A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …
language processing, and data mining. Although deep learning has achieved significant …
From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital
transformation in the year 2022. As the different GenAI models like ChatGPT and Google …
transformation in the year 2022. As the different GenAI models like ChatGPT and Google …
A holistic review of machine learning adversarial attacks in IoT networks
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …
domains, Machine Learning (ML) has become a vital element within the Internet of Things …
Automated machine learning for deep learning based malware detection
A Brown, M Gupta, M Abdelsalam - Computers & Security, 2024 - Elsevier
Deep learning (DL) has proven to be effective in detecting sophisticated malware that is
constantly evolving. Even though deep learning has alleviated the feature engineering …
constantly evolving. Even though deep learning has alleviated the feature engineering …
Analysis of label-flip poisoning attack on machine learning based malware detector
With the increase in machine learning (ML) applications in different domains, incentives for
deceiving these models have reached more than ever. As data is the core backbone of ML …
deceiving these models have reached more than ever. As data is the core backbone of ML …
[HTML][HTML] Authentication technology in internet of things and privacy security issues in typical application scenarios
J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4
M Kaheh, DK Kholgh, P Kostakos - arXiv preprint arXiv:2309.16422, 2023 - arxiv.org
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …
DawnGNN: Documentation augmented windows malware detection using graph neural network
Abstract Application Program Interface (API) calls are widely used in dynamic Windows
malware analysis to characterize the run-time behavior of malware. Researchers have …
malware analysis to characterize the run-time behavior of malware. Researchers have …
Intra-section code cave injection for adversarial evasion attacks on windows pe malware file
Windows malware is predominantly available in cyberspace and is a prime target for
deliberate adversarial evasion attacks. Although researchers have investigated the …
deliberate adversarial evasion attacks. Although researchers have investigated the …
Analyzing and explaining black-box models for online malware detection
In recent years, a significant amount of research has focused on analyzing the effectiveness
of machine learning (ML) models for malware detection. These approaches have ranged …
of machine learning (ML) models for malware detection. These approaches have ranged …