You are currently on the new version of our website. Access the old version .

72 Results Found

  • Article
  • Open Access
2 Citations
4,971 Views
14 Pages

Transformer-based models are driving a significant revolution in the field of machine learning at the moment. Among these innovations, vision transformers (ViTs) stand out for their application of transformer architectures to vision-related tasks. By...

  • Article
  • Open Access
1 Citations
1,162 Views
21 Pages

18 December 2024

The Transductive Support Vector Machine (TSVM) is an effective semi-supervised learning algorithm vulnerable to adversarial sample attacks. This paper proposes a new adversarial attack method called the Multi-Stage Dual-Perturbation Attack (MSDPA), s...

  • Review
  • Open Access
202 Views
38 Pages

A Comprehensive Review: The Evolving Cat-and-Mouse Game in Network Intrusion Detection Systems Leveraging Machine Learning

  • Qutaiba Alasad,
  • Meaad Ahmed,
  • Shahad Alahmed,
  • Omer T. Khattab,
  • Saba Alaa Abdulwahhab and
  • Jiann-Shuin Yuan

Machine learning (ML) techniques have significantly enhanced decision support systems to render them more accurate, efficient, and faster. ML classifiers in securing networks, on the other hand, face a disproportionate risk from the sophisticated adv...

  • Article
  • Open Access
1,635 Views
19 Pages

25 September 2024

Machine learning systems, particularly in the domain of image recognition, are susceptible to adversarial perturbations applied to input data. These perturbations, while imperceptible to humans, have the capacity to easily deceive deep learning class...

  • Review
  • Open Access
98 Citations
21,570 Views
34 Pages

31 January 2023

Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks...

  • Article
  • Open Access
3 Citations
3,084 Views
14 Pages

A Mask-Based Adversarial Defense Scheme

  • Weizhen Xu,
  • Chenyi Zhang,
  • Fangzhen Zhao and
  • Liangda Fang

6 December 2022

Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negati...

  • Article
  • Open Access
4 Citations
5,352 Views
19 Pages

10 September 2024

The security and privacy of a system are urgent issues in achieving secure and efficient learning-based systems. Recent studies have shown that these systems are susceptible to subtle adversarial perturbations applied to inputs. Although these pertur...

  • Article
  • Open Access
4 Citations
2,757 Views
13 Pages

A Textual Backdoor Defense Method Based on Deep Feature Classification

  • Kun Shao,
  • Junan Yang,
  • Pengjiang Hu and
  • Xiaoshuai Li

23 January 2023

Natural language processing (NLP) models based on deep neural networks (DNNs) are vulnerable to backdoor attacks. Existing backdoor defense methods have limited effectiveness and coverage scenarios. We propose a textual backdoor defense method based...

  • Article
  • Open Access
3 Citations
3,955 Views
11 Pages

Textual Backdoor Defense via Poisoned Sample Recognition

  • Kun Shao,
  • Yu Zhang,
  • Junan Yang and
  • Hui Liu

25 October 2021

Deep learning models are vulnerable to backdoor attacks. The success rate of textual backdoor attacks based on data poisoning in existing research is as high as 100%. In order to enhance the natural language processing model’s defense against backdoo...

  • Article
  • Open Access
105 Citations
9,309 Views
21 Pages

Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition

  • Sheeba Lal,
  • Saeed Ur Rehman,
  • Jamal Hussain Shah,
  • Talha Meraj,
  • Hafiz Tayyab Rauf,
  • Robertas Damaševičius,
  • Mazin Abed Mohammed and
  • Karrar Hameed Abdulkareem

7 June 2021

Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been...

  • Article
  • Open Access
10 Citations
3,410 Views
18 Pages

Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

  • Mohammed Alkhowaiter,
  • Hisham Kholidy,
  • Mnassar A. Alyami,
  • Abdulmajeed Alghamdi and
  • Cliff Zou

11 July 2023

Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversaria...

  • Article
  • Open Access
11 Citations
2,008 Views
14 Pages

2 September 2023

Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vu...

  • Article
  • Open Access
2,060 Views
28 Pages

21 November 2025

The convergence of ubiquitous connectivity, large-scale data generation, and rapid advancements in machine learning is transforming the field of cybersecurity. The widespread adoption of interconnected systems including Internet of Things devices, mo...

