Weaponized AI for cyber attacks
暂无分享,去创建一个
Mohib Ullah | Muhammad Mudassar Yamin | Basel Katt | Habib Ullah | Basel Katt | M. Ullah | H. Ullah | M. Yamin
[1] Naser Damer,et al. Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation , 2020, Image Vis. Comput..
[2] Muhammad Altaf,et al. Energy-efficient RRH-association and resource allocation in D2D enabled multi-tier 5G C-RAN , 2019, Telecommunication Systems.
[3] Andrii Shalaginov,et al. Smart Policing for a Smart World Opportunities, Challenges and Way Forward , 2020, Advances in Intelligent Systems and Computing.
[4] Vasileios Gkioulos,et al. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture , 2020, Comput. Secur..
[5] Neeraj Kumar,et al. Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges , 2019, Veh. Commun..
[6] Yuan Liu,et al. DermGAN: Synthetic Generation of Clinical Skin Images with Pathology , 2019, ML4H@NeurIPS.
[7] Xudong Lin,et al. A novel CNN-DDPG based AI-trader: Performance and roles in business operations , 2019, Transportation Research Part E: Logistics and Transportation Review.
[8] Faouzi Alaya Cheikh,et al. Stacked Lstm Network for Human Activity Recognition Using Smartphone Data , 2019, 2019 8th European Workshop on Visual Information Processing (EUVIP).
[9] Faouzi Alaya Cheikh,et al. Two Stream Model for Crowd Video Classification , 2019, 2019 8th European Workshop on Visual Information Processing (EUVIP).
[10] Han Woo Park,et al. Investigating the applications of artificial intelligence in cyber security , 2019, Scientometrics.
[11] Iwona Chomiak-Orsa,et al. Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain , 2019, ICCCI.
[12] Nicola Conci,et al. Person Head Detection Based Deep Model for People Counting in Sports Videos , 2019, 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[13] Faouzi Alaya Cheikh,et al. Disam: Density Independent and Scale Aware Model for Crowd Counting and Localization , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[14] E. Musk. An Integrated Brain-Machine Interface Platform With Thousands of Channels , 2019, bioRxiv.
[15] Mazaher Kianpour,et al. Cyber Weapons Storage Mechanisms , 2019, SpaCCS.
[16] Joe Burton,et al. Understanding the Strategic Implications of the Weaponization of Artificial Intelligence , 2019, 2019 11th International Conference on Cyber Conflict (CyCon).
[17] Kai Ma,et al. X2CT-GAN: Reconstructing CT From Biplanar X-Rays With Generative Adversarial Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Jiann-Liang Chen,et al. AI@ntiPhish - Machine Learning Mechanisms for Cyber-Phishing Attack , 2019, IEICE Trans. Inf. Syst..
[19] Sultan Daud Khan,et al. A survey of advances in vision-based vehicle re-identification , 2019, Comput. Vis. Image Underst..
[20] Maaz Bin Ahmad,et al. Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics , 2019 .
[21] Jian-hua Li,et al. Cyber security meets artificial intelligence: a survey , 2018, Frontiers of Information Technology & Electronic Engineering.
[22] Paul Babyn,et al. Generative Adversarial Network in Medical Imaging: A Review , 2018, Medical Image Anal..
[23] Brendt Wohlberg,et al. An Online Plug-and-Play Algorithm for Regularized Image Reconstruction , 2018, IEEE Transactions on Computational Imaging.
[24] Hayit Greenspan,et al. Cross-Modality Synthesis from CT to PET using FCN and GAN Networks for Improved Automated Lesion Detection , 2018, Eng. Appl. Artif. Intell..
[25] Yang Liu,et al. Early-warning analysis of crowd stampede in metro station commercial area based on internet of things , 2018, Multimedia Tools and Applications.
[26] Zhe Gan,et al. Adversarial Text Generation via Feature-Mover's Distance , 2018, NeurIPS.
[27] Faouzi Alaya Cheikh,et al. PedNet: A Spatio-Temporal Deep Convolutional Neural Network for Pedestrian Segmentation , 2018, J. Imaging.
[28] Faouzi Alaya Cheikh,et al. Hand-Crafted vs Deep Features: A Quantitative Study of Pedestrian Appearance Model , 2018, 2018 Colour and Visual Computing Symposium (CVCS).
[29] Arun Viswanathan,et al. A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities , 2018, IEEE Access.
[30] Aakash Ahmad,et al. CrashSafe: a formal model for proving crash-safety of Android applications , 2018, Human-centric Computing and Information Sciences.
[31] Vasisht Duddu,et al. A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.
[32] Parham Aarabi,et al. Adversarial Attacks on Face Detectors Using Neural Net Based Constrained Optimization , 2018, 2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP).
[33] Ahmed B. Altamimi,et al. Anomalous entities detection and localization in pedestrian flows , 2018, Neurocomputing.
[34] Christoph Busch,et al. Towards Detection of Morphed Face Images in Electronic Travel Documents , 2018, 2018 13th IAPR International Workshop on Document Analysis Systems (DAS).
[35] Arif I. Sarwat,et al. A Tri-Modular Human-on-the-Loop Framework for Intelligent Smart Grid Cyber-Attack Visualization , 2018, SoutheastCon 2018.
[36] Giancarlo Mauri,et al. GAN-based synthetic brain MR image generation , 2018, 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018).
[37] David Brumley,et al. The Mayhem Cyber Reasoning System , 2018, IEEE Security & Privacy.
[38] Hayit Greenspan,et al. GAN-based Synthetic Medical Image Augmentation for increased CNN Performance in Liver Lesion Classification , 2018, Neurocomputing.
[39] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..
[40] Yitong Li,et al. Video Generation From Text , 2017, AAAI.
[41] M. Rege,et al. Machine Learning for Cyber Defense and Attack , 2018 .
[42] Faouzi Alaya Cheikh,et al. A hierarchical feature model for multi-target tracking , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[43] Manisha Patil,et al. A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .
[44] N. Persily. The 2016 U.S. Election: Can Democracy Survive the Internet? , 2017 .
[45] Raja Chatila,et al. The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems [Standards] , 2017, IEEE Robotics Autom. Mag..
[46] Jean-Luc Dugelay,et al. Face aging with conditional generative adversarial networks , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[47] Mani B. Srivastava,et al. SenseGen: A deep learning architecture for synthetic sensor data generation , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[48] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[49] Nicholas G. Polson,et al. Deep learning for short-term traffic flow prediction , 2016, 1604.04527.
[50] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[51] Emilio Ferrara,et al. Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.
[52] Gina Neff,et al. Talking to Bots: Symbiotic Agency and the Case of Tay , 2016 .
[53] Edward Geist. It’s already too late to stop the AI arms race—We must manage it instead , 2016 .
[54] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[55] Zhe Gan,et al. Generating Text via Adversarial Training , 2016 .
[56] Francesco G. B. De Natale,et al. Traffic accident detection through a hydrodynamic lens , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[57] Lior Rokach,et al. Unknown malware detection using network traffic classification , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[58] Miriam A. M. Capretz,et al. MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[59] Arvind Mallari Rao,et al. Technical Aspects of Cyber Kill Chain , 2015, SSCC.
[60] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[61] Nicola Conci,et al. Real-time anomaly detection in dense crowded scenes , 2014, Electronic Imaging.
[62] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[63] Thomas Rid,et al. Cyber-Weapons , 2012 .
[64] Nancy E. Marion. The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation , 2010 .
[65] M. Intriligator,et al. Strategic arms limitation treaties and innovations in weapons technology , 1981 .
[66] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.