Classification features for attack detection in collaborative recommender systems

R Burke, B Mobasher, C Williams… - Proceedings of the 12th …, 2006 - dl.acm.org
… user profiles for their utility in attack detection. We show that a machine learning classification
approach that includes attributes derived from attack models is more successful than more …

Practical Order Attack in Deep Ranking

M Zhou, L Wang, Z Niu, Q Zhang, X Yinghui, N Zheng… - openreview.net
… In the first row, ieresults for a “Machine Learning” textbook query, the similarity score of the
5-th to 7-th candidates are 0.9242. The score of the 9-th to 11-th candidates are 0.9240. That …

Perturbation-Invariant Adversarial Training for Neural Ranking Models: Improving the Effectiveness-Robustness Trade-Off

YA Liu, R Zhang, M Zhang, W Chen… - Proceedings of the …, 2024 - ojs.aaai.org
attacks aimed at ranking improvement, we denote πn(q, di) = πy(q, di) − 1 as the neighborhood
rank … Finally, we evaluate the defense performance of ranking models using the attacked

[PDF][PDF] Detection of Rank, Sybil and Wormhole Attacks on RPL Based Network Using Trust Mechanism.

AW Burange, VM Deshmukh - ACI@ ISIC, 2022 - ceur-ws.org
attack detection of some topological & identity attacks like rank attack, wormhole attack and
Sybil attack … IDS based on machine learning to indentify and prevent these attacks to make …

Bit-flip attack: Crushing neural network with progressive bit search

AS Rakin, Z He, D Fan - Proceedings of the IEEE/CVF …, 2019 - openaccess.thecvf.com
… l in lth layer is performed through gradient ranking. With the … Then, we descendingly rank
the vulnerability of bits by the absolute value of their gradients ∂L/∂b and elect the bits whose …

Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

PS Nandhini, S Kuppuswami, S Malliga… - The Journal of …, 2023 - Springer
… of attacks including rank attacks, version attacks, flood attacks and so forth. Rank attack is a
major attack … Since rank attacks have a significant adverse effect on the network, an effort has …

[HTML][HTML] A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks

PP Ioulianou, VG Vassilakis… - Journal of Cybersecurity …, 2022 - mdpi.com
… impact of combined rank and blackhole attacks is studied by … devices attack the RPL-based
network by advertising false rank … Therefore, a machine learning approach would be more …

Are neural ranking models robust?

C Wu, R Zhang, J Guo, Y Fan, X Cheng - ACM Transactions on …, 2022 - dl.acm.org
… definition as shown in the research from the machine learning (ML) community [80… Then,
we analyze the defensive ability of different ranking models against the word-level query attack. …

Exploiting the relationship between kendall's rank correlation and cosine similarity for attribution protection

F Wang, AWK Kong - Advances in Neural Information …, 2022 - proceedings.neurips.cc
… To evaluate our method under attribution attack, the iterative feature importance attacks (IFIA)
using top-k intersection as dissimilarity function (top-k) [8] is adapted. IFIA generates …

RPL assessment using the rank attack in static and mobile environments

S Ibrahimy, H Lamaazi… - … Conference on Innovation …, 2020 - ieeexplore.ieee.org
… The goal of this work was to study rank attack as one of the more dangerous attacks that
affect the RPL routing protocol. We measured the RPL rank attack with the standard RPL and …