  • Article
  • Open Access
6 Citations
2,687 Views
16 Pages

Machine learning is being applied to continuous-variable quantum key distribution (CVQKD) systems as defense countermeasures for attack classification. However, recent studies have demonstrated that most of these detection networks are not immune to...

  • Article
  • Open Access
4 Citations
2,958 Views
13 Pages

15 February 2023

In recent years, Federated Learning has attracted much attention because it solves the problem of data silos in machine learning to a certain extent. However, many studies have shown that attacks based on Generative Adversarial Networks pose a great...

  • Feature Paper
  • Article
  • Open Access
19 Citations
5,540 Views
23 Pages

AppCon: Mitigating Evasion Attacks to ML Cyber Detectors

  • Giovanni Apruzzese,
  • Mauro Andreolini,
  • Mirco Marchetti,
  • Vincenzo Giuseppe Colacino and
  • Giacomo Russo

21 April 2020

Adversarial attacks represent a critical issue that prevents the reliable integration of machine learning methods into cyber defense systems. Past work has shown that even proficient detectors are highly affected just by small perturbations to malici...

  • Article
  • Open Access
12 Citations
3,485 Views
16 Pages

Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks

  • Chin-Shiuh Shieh,
  • Thanh-Tuan Nguyen,
  • Wan-Wei Lin,
  • Wei Kuang Lai,
  • Mong-Fong Horng and
  • Denis Miu

DDoS (distributed denial of service) attacks consist of a large number of compromised computer systems that launch joint attacks at a targeted victim, such as a server, website, or other network equipment, simultaneously. DDoS has become a widespread...

  • Article
  • Open Access
2 Citations
1,965 Views
12 Pages

Threshold Filtering for Detecting Label Inference Attacks in Vertical Federated Learning

  • Liansheng Ding,
  • Haibin Bao,
  • Qingzhe Lv,
  • Feng Zhang,
  • Zhouyang Zhang,
  • Jianliang Han and
  • Shuang Ding

8 November 2024

Federated learning, as an emerging machine-learning method, has received widespread attention because it allows users to train locally during the training process and uses relevant cryptographic knowledge to safeguard the privacy of data during model...

  • Article
  • Open Access
1,565 Views
23 Pages

2 October 2025

GPS spoofing remains a critical threat in the use of autonomous vehicles. Machine-learning-based detection systems, particularly support vector machines (SVMs), demonstrate high accuracy in their defense against conventional spoofing attacks. However...

  • Article
  • Open Access
7 Citations
2,900 Views
25 Pages

Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems

  • Meaad Ahmed,
  • Qutaiba Alasad,
  • Jiann-Shiun Yuan and
  • Mohammed Alawad

Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate pot...

  • Article
  • Open Access
34 Citations
7,354 Views
13 Pages

14 August 2019

With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there...

  • Article
  • Open Access
27 Citations
10,057 Views
23 Pages

This study evaluated the generation of adversarial examples and the subsequent robustness of an image classification model. The attacks were performed using the Fast Gradient Sign method, the Projected Gradient Descent method, and the Carlini and Wag...

  • Article
  • Open Access
7 Citations
3,628 Views
30 Pages

The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical ris...

  • Review
  • Open Access
935 Views
27 Pages

21 November 2025

Adversarial patch attacks have emerged as a powerful and practical threat to machine learning models in vision-based tasks. Unlike traditional perturbation-based adversarial attacks, which often require imperceptible changes to the entire input, patc...

  • Proceeding Paper
  • Open Access
930 Views
10 Pages

14 October 2025

The rise of IoT devices has led to significant advancements but also new security challenges. This paper assesses the performance of various machine learning (ML) models—Decision Trees, Naïve Bayes, Support Vector Machines (SVMs), and a de...

  • Article
  • Open Access
4 Citations
3,164 Views
17 Pages

31 July 2023

While Machine Learning has become the holy grail of modern-day computing, it has many security flaws that have yet to be addressed and resolved. Adversarial attacks are one of these security flaws, in which an attacker appends noise to data samples t...

