A taxonomy and survey of attacks against machine learning

N Pitropakis, E Panaousis, T Giannetsos… - Computer Science …, 2019 - Elsevier
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …

A review of spam email detection: analysis of spammer strategies and the dataset shift problem

F Jáñez-Martino, R Alaiz-Rodríguez… - Artificial Intelligence …, 2023 - Springer
Spam emails have been traditionally seen as just annoying and unsolicited emails
containing advertisements, but they increasingly include scams, malware or phishing. In …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks

D Li, D Chen, B Jin, L Shi, J Goh, SK Ng - International conference on …, 2019 - Springer
Many real-world cyber-physical systems (CPSs) are engineered for mission-critical tasks
and usually are prime targets for cyber-attacks. The rich sensor data in CPSs can be …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2022 - Elsevier
Malware is constantly evolving with rising concern for cyberspace. Deep learning-based
malware detectors are being used as a potential solution. However, these detectors are …

Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks

A Demontis, M Melis, M Pintor, M Jagielski… - 28th USENIX security …, 2019 - usenix.org
Transferability captures the ability of an attack against a machine-learning model to be
effective against a different, potentially unknown, model. Empirical evidence for …

Adversarial malware binaries: Evading deep learning for malware detection in executables

B Kolosnjaji, A Demontis, B Biggio… - 2018 26th European …, 2018 - ieeexplore.ieee.org
Machine learning has already been exploited as a useful tool for detecting malicious
executable files. Data retrieved from malware samples, such as header fields, instruction …

A survey on security threats and defensive techniques of machine learning: A data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung - IEEE access, 2018 - ieeexplore.ieee.org
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …