… In particular, we evaluate the loss based on xi when perturbing a node vi in the graph. Thus, the loss change for a selected node xi can be defined and described as follows: …
… different graphattacks and defenses along with their contributions and limitations, as well as summarize the evaluation … Besides the applications mentioned above, attackinggraphs in …
… from the poison attack [17, 19], where the target model is retrained on the attackedgraph. In … is significantly larger than those commonly used in existing graphattack studies [19, 25, 26]. …
… ATLAS recovers attack steps and construct attack stories with an average of 91.06% … security investigators with a new means of identifying the attack events that make up the attack …
W Wang, Y Shang, Y He, Y Li, J Liu - Information Sciences, 2020 - Elsevier
… flow-based features as well as 3 graphbased features from network traffic to characterize the behavior of botnets. We perform hybrid analysis of flow based and graphbased features of …
Y Wu, D Wei, J Feng - Security and Communication Networks, 2020 - Wiley Online Library
… , especially in cybersecurity. In this paper, we offer a review on attack detection methods involving … Specifically, we firstly summarize fundamental problems of networksecurity and attack …
Y Li, B Cao, M Peng, L Zhang, L Zhang… - … on Networking, 2020 - ieeexplore.ieee.org
… • We examine the attack strategy based on network load using a stochastic model, and derive the expression of the probability to conduct a successful double-spending attack. The …
… attackedgraphs respectively. δA = A′ −A is the difference between the clean and attacked graphs … added to the clean graph or removed from it as a result of the attack. We compute the …
… For instance, we achieve 0.98 attack AUC on the DD dataset. Third, … graph reconstruction attack that can reconstruct a graph that has similar graph structural statistics to the target graph. …