Journal articles on the topic 'Evasion attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Evasion attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alshahrani, Ebtihaj, Daniyal Alghazzawi, Reem Alotaibi, and Osama Rabie. "Adversarial attacks against supervised machine learning based network intrusion detection systems." PLOS ONE 17, no. 10 (2022): e0275971. http://dx.doi.org/10.1371/journal.pone.0275971.
Full textMrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.
Full textBrohi, Sarfraz, and Qurat-ul-ain Mastoi. "AI Under Attack: Metric-Driven Analysis of Cybersecurity Threats in Deep Learning Models for Healthcare Applications." Algorithms 18, no. 3 (2025): 157. https://doi.org/10.3390/a18030157.
Full textNirmal, Santosh, and Pramod Patil. "Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection." Electronics ETF 28, no. 2 (2024): 46–53. https://doi.org/10.53314/els2428046n.
Full textWang, Qingya, Yi Wu, Haojun Xuan, and Huishu Wu. "FLARE: A Backdoor Attack to Federated Learning with Refined Evasion." Mathematics 12, no. 23 (2024): 3751. http://dx.doi.org/10.3390/math12233751.
Full textSpeth, Cornelia, and Günter Rambach. "Complement Attack againstAspergillusand Corresponding Evasion Mechanisms." Interdisciplinary Perspectives on Infectious Diseases 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/463794.
Full textChen, Hongyi, Jinshu Su, Linbo Qiao, and Qin Xin. "Malware Collusion Attack against SVM: Issues and Countermeasures." Applied Sciences 8, no. 10 (2018): 1718. http://dx.doi.org/10.3390/app8101718.
Full textEvdokimenkov, Veniamin N., Dmitriy A. Kozorez, and Lev N. Rabinskiy. "Unmanned aerial vehicle evasion manoeuvres from enemy aircraft attack." Journal of the Mechanical Behavior of Materials 30, no. 1 (2021): 87–94. http://dx.doi.org/10.1515/jmbm-2021-0009.
Full textSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh, and Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)." Sensors 23, no. 12 (2023): 5459. http://dx.doi.org/10.3390/s23125459.
Full textAlzaidy, Sharoug, and Hamad Binsalleeh. "Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification." Applied Sciences 14, no. 4 (2024): 1673. http://dx.doi.org/10.3390/app14041673.
Full textLi, Jiate, Meng Pang, and Binghui Wang. "Practicable Black-Box Evasion Attacks on Link Prediction in Dynamic Graphs—a Graph Sequential Embedding Method." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 25 (2025): 26265–72. https://doi.org/10.1609/aaai.v39i25.34824.
Full textDai, Jiazhu, and Siwei Xiong. "An Evasion Attack against Stacked Capsule Autoencoder." Algorithms 15, no. 2 (2022): 32. http://dx.doi.org/10.3390/a15020032.
Full textKhorshidpour, Zeinab, Jafar Tahmoresnezhad, Sattar Hashemi, and Ali Hamzeh. "Domain invariant feature extraction against evasion attack." International Journal of Machine Learning and Cybernetics 9, no. 12 (2017): 2093–104. http://dx.doi.org/10.1007/s13042-017-0692-6.
Full textFriedman, HM, C. Saldanha, L. Wang, et al. "Herpes simplex virus evasion of complement attack." Immunopharmacology 49, no. 1-2 (2000): 58. http://dx.doi.org/10.1016/s0162-3109(00)80166-6.
Full textFu, Zhongwang, and Xiaohui Cui. "ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model." Entropy 25, no. 2 (2023): 215. http://dx.doi.org/10.3390/e25020215.
Full textGhanem, Khadoudja, Ziad Kherbache, and Omar Ourdighi. "Enhancing Adversarial Examples for Evading Malware Detection Systems: A Memetic Algorithm Approach." International Journal of Computer Network and Information Security 17, no. 1 (2025): 1–16. https://doi.org/10.5815/ijcnis.2025.01.01.
Full textZhao, Maochang, and Jing Zhang. "Highly Imperceptible Black-Box Graph Injection Attacks with Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13357–64. https://doi.org/10.1609/aaai.v39i12.33458.
