …, 2020 - mdpi.com
Simple Summary This paper introduces simple, faster and more efficient versions of the
known targeted and untargeted Jacobian-based Saliency Map Attacks (JSMA). Despite …
known targeted and untargeted Jacobian-based Saliency Map Attacks (JSMA). Despite …