  • Review
  • Open Access
3 Citations
10,479 Views
53 Pages

A Comprehensive Review of Adversarial Attacks and Defense Strategies in Deep Neural Networks

  • Abdulruhman Abomakhelb,
  • Kamarularifin Abd Jalil,
  • Alya Geogiana Buja,
  • Abdulraqeb Alhammadi and
  • Abdulmajeed M. Alenezi

Artificial Intelligence (AI) security research is promising and highly valuable in the current decade. In particular, deep neural network (DNN) security is receiving increased attention. Although DNNs have recently emerged as a prominent tool for add...

  • Article
  • Open Access
6 Citations
3,123 Views
24 Pages

19 April 2024

Recently, Machine Learning (ML)-based solutions have been widely adopted to tackle the wide range of security challenges that have affected the progress of the Internet of Things (IoT) in various domains. Despite the reported promising results, the M...

  • Review
  • Open Access
40 Citations
10,904 Views
42 Pages

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

  • Hassan Khazane,
  • Mohammed Ridouani,
  • Fatima Salahdine and
  • Naima Kaabouch

19 January 2024

With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are...

  • Review
  • Open Access
28 Citations
8,132 Views
26 Pages

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

  • Pilla Vaishno Mohan,
  • Shriniket Dixit,
  • Amogh Gyaneshwar,
  • Utkarsh Chadha,
  • Kathiravan Srinivasan and
  • Jung Taek Seo

11 March 2022

With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like a...

  • Article
  • Open Access
16 Citations
3,710 Views
25 Pages

19 June 2023

An intrusion detection system (IDS) is an effective tool for securing networks and a dependable technique for improving a user’s internet security. It informs the administration whenever strange conduct occurs. An IDS fundamentally depends on t...

  • Article
  • Open Access
863 Views
18 Pages

RobustQuote: Using Reference Images for Adversarial Robustness

  • Hugo Lemarchant,
  • Hong Liu and
  • Yuta Nakashima

13 May 2025

We propose RobustQuote, a novel defense framework designed to enhance the adversarial robustness of vision transformers. The core idea is to leverage trusted reference images drawn from a dynamically changing pool unknown to the attacker as contextua...

  • Article
  • Open Access
10 Citations
3,604 Views
22 Pages

Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems

  • Theodora Anastasiou,
  • Sophia Karagiorgou,
  • Petros Petrou,
  • Dimitrios Papamartzivanos,
  • Thanassis Giannetsos,
  • Georgia Tsirigotaki and
  • Jelle Keizer

13 September 2022

Adversarial machine learning (AML) is a class of data manipulation techniques that cause alterations in the behavior of artificial intelligence (AI) systems while going unnoticed by humans. These alterations can cause serious vulnerabilities to missi...

  • Review
  • Open Access
10 Citations
5,265 Views
33 Pages

13 May 2023

Internet of Things (IoT) technologies serve as a backbone of cutting-edge intelligent systems. Machine Learning (ML) paradigms have been adopted within IoT environments to exploit their capabilities to mine complex patterns. Despite the reported prom...

  • Article
  • Open Access
10 Citations
7,688 Views
29 Pages

14 June 2024

Rapid advancements in connected and autonomous vehicles (CAVs) are fueled by breakthroughs in machine learning, yet they encounter significant risks from adversarial attacks. This study explores the vulnerabilities of machine learning-based intrusion...

  • Article
  • Open Access
27 Citations
8,308 Views
26 Pages

Online Social Networks (OSNs), such as Facebook and Twitter, have become a very important part of many people’s daily lives. Unfortunately, the high popularity of these platforms makes them very attractive to spammers. Machine learning (ML) tec...

  • Article
  • Open Access
11 Citations
4,034 Views
19 Pages

9 June 2023

Cyber-Physical Systems (CPS) are prone to many security exploitations due to a greater attack surface being introduced by their cyber component by the nature of their remote accessibility or non-isolated capability. Security exploitations, on the oth...

  • Article
  • Open Access
1,203 Views
17 Pages

Federated learning offers a powerful approach for training models across decentralized datasets, enabling the creation of machine learning models that respect data privacy. However, federated learning faces significant challenges due to its vulnerabi...

  • Article
  • Open Access
5 Citations
2,829 Views
14 Pages

Several attacks have been proposed against autonomous vehicles and their subsystems that are powered by machine learning (ML). Road sign recognition models are especially heavily tested under various adversarial ML attack settings, and they have prov...