Full textLarsen, Mads Delbo, Sisse Ditlev, Rafael Bayarri Olmos, et al. "Malaria parasite evasion of classical complement pathway attack." Molecular Immunology 89 (September 2017): 159. http://dx.doi.org/10.1016/j.molimm.2017.06.123.
Full textMiller, David, Yujia Wang, and George Kesidis. "When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time." Neural Computation 31, no. 8 (2019): 1624–70. http://dx.doi.org/10.1162/neco_a_01209.
Full textLior, Sidi, Nadler Asaf, and Shabtai Asaf. "MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses." IEEE Access 8 (September 10, 2020): 161580–92. https://doi.org/10.1109/ACCESS.2020.3020964.
Full textB, Priyadarsana. "The Qilin(Agenda) Ransomware Campaign: Attack Vectors, Evasion Techniques, and Mitigation Strategies." International Journal for Research in Applied Science and Engineering Technology 13, no. 7 (2025): 334–40. https://doi.org/10.22214/ijraset.2025.73005.
Full textICHETOVKIN, E. A., and I. V. KOTENKO. "MODELS AND ALGORITHMS FOR PROTECTING INTRUSION DETECTION SYSTEMS FROM ATTACKS ON MACHINE LEARNING COMPONENTS." Computational Nanotechnology 12, no. 1 (2025): 17–25. https://doi.org/10.33693/2313-223x-2025-12-1-17-25.
Full textILYA V., VOLODIN, PUTYATO MICHAEL M., MAKARYAN ALEXANDER S., and EVGLEVSKY VYACHESLAV YU. "CLASSIFICATION OF ATTACK MECHANISMS AND RESEARCH OF PROTECTION METHODS FOR SYSTEMS USING MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE ALGORITHMS." CASPIAN JOURNAL: Control and High Technologies 54, no. 2 (2021): 90–98. http://dx.doi.org/10.21672/2074-1707.2021.53.1.090-098.
Full textImran, Muhammad, Annalisa Appice, and Donato Malerba. "Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection." Future Internet 16, no. 5 (2024): 168. http://dx.doi.org/10.3390/fi16050168.
Full textBao, Hongyan, Yufei Han, Yujun Zhou, Xin Gao, and Xiangliang Zhang. "Towards Efficient and Domain-Agnostic Evasion Attack with High-Dimensional Categorical Inputs." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 6 (2023): 6753–61. http://dx.doi.org/10.1609/aaai.v37i6.25828.
Full textZhang, Yunchun, Jiaqi Jiang, Chao Yi, et al. "A Robust CNN for Malware Classification against Executable Adversarial Attack." Electronics 13, no. 5 (2024): 989. http://dx.doi.org/10.3390/electronics13050989.
Full textJari, Sawsan Darweesh. "Review: Parasite Strategies to Escape Attack by The Immune System of Their Hosts." European Journal of Theoretical and Applied Sciences 2, no. 2 (2024): 154–56. http://dx.doi.org/10.59324/ejtas.2024.2(2).14.
Full textSawsan, Darweesh Jari. "Review: Parasite Strategies to Escape Attack by The Immune System of Their Hosts." European Journal of Theoretical and Applied Sciences 2, no. 2 (2024): 154–56. https://doi.org/10.59324/ejtas.2024.2(2).14.
Full textFan, Zuoe, Hao Ding, Linping Feng, Bochen Li, and Lei Song. "Research on Time-Cooperative Guidance with Evasive Maneuver for Multiple Underwater Intelligent Vehicles." Journal of Marine Science and Engineering 12, no. 6 (2024): 1018. http://dx.doi.org/10.3390/jmse12061018.
Full textAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Full textZhou, Qi, Haipeng Chen, Yitao Zheng, and Zhen Wang. "EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 16 (2021): 14602–11. http://dx.doi.org/10.1609/aaai.v35i16.17716.
Full textNaheed Sultana and T C Swetha Priya. "Role of Accomplices in Morphing Attacks: AComprehensive Survey." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 43–50. https://doi.org/10.46647/ijetms.2025.v09si01.006.
Full textLi, Deqiang, Qianmu Li, Yanfang (Fanny) Ye, and Shouhuai Xu. "Arms Race in Adversarial Malware Detection: A Survey." ACM Computing Surveys 55, no. 1 (2023): 1–35. http://dx.doi.org/10.1145/3484491.
