SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Local model poisoning attacks to {Byzantine-Robust} federated learning

M Fang, X Cao, J Jia, N Gong - 29th USENIX security symposium …, 2020 - usenix.org
In federated learning, multiple client devices jointly learn a machine learning model: each
client device maintains a local model for its local training dataset, while a master device …

Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques

A Kulkarni, V Balachandran… - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers
employ various tactics to deceive users into gathering their sensitive information, potentially …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition

M Sharif, S Bhagavatula, L Bauer… - Proceedings of the 2016 …, 2016 - dl.acm.org
Machine learning is enabling a myriad innovations, including new algorithms for cancer
diagnosis and self-driving cars. The broad use of machine learning makes it important to …

Modeling realistic adversarial attacks against network intrusion detection systems

G Apruzzese, M Andreolini, L Ferretti… - … Threats: Research and …, 2022 - dl.acm.org
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

The cross-evaluation of machine learning-based network intrusion detection systems

G Apruzzese, L Pajola, M Conti - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …

Detecting adversarial image examples in deep neural networks with adaptive noise reduction

B Liang, H Li, M Su, X Li, W Shi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recently, many studies have demonstrated deep neural network (DNN) classifiers can be
fooled by the adversarial example, which is crafted via introducing some perturbations into …

Model-reuse attacks on deep learning systems

Y Ji, X Zhang, S Ji, X Luo, T Wang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Many of today's machine learning (ML) systems are built by reusing an array of, often pre-
trained, primitive models, each fulfilling distinct functionality (eg, feature extraction). The …