You are currently on the new version of our website. Access the old version .

1,151 Results Found

  • Article
  • Open Access
4 Citations
3,549 Views
13 Pages

22 January 2023

The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ne...

  • Article
  • Open Access
215 Citations
12,937 Views
32 Pages

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

  • Andrew Churcher,
  • Rehmat Ullah,
  • Jawad Ahmad,
  • Sadaqat ur Rehman,
  • Fawad Masood,
  • Mandar Gogate,
  • Fehaid Alqahtani,
  • Boubakr Nour and
  • William J. Buchanan

10 January 2021

In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature,...

  • Article
  • Open Access
1 Citations
3,232 Views
13 Pages

14 October 2021

Despite deep neural networks (DNNs) having achieved impressive performance in various domains, it has been revealed that DNNs are vulnerable in the face of adversarial examples, which are maliciously crafted by adding human-imperceptible perturbation...

  • Article
  • Open Access
1 Citations
3,053 Views
24 Pages

3 November 2023

Although deep neural networks (DNNs) are applied in various fields owing to their remarkable performance, recent studies have indicated that DNN models are vulnerable to backdoor attacks. Backdoored images were generated by adding a backdoor trigger...

  • Article
  • Open Access
3 Citations
2,755 Views
13 Pages

While deep neural networks (DNNs) have been widely and successfully used for time series classification (TSC) over the past decade, their vulnerability to adversarial attacks has received little attention. Most existing attack methods focus on white-...

  • Article
  • Open Access
3 Citations
1,907 Views
18 Pages

18 August 2024

Co-resident attacks are serious security threats in multi-tenant public cloud platforms. They are often implemented by building side channels between virtual machines (VMs) hosted on the same cloud server. Traditional defense methods are troubled by...

  • Article
  • Open Access
31 Citations
5,081 Views
17 Pages

Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks

  • Subhan Ullah,
  • Zahid Mahmood,
  • Nabeel Ali,
  • Tahir Ahmad and
  • Attaullah Buriro

The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In th...

  • Article
  • Open Access
4 Citations
2,767 Views
31 Pages

Intrusion detection has been a vast-surveyed topic for many decades as network attacks are tremendously growing. This has heightened the need for security in networks as web-based communication systems are advanced nowadays. The proposed work introdu...

  • Article
  • Open Access
2 Citations
1,462 Views
23 Pages

To combat the growing danger of zero-day attacks on IoT networks, this study introduces a Cluster-Based Classification (CBC) method. Security vulnerabilities have become more apparent with the growth of IoT devices, calling for new approaches to iden...

  • Article
  • Open Access
1 Citations
1,649 Views
29 Pages

12 November 2024

Among the numerous strategies that an attacker can initiate to enhance its eavesdropping capabilities is the Pilot Contamination Attack (PCA). Two promising methods, based on Phase-Shift Keying (PSK) modulation of Nth order—2-N-PSK and Shifted...

  • Article
  • Open Access
10 Citations
3,251 Views
20 Pages

Towards Adversarial Attacks for Clinical Document Classification

  • Nina Fatehi,
  • Qutaiba Alasad and
  • Mohammed Alawad

28 December 2022

Regardless of revolutionizing improvements in various domains thanks to recent advancements in the field of Deep Learning (DL), recent studies have demonstrated that DL networks are susceptible to adversarial attacks. Such attacks are crucial in sens...

  • Article
  • Open Access
18 Citations
11,905 Views
16 Pages

Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification

  • Xueli Hu,
  • Fujun Lai,
  • Gufan Chen,
  • Rongcheng Zou and
  • Qingxiang Feng

11 March 2019

Terrorist attacks are events which hinder the development of a region. Before the terrorist attacks, we need to conduct a graded evaluation of the terrorist attacks. After getting the level of terrorist attacks, we can fight terrorist organizations m...

  • Article
  • Open Access
22 Citations
6,705 Views
30 Pages

An Explanation of the LSTM Model Used for DDoS Attacks Classification

  • Abdulmuneem Bashaiwth,
  • Hamad Binsalleeh and
  • Basil AsSadhan

31 July 2023

With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and no...

