A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions

T Long, Q Gao, L Xu, Z Zhou - Computers & Security, 2022 - Elsevier
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …

From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy

M Gupta, CK Akiri, K Aryal, E Parker, L Praharaj - IEEE Access, 2023 - ieeexplore.ieee.org
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital
transformation in the year 2022. As the different GenAI models like ChatGPT and Google …

A holistic review of machine learning adversarial attacks in IoT networks

H Khazane, M Ridouani, F Salahdine, N Kaabouch - Future Internet, 2024 - mdpi.com
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …

Automated machine learning for deep learning based malware detection

A Brown, M Gupta, M Abdelsalam - Computers & Security, 2024 - Elsevier
Deep learning (DL) has proven to be effective in detecting sophisticated malware that is
constantly evolving. Even though deep learning has alleviated the feature engineering …

Analysis of label-flip poisoning attack on machine learning based malware detector

K Aryal, M Gupta, M Abdelsalam - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
With the increase in machine learning (ML) applications in different domains, incentives for
deceiving these models have reached more than ever. As data is the core backbone of ML …

[HTML][HTML] Authentication technology in internet of things and privacy security issues in typical application scenarios

J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …

Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4

M Kaheh, DK Kholgh, P Kostakos - arXiv preprint arXiv:2309.16422, 2023 - arxiv.org
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …

DawnGNN: Documentation augmented windows malware detection using graph neural network

P Feng, L Gai, L Yang, Q Wang, T Li, N Xi, J Ma - Computers & Security, 2024 - Elsevier
Abstract Application Program Interface (API) calls are widely used in dynamic Windows
malware analysis to characterize the run-time behavior of malware. Researchers have …

Intra-section code cave injection for adversarial evasion attacks on windows pe malware file

K Aryal, M Gupta, M Abdelsalam, M Saleh - arXiv preprint arXiv …, 2024 - arxiv.org
Windows malware is predominantly available in cyberspace and is a prime target for
deliberate adversarial evasion attacks. Although researchers have investigated the …

Analyzing and explaining black-box models for online malware detection

H Manthena, JC Kimmel, M Abdelsalam… - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, a significant amount of research has focused on analyzing the effectiveness
of machine learning (ML) models for malware detection. These approaches have ranged …