Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems
暂无分享,去创建一个
[1] Tudor Dumitras,et al. Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks , 2019, USENIX Security Symposium.
[2] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[3] Nicholas Carlini,et al. Stateful Detection of Black-Box Adversarial Attacks , 2019, Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence.
[4] Rui Li,et al. Driver Behavior Recognition via Interwoven Deep Convolutional Neural Nets With Multi-Stream Inputs , 2018, IEEE Access.
[5] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[6] David M. W. Powers,et al. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.
[7] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[8] David A. Forsyth,et al. SafetyNet: Detecting and Rejecting Adversarial Examples Robustly , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[9] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[10] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[11] Christian Gagné,et al. Robustness to Adversarial Examples through an Ensemble of Specialists , 2017, ICLR.
[12] W. Brendel,et al. Foolbox: A Python toolbox to benchmark the robustness of machine learning models , 2017 .
[13] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[14] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[15] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[16] M. Omair Shafiq,et al. The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey , 2019, ArXiv.
[17] Matthias Bethge,et al. Towards the first adversarially robust neural network model on MNIST , 2018, ICLR.
[18] Junaid Qadir,et al. The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? , 2019, IEEE Network.
[19] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[20] David Bamman,et al. Adversarial Training for Relation Extraction , 2017, EMNLP.
[21] Paul Patras,et al. ZipNet-GAN: Inferring Fine-grained Mobile Traffic Patterns via a Generative Adversarial Neural Network , 2017, CoNEXT.
[22] Kenneth T. Co,et al. Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks , 2018, CCS.
[23] Douglas Heaven,et al. Why deep-learning AIs are so easy to fool , 2019, Nature.
[24] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[25] Nhien-An Le-Khac,et al. Black Box Attacks on Deep Anomaly Detectors , 2019, ARES.
[26] Yuguang Fang,et al. Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[27] Xu Chen,et al. Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.
[28] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[29] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[30] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[31] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[32] Dale Schuurmans,et al. Learning with a Strong Adversary , 2015, ArXiv.
[33] Yike Guo,et al. TensorLayer: A Versatile Library for Efficient Deep Learning Development , 2017, ACM Multimedia.
[34] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[35] Zheng Wang,et al. Deep Learning-Based Intrusion Detection With Adversaries , 2018, IEEE Access.
[36] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[37] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[38] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[39] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[40] Mei Song,et al. PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows , 2019, IEEE Access.
[41] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[42] Jinfeng Yi,et al. Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach , 2018, ICLR.
[43] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[44] Michael I. Jordan,et al. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[45] Paul Patras,et al. Long-Term Mobile Traffic Forecasting Using Deep Spatio-Temporal Neural Networks , 2017, MobiHoc.
[46] Ben Y. Zhao,et al. Latent Backdoor Attacks on Deep Neural Networks , 2019, CCS.
[47] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[48] Hyun Oh Song,et al. Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization , 2019, ICML.
[49] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[50] Kavita Bala,et al. Learning visual similarity for product design with convolutional neural networks , 2015, ACM Trans. Graph..
[51] Erdogan Dogdu,et al. Intrusion Detection Using Big Data and Deep Learning Techniques , 2019, ACM Southeast Regional Conference.
[52] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[53] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[54] Qiang Liu,et al. TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest , 2018, Secur. Commun. Networks.
[55] Qianru Zhou,et al. Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection - An Analysis on CIC-AWS-2018 dataset , 2019, ArXiv.
[56] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[57] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[58] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[59] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.