We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 2,181 results
  1. Protection of Computational Machine Learning Models against Extraction Threat

    Abstract

    The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational...

    M. O. Kalinin, M. D. Soshnev, A. S. Konoplev in Automatic Control and Computer Sciences
    Article 01 December 2023
  2. On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications

    We look at two basic coding theoretic and cryptographic mechanisms developed separately and investigate relationships between them and their...
    Karim Eldefrawy, Nicholas Genise, ... Moti Yung in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2021
  3. NBA: defensive distillation for backdoor removal via neural behavior alignment

    Recently, deep neural networks have been shown to be vulnerable to backdoor attacks. A backdoor is inserted into neural networks via this attack...

    Zonghao Ying, Bin Wu in Cybersecurity
    Article Open access 03 July 2023
  4. Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud

    Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools...
    Junchao Wang, Jianmin Pang, ** Wei in Data Science
    Conference paper 2021
  5. CONTINGENT: Advanced Solution to Enhance Cyber Resilience Through Machine Learning Techniques

    The CONTINGENT project, developed under the CYRENE H2020 (Horizon 2020) project [1], is a pioneering initiative by FAVIT [2] to bolster cybersecurity...
    Francisco Pérez Carrasco, Alberto García García, ... Pablo Gimenez Salazar in International Conference on Applied Technologies
    Conference paper 2024
  6. From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity

    Cybersecurity is a growing concern for maritime sector. Modern ships are practical realism of cyber physical systems that utilize both information...

    Awais Yousaf, Jianying Zhou in International Journal of Information Security
    Article 19 January 2024
  7. Proactive Network Defense with Game Theory

    Traditional proactive network defenses deploy security resources in the network based on probabilistic policies to confuse potential attackers....
    Sinong Wang, Ness Shroff in Proactive and Dynamic Network Defense
    Chapter 2019
  8. Combating the Cyber-Security Kill Chain: Moving to a Proactive Security Model

    A former boss of mine (Peter Drissell ( https://www.linkedin.com/in/peter-drissell-b917896/ ) (Commandant...
    Chapter 2021
  9. Transferable adversarial sample purification by expanding the purification space of diffusion models

    Deep neural networks (DNNs) have been demonstrated to be vulnerable to adversarial samples and many powerful defense methods have been proposed to...

    Jun Ji, Song Gao, Wei Zhou in The Visual Computer
    Article 13 February 2024
  10. Proactive Detection of Phishing Kit Traffic

    Current anti-phishing studies mainly focus on either detecting phishing pages or on identifying phishing emails sent to victims. In this paper, we...
    Qian Cui, Guy-Vincent Jourdan, ... Iosif-Viorel Onut in Applied Cryptography and Network Security
    Conference paper 2021
  11. Proactive Defense Through Deception

    Cyberattacks are typically preceded by a reconnaissance phase in which attackers aim at collecting valuable information about the target system,...
    Massimiliano Albanese, Sushil Jajodia in Industrial Control Systems Security and Resiliency
    Chapter 2019
  12. Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning

    As Generative Adversarial Networks continue to evolve, deepfake images have become notably more realistic, escalating societal, economic, and...
    Jaewoo Park, Hong Eun Ahn, ... Taekyoung Kwon in Information Security Applications
    Conference paper 2024
  13. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense

    The increasing instances of advanced attacks call for a new defense paradigm that is active, autonomous, and adaptive, named as the ‘3A’ defense...
    Linan Huang, Quanyan Zhu in Adaptive Autonomous Secure Cyber Systems
    Chapter 2020
  14. Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System

    With the increasing understanding of attackers towards the characteristics of control systems and the growing connectivity with information...
    Seong-Su Yoon, Do-Yeon Kim, ... Ieck-Chae Euom in Information Security Applications
    Conference paper 2024
  15. Adversarial defence by learning differentiated feature representation in deep ensemble

    Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful...

    ** Chen, Huang Wei, ... Zhizhong Zhou in Machine Vision and Applications
    Article 01 July 2024
  16. Securing recommender system via cooperative training

    Recommender systems are often susceptible to well-crafted fake profiles, leading to biased recommendations. Among existing defense methods,...

    Qingyang Wang, Chenwang Wu, ... Enhong Chen in World Wide Web
    Article 04 October 2023
  17. Cyber Deception Techniques, Strategies, and Human Aspects

    This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber...
    Tiffany Bao, Milind Tambe, Cliff Wang in Advances in Information Security
    Book 2023
  18. Conventional Defense Technologies

    From the perspective of technology, the current cyberspace defense methods fall into three categories: the first category focuses on the protection...
    Jiangxing Wu in Cyberspace Mimic Defense
    Chapter 2020
  19. Deep learning adversarial attacks and defenses on license plate recognition system

    The breakthroughs in Machine learning and deep neural networks have revolutionized the handling of critical practical challenges, achieving...

    Conrado Vizcarra, Shadan Alhamed, ... Muhammad Anan in Cluster Computing
    Article Open access 01 June 2024
  20. AI-Enabled Cybersecurity for IoT and Smart City Applications

    AI-driven cybersecurity is crucial to enhancing the resilience of the Internet of Things (IoT) and smart city ecosystems. Due to the dynamic and...
    Chapter 2024
Did you find what you were looking for? Share feedback.