[HTML][HTML] Gradient-guided hierarchical feature attack for object detector

Y Wang, Y Zheng, L Chen, Z Yang, J Wu… - Journal of King Saud …, 2024 - Elsevier
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which can cause
security risks in computer information systems. Feature disruption attacks, as a typical form …

[HTML][HTML] GSOOA-1DDRSN: Network Traffic Anomaly Detection Based on Deep Residual Shrinkage Networks

F Zuo, D Zhang, L Li, Q He, J Deng - Heliyon, 2024 - cell.com
One of the critical technologies to ensure cyberspace security is network traffic anomaly
detection, which detects malicious attacks by analyzing and identifying network traffic …

[HTML][HTML] Meta learning-based few-shot intrusion detection for 5G-enabled industrial internet

Y Yan, Y Yang, F Shen, M Gao, Y Gu - Complex & Intelligent Systems, 2024 - Springer
With the formation and popularization of the 5G-enabled industrial internet, cybersecurity
risks are increasing, and the limited number of attack samples, such as zero-day, leaves a …