  • Article
  • Open Access
73 Citations
11,082 Views
42 Pages

Applications in Security and Evasions in Machine Learning: A Survey

  • Ramani Sagar,
  • Rutvij Jhaveri and
  • Carlos Borrego

In recent years, machine learning (ML) has become an important part to yield security and privacy in various applications. ML is used to address serious issues such as real-time attack detection, data leakage vulnerability assessments and many more....

  • Article
  • Open Access
760 Views
23 Pages

2 October 2025

In today’s digital era, cyberattacks are rapidly evolving, rendering traditional security mechanisms increasingly inadequate. The adoption of AI-based Network Intrusion Detection Systems (NIDS) has emerged as a promising solution, due to their...

  • Article
  • Open Access
2,782 Views
24 Pages

15 August 2025

Machine learning (ML) has greatly improved intrusion detection in enterprise networks. However, ML models remain vulnerable to adversarial attacks, where small input changes cause misclassification. This study evaluates the robustness of a Random For...

  • Article
  • Open Access
21 Citations
4,358 Views
19 Pages

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML

  • Shahad Alahmed,
  • Qutaiba Alasad,
  • Maytham M. Hammood,
  • Jiann-Shiun Yuan and
  • Mohammed Alawad

Intrusion detection systems (IDS) are a very vital part of network security, as they can be used to protect the network from illegal intrusions and communications. To detect malicious network traffic, several IDS based on machine learning (ML) method...

  • Article
  • Open Access
13 Citations
8,633 Views
26 Pages

Polymorphic Adversarial Cyberattacks Using WGAN

  • Ravi Chauhan,
  • Ulya Sabeel,
  • Alireza Izaddoost and
  • Shahram Shah Heydari

12 December 2021

Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic from penetrating networks and systems. Recently, these systems have been enhancing their detection ability using machine learning algorithms. This development...

  • Article
  • Open Access
4 Citations
3,148 Views
25 Pages

17 February 2025

Machine learning (ML) promises advances in automation and threat detection for the future generations of communication networks. However, new threats are introduced, as adversaries target ML systems with malicious data. Adversarial attacks on tree-ba...

  • Article
  • Open Access
15 Citations
6,465 Views
18 Pages

Building Trusted Federated Learning: Key Technologies and Challenges

  • Depeng Chen,
  • Xiao Jiang,
  • Hong Zhong and
  • Jie Cui

Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL....

  • Article
  • Open Access
14 Citations
6,075 Views
17 Pages

GAN-Driven Data Poisoning Attacks and Their Mitigation in Federated Learning Systems

  • Konstantinos Psychogyios,
  • Terpsichori-Helen Velivassaki,
  • Stavroula Bourou,
  • Artemis Voulkidis,
  • Dimitrios Skias and
  • Theodore Zahariadis

Federated learning (FL) is an emerging machine learning technique where machine learning models are trained in a decentralized manner. The main advantage of this approach is the data privacy it provides because the data are not processed in a central...

  • Article
  • Open Access
3 Citations
4,047 Views
25 Pages

Evaluating and Enhancing the Robustness of Sustainable Neural Relationship Classifiers Using Query-Efficient Black-Box Adversarial Attacks

  • Ijaz Ul Haq,
  • Zahid Younas Khan,
  • Arshad Ahmad,
  • Bashir Hayat,
  • Asif Khan,
  • Ye-Eun Lee and
  • Ki-Il Kim

24 May 2021

Neural relation extraction (NRE) models are the backbone of various machine learning tasks, including knowledge base enrichment, information extraction, and document summarization. Despite the vast popularity of these models, their vulnerabilities re...

  • Review
  • Open Access
93 Citations
25,246 Views
27 Pages

Adversarial Training Methods for Deep Learning: A Systematic Review

  • Weimin Zhao,
  • Sanaa Alwidian and
  • Qusay H. Mahmoud

12 August 2022

Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the...

  • Article
  • Open Access
225 Views
21 Pages

Adversarial Perturbations for Defeating Cryptographic Algorithm Identification

  • Shuijun Yin,
  • Di Wu,
  • Haolan Zhang,
  • Heng Li,
  • Zhiyuan Yao and
  • Wei Yuan

Recent advances in machine learning have enabled highly effective ciphertext-based cryptographic algorithm identification, posing a potential threat to encrypted communication. Inspired by adversarial example techniques, we present CSPM (Class-Specif...

of 2