The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey

O Ibitoye, R Abou-Khamis, M Shehaby… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …

Raze to the ground: Query-efficient adversarial html attacks on machine-learning phishing webpage detectors

B Montaruli, L Demetrio, M Pintor… - Proceedings of the 16th …, 2023 - dl.acm.org
Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from
adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks …

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

C Miao, J Feng, W You, W Shi, J Huang… - Proceedings of the 2023 …, 2023 - dl.acm.org
Phishing is one of the most popular cyberspace attacks. Phishing detection has been
integrated into mainstream browsers to provide online protection. The phishing detector of …

An adversarial attack analysis on malicious advertisement URL detection framework

E Nowroozi, M Mohammadi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Malicious advertisement URLs pose a security risk since they are the source of cyber-
attacks, and the need to address this issue is growing in both industry and academia …

Multi-SpacePhish: Extending the evasion-space of adversarial attacks against phishing website detectors using machine learning

Y Yuan, G Apruzzese, M Conti - Digital Threats: Research and Practice, 2024 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model or defenses that withstand most attacks. Unfortunately, little …

Comparative study of centrality based adversarial attacks on graph convolutional network model for node classification

AB Nair, G Surendran, KP Prathyun… - 2022 7th …, 2022 - ieeexplore.ieee.org
Graph Convolution Networks (GCNs) are neural networks that can be used to perform
different kinds of analysis and mining activities on graphs. GCNs are neural networks that …

Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data

T Simonetto, S Ghamizi, M Cordy - arXiv preprint arXiv:2406.00775, 2024 - arxiv.org
State-of-the-art deep learning models for tabular data have recently achieved acceptable
performance to be deployed in industrial settings. However, the robustness of these models …

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

B Pleiter, B Tajalli, S Koffas, G Abad, J Xu… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep neural networks (DNNs) have shown great promise in various domains. Alongside
these developments, vulnerabilities associated with DNN training, such as backdoor attacks …

Minimum Selection Feature Importance Guided Attack

R Karumanchi, G Gressel - 2023 IEEE World Conference on …, 2023 - ieeexplore.ieee.org
Machine learning models are under severe threat by adversarial attacks. Machine learning
is swiftly taking on a central role in organizations' value propositions, and as a result …