Adversarial machine learning for network intrusion detection systems: A comprehensive survey

K He, DD Kim, MR Asghar - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …

A survey of algorithmic recourse: contrastive explanations and consequential recommendations

AH Karimi, G Barthe, B Schölkopf, I Valera - ACM Computing Surveys, 2022 - dl.acm.org
Machine learning is increasingly used to inform decision making in sensitive situations
where decisions have consequential effects on individuals' lives. In these settings, in …

Explainable ai: A review of machine learning interpretability methods

P Linardatos, V Papastefanopoulos, S Kotsiantis - Entropy, 2020 - mdpi.com
Recent advances in artificial intelligence (AI) have led to its widespread industrial adoption,
with machine learning systems demonstrating superhuman performance in a significant …

Generative adversarial networks: A survey toward private and secure applications

Z Cai, Z Xiong, H Xu, P Wang, W Li, Y Pan - ACM Computing Surveys …, 2021 - dl.acm.org
Generative Adversarial Networks (GANs) have promoted a variety of applications in
computer vision and natural language processing, among others, due to its generative …

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Z Ahmad, A Shahid Khan, C Wai Shiang… - Transactions on …, 2021 - Wiley Online Library
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …

Enhancing the transferability of adversarial attacks through variance tuning

X Wang, K He - Proceedings of the IEEE/CVF conference on …, 2021 - openaccess.thecvf.com
Deep neural networks are vulnerable to adversarial examples that mislead the models with
imperceptible perturbations. Though adversarial attacks have achieved incredible success …

Frequency domain model augmentation for adversarial attack

Y Long, Q Zhang, B Zeng, L Gao, X Liu, J Zhang… - European conference on …, 2022 - Springer
For black-box attacks, the gap between the substitute model and the victim model is usually
large, which manifests as a weak attack performance. Motivated by the observation that the …

When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

LAS-AT: adversarial training with learnable attack strategy

X Jia, Y Zhang, B Wu, K Ma… - Proceedings of the …, 2022 - openaccess.thecvf.com
Adversarial training (AT) is always formulated as a minimax problem, of which the
performance depends on the inner optimization that involves the generation of adversarial …

Explainable deep learning for efficient and robust pattern recognition: A survey of recent developments

X Bai, X Wang, X Liu, Q Liu, J Song, N Sebe, B Kim - Pattern Recognition, 2021 - Elsevier
Deep learning has recently achieved great success in many visual recognition tasks.
However, the deep neural networks (DNNs) are often perceived as black-boxes, making …