Weaponized AI for cyber attacks

[1]  Naser Damer,et al.  Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation , 2020, Image Vis. Comput..

[2]  Muhammad Altaf,et al.  Energy-efficient RRH-association and resource allocation in D2D enabled multi-tier 5G C-RAN , 2019, Telecommunication Systems.

[3]  Andrii Shalaginov,et al.  Smart Policing for a Smart World Opportunities, Challenges and Way Forward , 2020, Advances in Intelligent Systems and Computing.

[4]  Vasileios Gkioulos,et al.  Cyber ranges and security testbeds: Scenarios, functions, tools and architecture , 2020, Comput. Secur..

[5]  Neeraj Kumar,et al.  Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges , 2019, Veh. Commun..

[6]  Yuan Liu,et al.  DermGAN: Synthetic Generation of Clinical Skin Images with Pathology , 2019, ML4H@NeurIPS.

[7]  Xudong Lin,et al.  A novel CNN-DDPG based AI-trader: Performance and roles in business operations , 2019, Transportation Research Part E: Logistics and Transportation Review.

[8]  Faouzi Alaya Cheikh,et al.  Stacked Lstm Network for Human Activity Recognition Using Smartphone Data , 2019, 2019 8th European Workshop on Visual Information Processing (EUVIP).

[9]  Faouzi Alaya Cheikh,et al.  Two Stream Model for Crowd Video Classification , 2019, 2019 8th European Workshop on Visual Information Processing (EUVIP).

[10]  Han Woo Park,et al.  Investigating the applications of artificial intelligence in cyber security , 2019, Scientometrics.

[11]  Iwona Chomiak-Orsa,et al.  Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain , 2019, ICCCI.

[12]  Nicola Conci,et al.  Person Head Detection Based Deep Model for People Counting in Sports Videos , 2019, 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[13]  Faouzi Alaya Cheikh,et al.  Disam: Density Independent and Scale Aware Model for Crowd Counting and Localization , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[14]  E. Musk An Integrated Brain-Machine Interface Platform With Thousands of Channels , 2019, bioRxiv.

[15]  Mazaher Kianpour,et al.  Cyber Weapons Storage Mechanisms , 2019, SpaCCS.

[16]  Joe Burton,et al.  Understanding the Strategic Implications of the Weaponization of Artificial Intelligence , 2019, 2019 11th International Conference on Cyber Conflict (CyCon).

[17]  Kai Ma,et al.  X2CT-GAN: Reconstructing CT From Biplanar X-Rays With Generative Adversarial Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[18]  Jiann-Liang Chen,et al.  AI@ntiPhish - Machine Learning Mechanisms for Cyber-Phishing Attack , 2019, IEICE Trans. Inf. Syst..

[19]  Sultan Daud Khan,et al.  A survey of advances in vision-based vehicle re-identification , 2019, Comput. Vis. Image Underst..

[20]  Maaz Bin Ahmad,et al.  Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics , 2019 .

[21]  Jian-hua Li,et al.  Cyber security meets artificial intelligence: a survey , 2018, Frontiers of Information Technology & Electronic Engineering.

[22]  Paul Babyn,et al.  Generative Adversarial Network in Medical Imaging: A Review , 2018, Medical Image Anal..

[23]  Brendt Wohlberg,et al.  An Online Plug-and-Play Algorithm for Regularized Image Reconstruction , 2018, IEEE Transactions on Computational Imaging.

[24]  Hayit Greenspan,et al.  Cross-Modality Synthesis from CT to PET using FCN and GAN Networks for Improved Automated Lesion Detection , 2018, Eng. Appl. Artif. Intell..

[25]  Yang Liu,et al.  Early-warning analysis of crowd stampede in metro station commercial area based on internet of things , 2018, Multimedia Tools and Applications.

[26]  Zhe Gan,et al.  Adversarial Text Generation via Feature-Mover's Distance , 2018, NeurIPS.

