Related references
Note: Only part of the references are listed.Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey
Ke He et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)
Investigating the practicality of adversarial evasion attacks on network intrusion detection
Mohamed Amine Merzouk et al.
ANNALS OF TELECOMMUNICATIONS (2022)
Gray-Box Shilling Attack: An Adversarial Learning Approach
Zongwei Wang et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2022)
Sophos: The State of Ransomware 2022
Steve Mansfield-Devine
Computer Fraud and Security (2022)
Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System
Xiaokang Zhou et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
Rokia Lamrani Alaoui et al.
FUTURE INTERNET (2022)
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
Joao Vitorino et al.
FUTURE INTERNET (2022)
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg et al.
ACM COMPUTING SURVEYS (2021)
The robust deep learning-based schemes for intrusion detection in Internet of Things environments
Xingbing Fu et al.
ANNALS OF TELECOMMUNICATIONS (2021)
A survey on adversarial attacks and defences
Anirban Chakraborty et al.
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY (2021)
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
David J. Miller et al.
PROCEEDINGS OF THE IEEE (2020)
Adversarial Attacks and Defenses in Deep Learning
Kui Ren et al.
ENGINEERING (2020)
A review on machine learning-based approaches for Internet traffic classification
Ola Salman et al.
ANNALS OF TELECOMMUNICATIONS (2020)
Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
Jiao Li et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Study of Adversarial Machine Learning with Infrared Examples for Surveillance Applications
DeMarcus Edwards et al.
ELECTRONICS (2020)
Black-box adversarial sample generation based on differential evolution
Junyu Lin et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2020)
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Bryse Flowers et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity
Sicong Zhang et al.
IEEE ACCESS (2020)
Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review
Nuno Martins et al.
IEEE ACCESS (2020)
Review of Artificial Intelligence Adversarial Attack and Defense Technologies
Shilin Qiu et al.
APPLIED SCIENCES-BASEL (2019)
Adversarial Examples: Attacks and Defenses for Deep Learning
Xiaoyong Yu et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)
One Pixel Attack for Fooling Deep Neural Networks
Jiawei Su et al.
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Hongyu Liu et al.
APPLIED SCIENCES-BASEL (2019)
A taxonomy and survey of attacks against machine learning
Nikolaos Pitropakis et al.
COMPUTER SCIENCE REVIEW (2019)
Domain-Adversarial Training of Neural Networks
Yaroslav Ganin et al.
DOMAIN ADAPTATION IN COMPUTER VISION APPLICATIONS (2017)
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
Manjula C. Belavagi et al.
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 (2016)
Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement
David Moher et al.
SYSTEMATIC REVIEWS (2015)
Security Evaluation of Pattern Classifiers under Attack
Battista Biggio et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)