  • Article
  • Open Access
1,204 Views
17 Pages

Boosting Clean-Label Backdoor Attacks on Graph Classification

  • Yadong Wang,
  • Zhiwei Zhang,
  • Ye Yuan and
  • Guoren Wang

13 September 2025

Graph Neural Networks (GNNs) have become a cornerstone for graph classification, yet their vulnerability to backdoor attacks remains a significant security concern. While clean-label attacks provide a stealthier approach by preserving original labels...

  • Article
  • Open Access
147 Citations
11,579 Views
26 Pages

15 December 2020

With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, the Internet of Things (IoT) has earned wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT in...

  • Article
  • Open Access
43 Citations
8,042 Views
24 Pages

Attack Classification Schema for Smart City WSNs

  • Victor Garcia-Font,
  • Carles Garrigues and
  • Helena Rifà-Pous

5 April 2017

Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the str...

  • Article
  • Open Access
7 Citations
3,645 Views
17 Pages

A Robust CNN for Malware Classification against Executable Adversarial Attack

  • Yunchun Zhang,
  • Jiaqi Jiang,
  • Chao Yi,
  • Hai Li,
  • Shaohui Min,
  • Ruifeng Zuo,
  • Zhenzhou An and
  • Yongtao Yu

Deep-learning-based malware-detection models are threatened by adversarial attacks. This paper designs a robust and secure convolutional neural network (CNN) for malware classification. First, three CNNs with different pooling layers, including globa...

  • Article
  • Open Access
1 Citations
1,703 Views
17 Pages

2 November 2024

Frequency-hopping (FH) communication adversarial research is a key area in modern electronic countermeasures. To address the challenge posed by interfering parties that use deep neural networks (DNNs) to classify and identify multiple intercepted FH...

  • Article
  • Open Access
5 Citations
1,884 Views
24 Pages

13 May 2025

Deep neural networks have achieved remarkable performance in remote sensing image (RSI) classification tasks. However, they remain vulnerable to adversarial attack. In practical applications, classification models are typically unknown black-box mode...

  • Article
  • Open Access
9 Citations
3,520 Views
22 Pages

22 November 2023

The development of IoT technology has made various IoT applications and services widely used. Because IoT devices have weak information security protection capabilities, they are easy targets for cyber attacks. Therefore, this study proposes MLP-base...

  • Article
  • Open Access
1 Citations
2,343 Views
12 Pages

15 September 2021

How to deal with rare and unknown data in traffic classification has a decisive influence on classification performance. Rare data make it difficult to generate validation datasets to prevent overfitting, and unknown data interferes with learning and...

  • Article
  • Open Access
16 Citations
3,205 Views
17 Pages

Federated Learning-Inspired Technique for Attack Classification in IoT Networks

  • Tariq Ahamed Ahanger,
  • Abdulaziz Aldaej,
  • Mohammed Atiquzzaman,
  • Imdad Ullah and
  • Muhammad Yousufudin

20 June 2022

More than 10-billion physical items are being linked to the internet to conduct activities more independently and with less human involvement owing to the Internet of Things (IoT) technology. IoT networks are considered a source of identifiable data...

  • Article
  • Open Access
21 Citations
3,118 Views
22 Pages

19 September 2023

Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimiz...

  • Article
  • Open Access
8 Citations
4,876 Views
45 Pages

9 October 2024

The increasing sophistication and frequency of cyber threats necessitate the development of advanced techniques for detecting and mitigating attacks. This paper introduces a novel cybersecurity-focused Multi-Layer Perceptron (MLP) trainer that utiliz...

  • Article
  • Open Access
34 Citations
3,435 Views
23 Pages

The increasing proliferation of Androidbased devices, which currently dominate the market with a staggering 72% global market share, has made them a prime target for attackers. Consequently, the detection of Android malware has emerged as a critical...

  • Article
  • Open Access
34 Citations
4,116 Views
18 Pages

9 January 2023

Plant diseases have received common attention, and deep learning has also been applied to plant diseases. Deep neural networks (DNNs) have achieved outstanding results in plant diseases. Furthermore, DNNs are very fragile, and adversarial attacks in...

