[PDF][PDF] The Identification of Network Intrusions with Generative Artificial Intelligence Approach for Cybersecurity

H Sinha - Journal of Web Applications and Cyber Security, 2024 - researchgate.net
Generative Artificial Intelligence (Generative AI) offers a paradigm shift to the way robots
perceive and interact with data. Generative AI approaches aim to produce new data samples …

Black-Box Adversarial Attacks Against SQL Injection Detection Model

M Alqhtani, D Alghazzawi, S Alarifi - Contemporary Mathematics, 2024 - ojs.wiserpub.com
Abstract Structured Query Language (SQL) injection attacks represent a substantial threat to
the security of web applications, making the development of effective detection techniques …

Defending AI Models Against Adversarial Attacks in Smart Grids Using Deep Learning

GA Sampedro, S Ojo, M Krichen, MA Alamro… - IEEE …, 2024 - ieeexplore.ieee.org
Adversarial attacks involve manipulating data to trick Artificial Intelligence (AI) models,
making false predictions or classifications or even disrupting the normal functions of the …

StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems

PS Bouzinis, P Radoglou-Grammatikis, I Makris… - arxiv preprint arxiv …, 2024 - arxiv.org
Federated learning (FL) is a decentralized learning technique that enables participating
devices to collaboratively build a shared Machine Leaning (ML) or Deep Learning (DL) …

Evaluating the Efficacy of AI Techniques in Textual Anonymization: A Comparative Study

D Asimopoulos, I Siniosoglou… - 2024 7th …, 2024 - ieeexplore.ieee.org
In the digital era, with escalating privacy concerns, it's imperative to devise robust strategies
that protect private data while maintaining the intrinsic value of textual information. This …

AAG: Adversarial Attack Generator for evaluating the robustness of Machine Learning Models against Adversarial Attacks

DC Asimopoulos… - … Conference on Big …, 2024 - ieeexplore.ieee.org
With the ongoing integration of machine learning models into critical infrastructure, the
resilience of these systems against adversarial attacks is important for all domains. This …

Enhancing Text Anonymisation: A Study on CRF, LSTM, and ELMo for Advanced Entity Recognition

I Siniosoglou, D Asimopoulos… - … on Electronics & …, 2024 - ieeexplore.ieee.org
It is essential to create effective strategies for safeguarding private data while preserving the
value of textual data in the face of rising privacy concerns in the digital era. In this research …

Diffusion-Powered Data Augmentation and Explainable Boosting Ensemble Learning for Cyber Attack Detection in Industrial Networks

TT Nguyen, PH Nguyen, HN Nguyen - Available at SSRN 4945046 - papers.ssrn.com
Abstract In the Industry 4.0 era, detecting cyber attacks on industrial networks, especially
industrial control systems (ICS), has become increasingly important and challenging. This …