Machine learning in cybersecurity: A review of threat detection and defense mechanisms

UI Okoli, OC Obi, AO Adewusi… - World Journal of Advanced …, 2024 - wjarr.com
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light
of the increasing complexity of cyber threats, it is imperative to develop and implement …

Adversarial Machine Learning in the Context of Network Security: Challenges and Solutions

M Khan, L Ghafoor - Journal of Computational Intelligence …, 2024 - thesciencebrigade.com
With the increasing sophistication of cyber threats, the integration of machine learning (ML)
techniques in network security has become imperative for detecting and mitigating evolving …

A comprehensive review and analysis of deep learning-based medical image adversarial attack and defense

GW Muoka, D Yi, CC Ukwuoma, A Mutale, CJ Ejiyi… - Mathematics, 2023 - mdpi.com
Deep learning approaches have demonstrated great achievements in the field of computer-
aided medical image analysis, improving the precision of diagnosis across a range of …

Apollon: a robust defense system against adversarial machine learning attacks in intrusion detection systems

A Paya, S Arroni, V García-Díaz, A Gómez - Computers & Security, 2024 - Elsevier
Abstract The rise of Adversarial Machine Learning (AML) attacks is presenting a significant
challenge to Intrusion Detection Systems (IDS) and their ability to detect threats. To address …

Adversarial robustness through random weight sampling

Y Ma, M Dong, C Xu - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Deep neural networks have been found to be vulnerable in a variety of tasks. Adversarial
attacks can manipulate network outputs, resulting in incorrect predictions. Adversarial …

Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

BD Son, NT Hoa, T Van Chien, W Khalid… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G)
networks due to dense connectivity, ultrareliability, low latency, and high throughput …

Ethics and responsible AI deployment

P Radanliev, O Santos, A Brandon-Jones… - Frontiers in Artificial …, 2024 - frontiersin.org
As Artificial Intelligence (AI) becomes more prevalent, protecting personal privacy is a critical
ethical issue that must be addressed. This article explores the need for ethical AI systems …

Radio frequency fingerprinting techniques for device identification: a survey

S Abbas, M Abu Talib, Q Nasir, S Idhis… - International Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) paradigm and the advanced wireless technologies of
5G and beyond are expected to enable diverse applications such as autonomous driving …

Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions

O Mengara, A Avila, TH Falk - IEEE Access, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) classifiers are potent instruments that can be used in various
security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that …

The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence

D Lopes Antunes, S Llopis Sanchez - Proceedings of the 18th …, 2023 - dl.acm.org
Cyber deception has emerged as a valuable technique in the field of cybersecurity, closely
linked with adversarial Artificial Intelligence. In an era of pervasive automation, it is getting …