  • Technical Note
  • Open Access
13 Citations
2,085 Views
11 Pages

Machine Learning in the Hyperspectral Classification of Glycaspis brimblecombei (Hemiptera Psyllidae) Attack Severity in Eucalyptus

  • Gabriella Silva de Gregori,
  • Elisângela de Souza Loureiro,
  • Luis Gustavo Amorim Pessoa,
  • Gileno Brito de Azevedo,
  • Glauce Taís de Oliveira Sousa Azevedo,
  • Dthenifer Cordeiro Santana,
  • Izabela Cristina de Oliveira,
  • João Lucas Gouveia de Oliveira,
  • Larissa Pereira Ribeiro Teodoro and
  • Luciano Shozo Shiratsuchi
  • + 3 authors

7 December 2023

Assessing different levels of red gum lerp psyllid (Glycaspis brimblecombei) can influence the hyperspectral reflectance of leaves in different ways due to changes in chlorophyll. In order to classify these levels, the use of machine learning (ML) al...

  • Article
  • Open Access
69 Citations
6,697 Views
17 Pages

Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the network define what is expected of the network’s operation. It is for this reason that ML techniques are used in the computer network security field to det...

  • Article
  • Open Access
2,044 Views
28 Pages

28 March 2025

In the evolving landscape of biometric authentication, the integrity of face recognition systems against sophisticated presentation attacks (PAD) is paramount. This study set out to elevate the detection capabilities of PAD systems by ingeniously int...

  • Article
  • Open Access
6 Citations
2,736 Views
29 Pages

Analysis of Attack Intensity on Autonomous Mobile Robots

  • Elena Basan,
  • Alexander Basan,
  • Alexey Mushenko,
  • Alexey Nekrasov,
  • Colin Fidge and
  • Alexander Lesnikov

10 July 2024

Autonomous mobile robots (AMRs) combine a remarkable combination of mobility, adaptability, and an innate capacity for obstacle avoidance. They are exceptionally well-suited for a wide range of applications but usually operate in uncontrolled, non-de...

  • Article
  • Open Access
2 Citations
3,156 Views
23 Pages

The actual problem of adversarial attacks on classifiers, mainly implemented using deep neural networks, is considered. This problem is analyzed with a generalization to the case of any classifiers synthesized by machine learning methods. The imperfe...

  • Article
  • Open Access
6 Citations
2,076 Views
21 Pages

The rapid expansion of the Internet of Things (IoT) and industrial Internet of Things (IIoT) ecosystems has introduced new security challenges, particularly the need for robust intrusion detection systems (IDSs) capable of adapting to increasingly so...

  • Article
  • Open Access
1 Citations
3,783 Views
17 Pages

Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems

  • Benoit Vibert,
  • Jean-Marie Le Bars,
  • Christophe Charrier and
  • Christophe Rosenberger

21 September 2020

Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric re...

  • Article
  • Open Access
108 Citations
16,516 Views
29 Pages

Survey and Classification of Automotive Security Attacks

  • Florian Sommer,
  • Jürgen Dürrwang and
  • Reiner Kriesten

19 April 2019

Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projec...

  • Article
  • Open Access
22 Citations
12,995 Views
24 Pages

Next-Generation Spam Filtering: Comparative Fine-Tuning of LLMs, NLPs, and CNN Models for Email Spam Classification

  • Konstantinos I. Roumeliotis,
  • Nikolaos D. Tselikas and
  • Dimitrios K. Nasiopoulos

Spam emails and phishing attacks continue to pose significant challenges to email users worldwide, necessitating advanced techniques for their efficient detection and classification. In this paper, we address the persistent challenges of spam emails...

  • Article
  • Open Access
67 Citations
6,328 Views
14 Pages

An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach

  • Gori Mohamed,
  • J. Visumathi,
  • Miroslav Mahdal,
  • Jose Anand and
  • Muniyandy Elangovan

12 July 2022

Phishing is one of the biggest crimes in the world and involves the theft of the user’s sensitive data. Usually, phishing websites target individuals’ websites, organizations, sites for cloud storage, and government websites. Most users,...

  • Article
  • Open Access
27 Citations
4,836 Views
10 Pages

22 October 2020

Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, a single perturbation known as the universal adversarial perturbation (UAP) can foil most classification tasks conducted by DNNs. Thus, different methods for generating...

  • Article
  • Open Access
8 Citations
4,645 Views
14 Pages

The development of artificial intelligence (AI) technologies, such as machine learning algorithms, computer vision systems, and sensors, has allowed maritime autonomous surface ships (MASS) to navigate, detect and avoid obstacles, and make real-time...