[27]  Faouzi Alaya Cheikh,et al.  PedNet: A Spatio-Temporal Deep Convolutional Neural Network for Pedestrian Segmentation , 2018, J. Imaging.

[28]  Faouzi Alaya Cheikh,et al.  Hand-Crafted vs Deep Features: A Quantitative Study of Pedestrian Appearance Model , 2018, 2018 Colour and Visual Computing Symposium (CVCS).

[29]  Arun Viswanathan,et al.  A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities , 2018, IEEE Access.

[30]  Aakash Ahmad,et al.  CrashSafe: a formal model for proving crash-safety of Android applications , 2018, Human-centric Computing and Information Sciences.

[31]  Vasisht Duddu,et al.  A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.

[32]  Parham Aarabi,et al.  Adversarial Attacks on Face Detectors Using Neural Net Based Constrained Optimization , 2018, 2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP).

[33]  Ahmed B. Altamimi,et al.  Anomalous entities detection and localization in pedestrian flows , 2018, Neurocomputing.

[34]  Christoph Busch,et al.  Towards Detection of Morphed Face Images in Electronic Travel Documents , 2018, 2018 13th IAPR International Workshop on Document Analysis Systems (DAS).

[35]  Arif I. Sarwat,et al.  A Tri-Modular Human-on-the-Loop Framework for Intelligent Smart Grid Cyber-Attack Visualization , 2018, SoutheastCon 2018.

[36]  Giancarlo Mauri,et al.  GAN-based synthetic brain MR image generation , 2018, 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018).

[37]  David Brumley,et al.  The Mayhem Cyber Reasoning System , 2018, IEEE Security & Privacy.

[38]  Hayit Greenspan,et al.  GAN-based Synthetic Medical Image Augmentation for increased CNN Performance in Liver Lesion Classification , 2018, Neurocomputing.

[39]  Fabio Roli,et al.  Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..

[40]  Yitong Li,et al.  Video Generation From Text , 2017, AAAI.

[41]  M. Rege,et al.  Machine Learning for Cyber Defense and Attack , 2018 .

[42]  Faouzi Alaya Cheikh,et al.  A hierarchical feature model for multi-target tracking , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[43]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[44]  N. Persily The 2016 U.S. Election: Can Democracy Survive the Internet? , 2017 .

[45]  Raja Chatila,et al.  The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems [Standards] , 2017, IEEE Robotics Autom. Mag..

[46]  Jean-Luc Dugelay,et al.  Face aging with conditional generative adversarial networks , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[47]  Mani B. Srivastava,et al.  SenseGen: A deep learning architecture for synthetic sensor data generation , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[48]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[49]  Nicholas G. Polson,et al.  Deep learning for short-term traffic flow prediction , 2016, 1604.04527.

[50]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[51]  Emilio Ferrara,et al.  Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.

[52]  Gina Neff,et al.  Talking to Bots: Symbiotic Agency and the Case of Tay , 2016 .

[53]  Edward Geist It’s already too late to stop the AI arms race—We must manage it instead , 2016 .

[54]  Anazida Zainal,et al.  Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..

[55]  Zhe Gan,et al.  Generating Text via Adversarial Training , 2016 .

[56]  Francesco G. B. De Natale,et al.  Traffic accident detection through a hydrodynamic lens , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[57]  Lior Rokach,et al.  Unknown malware detection using network traffic classification , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[58]  Miriam A. M. Capretz,et al.  MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[59]  Arvind Mallari Rao,et al.  Technical Aspects of Cyber Kill Chain , 2015, SSCC.

[60]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[61]  Nicola Conci,et al.  Real-time anomaly detection in dense crowded scenes , 2014, Electronic Imaging.

[62]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[63]  Thomas Rid,et al.  Cyber-Weapons , 2012 .

[64]  Nancy E. Marion The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation , 2010 .

[65]  M. Intriligator,et al.  Strategic arms limitation treaties and innovations in weapons technology , 1981 .

[66]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.