Academic literature on the topic 'Evasion attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Evasion attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Evasion attack"
Alshahrani, Ebtihaj, Daniyal Alghazzawi, Reem Alotaibi, and Osama Rabie. "Adversarial attacks against supervised machine learning based network intrusion detection systems." PLOS ONE 17, no. 10 (2022): e0275971. http://dx.doi.org/10.1371/journal.pone.0275971.
Full textMrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.
Full textBrohi, Sarfraz, and Qurat-ul-ain Mastoi. "AI Under Attack: Metric-Driven Analysis of Cybersecurity Threats in Deep Learning Models for Healthcare Applications." Algorithms 18, no. 3 (2025): 157. https://doi.org/10.3390/a18030157.
Full textNirmal, Santosh, and Pramod Patil. "Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection." Electronics ETF 28, no. 2 (2024): 46–53. https://doi.org/10.53314/els2428046n.
Full textWang, Qingya, Yi Wu, Haojun Xuan, and Huishu Wu. "FLARE: A Backdoor Attack to Federated Learning with Refined Evasion." Mathematics 12, no. 23 (2024): 3751. http://dx.doi.org/10.3390/math12233751.
Full textSpeth, Cornelia, and Günter Rambach. "Complement Attack againstAspergillusand Corresponding Evasion Mechanisms." Interdisciplinary Perspectives on Infectious Diseases 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/463794.
Full textChen, Hongyi, Jinshu Su, Linbo Qiao, and Qin Xin. "Malware Collusion Attack against SVM: Issues and Countermeasures." Applied Sciences 8, no. 10 (2018): 1718. http://dx.doi.org/10.3390/app8101718.
Full textEvdokimenkov, Veniamin N., Dmitriy A. Kozorez, and Lev N. Rabinskiy. "Unmanned aerial vehicle evasion manoeuvres from enemy aircraft attack." Journal of the Mechanical Behavior of Materials 30, no. 1 (2021): 87–94. http://dx.doi.org/10.1515/jmbm-2021-0009.
Full textSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh, and Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)." Sensors 23, no. 12 (2023): 5459. http://dx.doi.org/10.3390/s23125459.
Full textAlzaidy, Sharoug, and Hamad Binsalleeh. "Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification." Applied Sciences 14, no. 4 (2024): 1673. http://dx.doi.org/10.3390/app14041673.
Full textDissertations / Theses on the topic "Evasion attack"
Tajdini, M. "Developing an advanced IPv6 evasion attack detection framework." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9864/.
Full textLejon, Sara. "Evasion and Attack: Structural Studies of a Bacterial Albumin-binding Protein and of a Cephalosporin Biosynthetic Enzyme." Doctoral thesis, Uppsala : University Library Universitetsbiblioteket, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-8399.
Full textRUSSU, PAOLO. "Secure machine learning against evasion and poisoning attacks." Doctoral thesis, Università degli Studi di Cagliari, 2017. http://hdl.handle.net/11584/249561.
Full textDEMETRIO, LUCA. "Formalizing evasion attacks against machine learning security detectors." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1035018.
Full textDelvecchio, Matthew David. "Enhancing Communications Aware Evasion Attacks on RFML Spectrum Sensing Systems." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99792.
Full textMaaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.
Full textPeddisetty, Naga Raju. "State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2792.
Full textSultana, Saddiqa. "Transformation of brain drain of brain gain: incentives to attract talented workforce." reponame:Repositório Institucional do FGV, 2014. http://hdl.handle.net/10438/13396.
Full textDarwaish, Asim. "Adversary-aware machine learning models for malware detection systems." Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7283.
Full textSu, Wen-De, and 蘇文德. "The Model of Evasion Attack Detection using Finite State Machine." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/23721610102307490411.
Full textBooks on the topic "Evasion attack"
Office, General Accounting. Financial management: Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. GAO, 2003.
Find full textOffice, General Accounting. Financial management: Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. U.S. General Accounting Office, 2002.
Find full textOffice, General Accounting. Financial management: Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). The Office, 1998.
Find full textOffice, General Accounting. Financial management: Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. The Office, 2000.
Find full textOffice, General Accounting. Financial management: Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. The Office, 1997.
Find full textOffice, General Accounting. Financial management: Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. United States General Accounting Office, 2002.
Find full textOffice, General Accounting. Financial management: Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). The Office, 1998.
Find full textOffice, General Accounting. Financial management: Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. The Office, 1999.
Find full textOffice, General Accounting. Financial management: An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. The Office, 1997.
Find full textOffice, General Accounting. Financial management: Some DOD contractors abuse the federal tax system with little consequence : report to congressional requesters. U.S. General Accounting Office, 2004.
