PATRIoTA: A Similarity-based IoT Malware Detection Method Robust Against Adversarial Samples

J Sándor, R Nagy, L Buttyán - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Detecting malware targeting IoT devices has became an important challenge with the recent
emergence of IoT botnets. Gateways at the edge between the Internet and IoT devices …

Adversarial patterns: Building robust android malware classifiers

D Bhusal, N Rastogi - arXiv preprint arXiv:2203.02121, 2022 - arxiv.org
Machine learning models are increasingly being adopted across various fields, such as
medicine, business, autonomous vehicles, and cybersecurity, to analyze vast amounts of …

Chaotic Variational Auto encoder-based Adversarial Machine Learning

PVS Reddy, Y Vivek, G Pranay, V Ravi - arXiv preprint arXiv:2302.12959, 2023 - arxiv.org
Machine Learning (ML) has become the new contrivance in almost every field. This makes
them a target of fraudsters by various adversary attacks, thereby hindering the performance …

Improving Adversarial Attacks Against MalConv

J Burr - 2022 - scholar.dsu.edu
This dissertation proposes several improvements to existing adversarial attacks against
MalConv, a raw-byte malware classifier for Windows PE files. The included contributions …

Enhancing Edge IoT Digital Forensics with Machine Learning Based Cyber Attacks Classification and Reconstruction

E Becker - 2023 - search.proquest.com
Abstract Internet of Things (IoT) devices are an integral part of our cyber infrastructure. Edge
IoT devices, specifically, are utilized where time matters most, but they do not have many …

[PDF][PDF] Fashion Image Retrieval based on Parallel Branched Attention Network

SM Buddhacharya, S Adhikari… - International Journal of …, 2022 - academia.edu
With the increase in vision-associated applications in e-commerce, image retrieval has
become an emerging application in computer vision. Matching the exact user clothes from …

A Data-Driven Approach for Early Detection of Cryptographic Windows Ransomware

MA Ayub - 2023 - search.proquest.com
Ransomware attacks have captured news headlines worldwide for the last few years due to
their criticality and intensity. Ransomware-as-a-Service (RaaS) kits are aiding adversaries to …

Security-Enhanced Authentication and Privacy Preserving Schemes for Smart Grid Infrastructure

I Yilmaz - 2022 - search.proquest.com
With advancements in technology, the Smart grid has been a critical upgradeto the
traditional grid leading to integration of cyber with physical systems, andenhanced …

[PDF][PDF] Make your IoT environments robust against adversarial machine learning malware threats: a code-cave approach

H Haddadpajouh, A Dehghantanha - sdiotsec.github.io
As the integration of Internet of Things devices continues to increase, the security challenges
associated with autonomous, self-executing Internet of Things devices become increasingly …