SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Local model poisoning attacks to {Byzantine-Robust} federated learning
In federated learning, multiple client devices jointly learn a machine learning model: each
client device maintains a local model for its local training dataset, while a master device …
client device maintains a local model for its local training dataset, while a master device …
Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers
employ various tactics to deceive users into gathering their sensitive information, potentially …
employ various tactics to deceive users into gathering their sensitive information, potentially …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
Machine learning is enabling a myriad innovations, including new algorithms for cancer
diagnosis and self-driving cars. The broad use of machine learning makes it important to …
diagnosis and self-driving cars. The broad use of machine learning makes it important to …
Modeling realistic adversarial attacks against network intrusion detection systems
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …
creating novel defensive opportunities but also new types of risks. Multiple researches have …
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
The cross-evaluation of machine learning-based network intrusion detection systems
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …
Detecting adversarial image examples in deep neural networks with adaptive noise reduction
Recently, many studies have demonstrated deep neural network (DNN) classifiers can be
fooled by the adversarial example, which is crafted via introducing some perturbations into …
fooled by the adversarial example, which is crafted via introducing some perturbations into …
Model-reuse attacks on deep learning systems
Many of today's machine learning (ML) systems are built by reusing an array of, often pre-
trained, primitive models, each fulfilling distinct functionality (eg, feature extraction). The …
trained, primitive models, each fulfilling distinct functionality (eg, feature extraction). The …