Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

A survey on adversarial attack in the age of artificial intelligence

Z Kong, J Xue, Y Wang, L Huang… - … and Mobile Computing, 2021 - Wiley Online Library
With the rapid evolution of the Internet, the application of artificial intelligence fields is more
and more extensive, and the era of AI has come. At the same time, adversarial attacks in the …

Aragorn: A Privacy-Enhancing System for Mobile Cameras

H Venugopalan, ZA Din, T Carpenter… - Proceedings of the …, 2024 - dl.acm.org
Mobile app developers often rely on cameras to implement rich features. However, giving
apps unfettered access to the mobile camera poses a privacy threat when camera frames …

Enabling Fraud Prediction on Preliminary Data Through Information Density Booster

H Zhu, C Wang - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
In online lending services, fraud prediction is an especially critical step to control loss risk
and improve processing efficiency. Unfortunately, it is definitely challenging since the ex …

Credit card fraud is a computer security problem

ST King, N Scaife, P Traynor, Z Abi Din… - IEEE Security & …, 2021 - ieeexplore.ieee.org
Credit Card Fraud Is a Computer Security Problem Page 1 1540-7993/21©2021IEEE
Copublished by the IEEE Computer and Reliability Societies March/April 2021 65 Editors …

Ethics in security research: Visions, reality, and paths forward

Y Zhang, M Liu, M Zhang, C Lu… - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Ethics has become a prevalent and important criterion for academic research. However,
achieving ethical compliance in practice is a highly complex and specialized task. In the field …

Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments

Z Abi Din, H Venugopalan, H Lin… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
App builders commonly use security challenges, a form of step-up authentication, to add
security to their apps. However, the ethical implications of this type of architecture has not …

FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies

H Venugopalan, S Munir, S Ahmed, T Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
As browser fingerprinting is increasingly being used for bot detection, bots have started
altering their fingerprints for evasion. We conduct the first large-scale evaluation of evasive …

[PDF][PDF] Poster: Etrigan: Large Scale Adversarial Analysis of Elusive Bots

H Venugopalan, S Munir, ST King, Z Shafiq - sp2024.ieee-security.org
The proportion of malicious bots on the web is on the rise [7]. As of 2023, bots constitute
around 47.5% of online traffic [10], with 63.6% of those being malicious bots. Fraudsters …