Evaluating machine learning algorithms for detecting DDoS attacks

M Suresh, R Anitha - Advances in Network Security and Applications: 4th …, 2011 - Springer
… Twenty-three features are collected and ranking the twenty-three features is done with
Information Gain and Chi-Square statistic which reduces the number of features to eight. All the …

When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks

O Suciu, R Marginean, Y Kaya, H Daume III… - 27th USENIX Security …, 2018 - usenix.org
… We focus on targeted poisoning attacks against machine learning classifiers. In this setting,
we refer to the victim classifier as Alice, the owner of the target instance as Bob, and the …

Prada: Practical black-box adversarial attacks against neural ranking models

C Wu, R Zhang, J Guo, M De Rijke, Y Fan… - ACM Transactions on …, 2023 - dl.acm.org
machine learning methods to propose attacks on factorization-based recommendation
systems, which applies the adversarial learning … an adversarial attack for text ranking models. …

Machine learning security: Threats, countermeasures, and evaluations

M Xue, C Yuan, H Wu, Y Zhang, W Liu - IEEE Access, 2020 - ieeexplore.ieee.org
… or one type of attack, this paper covers all the aspects of machine learning security from
the … The technique first uses low-rank matrix factorization then uses principle component …

Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths

A Bang, UP Rao - Arabian Journal for Science and Engineering, 2023 - Springer
… Anomaly detection models for RPL can be developed using a variety of methods based on
machine learning models, Z-score value analysis, probabilistic or statistical modelling, linear …

Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings

GVK Sasirekha, V Bhanu Prakash, J Bapat… - … Intelligence in Security …, 2022 - Springer
… -parent attacks of RPL. Novelty of our approach is that, in addition to detecting the attack, the
… is used to identify its locality, using Machine Learning (ML) classification at the edge of the …

A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation is the Fixed Point of Adversarial Game

K Ma, Q Xu, J Zeng, G Li, X Cao… - … Analysis and Machine …, 2022 - ieeexplore.ieee.org
… framework for target attacks on pairwise ranking. Specifically, … attacks against pairwise
ranking algorithms. The framework consists of goal of the adversary, knowledge of the attacked

Using machine teaching to identify optimal training-set attacks on machine learners

S Mei, X Zhu - Proceedings of the aaai conference on artificial …, 2015 - ojs.aaai.org
… intersection of machine learning and security: training-set attacks on machine learners. In
such … First we show that optimal training-set attack can be formulated as a bilevel optimization …

Arra: Absolute-relative ranking attack against image retrieval

S Li, X Xu, Z Zhou, Y Yang, G Wang… - Proceedings of the 30th …, 2022 - dl.acm.org
attack scenario. Specifically, we propose two compatible goals for the query-based attack, ie,
absolute ranking attack and relative ranking attack… assign the specific ranks to chosen candi…

Adversarial attacks on an oblivious recommender

K Christakopoulou, A Banerjee - … of the 13th ACM Conference on …, 2019 - dl.acm.org
… of attacks where we explicitly target the top-K recommendations; our machine learning approach
… ity of a low-rank recommender to these learned attacks, serving as further motivation for …