Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system
A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …
academics' and business information systems' attention in recent years. The Internet of …
The neuroconnectionist research programme
A Doerig, RP Sommers, K Seeliger… - Nature Reviews …, 2023 - nature.com
Artificial neural networks (ANNs) inspired by biology are beginning to be widely used to
model behavioural and neural data, an approach we call 'neuroconnectionism'. ANNs have …
model behavioural and neural data, an approach we call 'neuroconnectionism'. ANNs have …
Anti-dreambooth: Protecting users from personalized text-to-image synthesis
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …
design skills, to create realistic images from simple text inputs. With powerful personalization …
Open sesame! universal black box jailbreaking of large language models
Large language models (LLMs), designed to provide helpful and safe responses, often rely
on alignment techniques to align with user intent and social guidelines. Unfortunately, this …
on alignment techniques to align with user intent and social guidelines. Unfortunately, this …
Data-centric artificial intelligence: A survey
Artificial Intelligence (AI) is making a profound impact in almost every domain. A vital enabler
of its great success is the availability of abundant and high-quality data for building machine …
of its great success is the availability of abundant and high-quality data for building machine …
{X-Adv}: Physical adversarial object attacks against x-ray prohibited item detection
Adversarial attacks are valuable for evaluating the robustness of deep learning models.
Existing attacks are primarily conducted on the visible light spectrum (eg, pixel-wise texture …
Existing attacks are primarily conducted on the visible light spectrum (eg, pixel-wise texture …
Robust semantic communications with masked VQ-VAE enabled codebook
Although semantic communications have exhibited satisfactory performance on a large
number of tasks, the impact of semantic noise and the robustness of the systems have not …
number of tasks, the impact of semantic noise and the robustness of the systems have not …
Structure invariant transformation for better adversarial transferability
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …
examples, there is an urgent need for an effective adversarial attack to identify the …
Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …
been gaining significant attention due to the rapidly growing applications of deep learning in …