Find full textBook chapters on the topic "Evasion attack"
Lucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, and Saurabh Shintre. "Deceiving ML-Based Friend-or-Foe Identification for Executables." In Advances in Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Full textXiao, Han, Thomas Stibor, and Claudia Eckert. "Evasion Attack of Multi-class Linear Classifiers." In Advances in Knowledge Discovery and Data Mining. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30217-6_18.
Full textFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Full textLakshmi, Sripada Manasa, Manvjeet Kaur, Awadhesh Kumar Shukla, and Nahita Pathania. "Evasion Attack for Fingerprint Biometric System and Countermeasure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0324-5_7.
Full textVitorino, João, Eva Maia, and Isabel Praça. "Adversarial Evasion Attack Efficiency Against Large Language Models." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76459-2_2.
Full textMaurya, Vikas, Rachit Agarwal, and Sandeep Shukla. "Evasion Attack Against Multivariate Singular Spectrum Analysis Based IDS." In Critical Information Infrastructures Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62139-0_8.
Full textGuarnera, Luca, Francesco Guarnera, Alessandro Ortis, Sebastiano Battiato, and Giovanni Puglisi. "Evasion Attack on Deepfake Detection via DCT Trace Manipulation." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88223-4_12.
Full textKwon, Hyun, Hyunsoo Yoon, and Daeseon Choi. "Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network." In Information Security and Cryptology – ICISC 2017. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78556-1_20.
Full textKomeylian, Somayeh, Christopher Paolini, and Mahasweta Sarkar. "Overcoming an Evasion Attack on a CNN Model in the MIMO-OFDM Wireless Communication Channel." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1203-2_7.
Full textLurski, Nicholas, and Mohamed Younis. "Application and Mitigation of the Evasion Attack against a Deep Learning Based IDS for IoT." In Machine Learning for Networking. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98978-1_6.
Full textConference papers on the topic "Evasion attack"
E R R, Arjun, Pavan Kulkarni, Yuvaraj Govindarajulu, Harshit Shah, and Manojkumar Parmar. "Evasion Attacks on Object Detection Models using Attack Transferability." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00009.
Full textChiaro, Diletta, Pian Qi, Edoardo Prezioso, Antonella Guzzo, and Francesco Piccialli. "FLAME: Federated Learning for Attack Mitigation and Evasion." In 2025 IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE, 2025. https://doi.org/10.1109/ipdps64566.2025.00060.
Full textNirmal, Santosh, and Pramod Patil. "Evasion Attack against CNN-Adaboost Electricity Theft Detection in Smart Grid." In 2024 International Conference on Intelligent Systems and Advanced Applications (ICISAA). IEEE, 2024. https://doi.org/10.1109/icisaa62385.2024.10829076.
Full textKadri, Jawad, Alex Lott, Brendan Mailloux, et al. "Evasion Adversarial Attacks Perturbations in Network Security." In 2024 IEEE 10th World Forum on Internet of Things (WF-IoT). IEEE, 2024. https://doi.org/10.1109/wf-iot62078.2024.10811295.
Full textPermpoon, Nayotsakorn, Titichaya Thanamitsomboon, and Kanticha Kittipeerachon. "Analysis of Classification Models of Firewall Log Data Attacked by Data Poisoning and Evasion Attacks." In 2024 9th International Conference on Business and Industrial Research (ICBIR). IEEE, 2024. https://doi.org/10.1109/icbir61386.2024.10875909.
Full textAryal, Kshitiz, Maanak Gupta, Mahmoud Abdelsalam, and Moustafa Saleh. "Explainability Guided Adversarial Evasion Attacks on Malware Detectors." In 2024 33rd International Conference on Computer Communications and Networks (ICCCN). IEEE, 2024. http://dx.doi.org/10.1109/icccn61486.2024.10637577.
Full textKoball, Carson, and Yong Wang. "Evasion Attacks on Tree-Based Machine Learning Models." In 2025 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2025. https://doi.org/10.1109/icce63647.2025.10929896.
Full textJung, Kuchul, Jongseok Woo, and Saibal Mukhopadhyay. "A Hybrid Approach to Defend Against Adversarial Evasion Attacks." In 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2024. http://dx.doi.org/10.1109/mwscas60917.2024.10658742.
Full textKrzysztoń, Mateusz, Bartosz Bok, Paweł Żakieta, and Joanna Kołodziej. "Evasion attacks on ML in domains with nonlinear constraints." In 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW). IEEE, 2024. http://dx.doi.org/10.1109/ccgridw63211.2024.00020.
Full textYudin, Matthew, Yingbo Song, Constantin Serban, and Ritu Chadha. "Exposing Vulnerabilities in PDF Malware Detectors to Evasion Attacks." In MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM). IEEE, 2024. https://doi.org/10.1109/milcom61039.2024.10773945.
Full textReports on the topic "Evasion attack"
Farrell, Matthew. Evasion Attacks. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430776.
Full text