  • Article
  • Open Access
10 Citations
3,807 Views
16 Pages

Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim’s machine or encrypts his person...

  • Article
  • Open Access
1 Citations
1,952 Views
18 Pages

Clock Glitch Fault Attacks on Deep Neural Networks and Their Countermeasures

  • Sangwon Lee,
  • Suhyung Kim,
  • Seongwoo Hong and
  • Jaecheol Ha

29 April 2025

Recently, deep neural networks (DNNs) have been widely used in various fields, such as autonomous vehicles and smart homes. Since these DNNs can be directly implemented on edge devices, they offer advantages such as real-time processing in low-power...

  • Article
  • Open Access
3 Citations
4,536 Views
19 Pages

Hunting Network Anomalies in a Railway Axle Counter System

  • Karel Kuchar,
  • Eva Holasova,
  • Ondrej Pospisil,
  • Henri Ruotsalainen,
  • Radek Fujdiak and
  • Adrian Wagner

14 March 2023

This paper presents a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. In contrast to the state-of-the-art works, our experimental results are validated with...

  • Article
  • Open Access
10 Citations
3,957 Views
20 Pages

AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems

  • Amira Guesmi,
  • Muhammad Abdullah Hanif and
  • Muhammad Shafique

28 November 2023

Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate...

  • Proceeding Paper
  • Open Access
62 Citations
10,396 Views
12 Pages

The problem of identifying Distributed Denial of Service (DDos) attacks is fundamentally a classification problem in machine learning. In relevance to Cloud Computing, the task of identification of DDoS attacks is a significantly challenging problem...

  • Article
  • Open Access
817 Views
25 Pages

Enhancing Cyberattack Prevention Through Anomaly Detection Ensembles and Diverse Training Sets

  • Faisal Saleem S Alraddadi,
  • Luis F. Lago-Fernández and
  • Francisco B. Rodríguez

3 November 2025

A surge in global connectivity has led to an increase in cyberattacks, creating a need for improved security. A promising area of research is using machine learning to detect these attacks. Traditional two-class machine learning models can be ineffec...

  • Article
  • Open Access
77 Citations
12,797 Views
28 Pages

The most significant threat that networks established in IoT may encounter is cyber attacks. The most commonly encountered attacks among these threats are DDoS attacks. After attacks, the communication traffic of the network can be disrupted, and the...

  • Article
  • Open Access
3 Citations
1,924 Views
16 Pages

Hierarchical Classification of Botnet Using Lightweight CNN

  • Worku Gachena Negera,
  • Friedhelm Schwenker,
  • Degaga Wolde Feyisa,
  • Taye Girma Debelee and
  • Henock Mulugeta Melaku

7 May 2024

This paper addresses the persistent threat of botnet attacks on IoT devices, emphasizing their continued existence despite various conventional and deep learning methodologies developed for intrusion detection. Utilizing the Bot-IoT dataset, we propo...

  • Article
  • Open Access
33 Citations
4,359 Views
18 Pages

21 July 2022

Recently, false data injection attacks (FDIAs) have been identified as a significant category of cyber-attacks targeting smart grids’ state estimation and monitoring systems. These cyber-attacks aim to mislead control system operations by compr...

  • Article
  • Open Access
6 Citations
3,885 Views
23 Pages

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers

  • Han Cao,
  • Chengxiang Si,
  • Qindong Sun,
  • Yanxiao Liu,
  • Shancang Li and
  • Prosanta Gope

15 March 2022

The vulnerability of deep neural network (DNN)-based systems makes them susceptible to adversarial perturbation and may cause classification task failure. In this work, we propose an adversarial attack model using the Artificial Bee Colony (ABC) algo...

  • Article
  • Open Access
817 Views
20 Pages

This study addresses the problem of automatic attack detection targeting Linux-based machines and web applications through the analysis of system logs, with a particular focus on reducing the computational requirements of existing solutions. The aim...

  • Article
  • Open Access
28 Citations
5,387 Views
16 Pages

14 November 2020

State-of-the-art neural network models are actively used in various fields, but it is well-known that they are vulnerable to adversarial example attacks. Throughout the efforts to make the models robust against adversarial example attacks, it has bee...

of 24