Full textKWON, Hyun, Changhyun CHO, and Jun LEE. "Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1880–89. http://dx.doi.org/10.1587/transinf.2022ngp0002.
Full textCao, Han, Chengxiang Si, Qindong Sun, Yanxiao Liu, Shancang Li, and Prosanta Gope. "ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers." Entropy 24, no. 3 (2022): 412. http://dx.doi.org/10.3390/e24030412.
Full textSidi, Lior, Asaf Nadler, and Asaf Shabtai. "MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses." IEEE Access 8 (2020): 161580–92. http://dx.doi.org/10.1109/access.2020.3020964.
Full textChan, Patrick P. K., Zhe Lin, Xian Hu, Eric C. C. Tsang, and Daniel S. Yeung. "Sensitivity based robust learning for stacked autoencoder against evasion attack." Neurocomputing 267 (December 2017): 572–80. http://dx.doi.org/10.1016/j.neucom.2017.06.032.
Full textWes Leid, R., C. M. Suquet, and L. Tanigoshi. "Parasite defense mechanisms for evasion of host attack; A review." Veterinary Parasitology 25, no. 2 (1987): 147–62. http://dx.doi.org/10.1016/0304-4017(87)90101-4.
Full textKleber, Stephan, and Patrick Wachter. "[Titel] A Strategy to Evaluate Test Time Evasion Attack Feasibility." Datenschutz und Datensicherheit - DuD 47, no. 8 (2023): 478–82. http://dx.doi.org/10.1007/s11623-023-1802-0.
Full textEcheberria-Barrio, Xabier, Amaia Gil-Lerchundi, Iñigo Mendialdua, and Raul Orduna-Urrutia. "Topological safeguard for evasion attack interpreting the neural networks’ behavior." Pattern Recognition 147 (March 2024): 110130. http://dx.doi.org/10.1016/j.patcog.2023.110130.
Full textWANG, Zhong, Zhiwen WEN, Weijun CAI, and Pei WANG. "Research on game strategy of underwater attack and defense process in typical situation." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, no. 4 (2023): 774–83. http://dx.doi.org/10.1051/jnwpu/20234140774.
Full textTayyab, Umm-e.-Hani, Muhammad Zain, Faiza Babar Khan, and Dr Muhammad Hanif Durad. "Identification of Malicious PDFs Using Convolutional Neural Networks." VFAST Transactions on Software Engineering 10, no. 3 (2022): 51–57. http://dx.doi.org/10.21015/vtse.v10i3.1114.
Full textRejito, Juli, Deris Stiawan, Ahmed Alshaflut, and Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack." Computer Science and Information Technologies 5, no. 2 (2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.pp122-129.
Full textRejito, Juli, Deris Stiawan, Ahmed Alshaflut, and Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack." Computer Science and Information Technologies 5, no. 2 (2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.p122-129.
Full textJuli, Rejito, Stiawan Deris, Alshaflut Ahmed, and Budiarto Rahmat. "Machine learning-based anomaly detection for smart home networks under adversarial attack." Computer Science and Information Technologies 5, no. 2 (2024): 122–29. https://doi.org/10.11591/csit.v5i2.pp122-129.
Full textEvdokimenkov, V. N., M. N. Krasilshchikov, and N. A. Lyapin. "THE RESEARCH OF UNMANNED AIRCRAFT EVASIVE MANEUVERS FROM ATTACK BY ENEMY AIRCRAFT ON THE BASIS OF THE GAME APPROACH." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 184 (October 2019): 21–31. http://dx.doi.org/10.14489/vkit.2019.10.pp.021-031.
Full textMoussaileb, Routa, Nora Cuppens, Jean-Louis Lanet, and Hélène Le Bouder. "A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3453153.
Full textKwon, Hyun. "Untargeted Evasion Attacks on Deep Neural Networks Using StyleGAN." Electronics 14, no. 3 (2025): 574. https://doi.org/10.3390/electronics14030574.
Full textCao, Ning, Yingying Wang, Guofu Li, Yuyan Shen, Junshe Wang, and Hongbin Zhang. "Improve the robustness of data mining algorithm against adversarial evasion attack." International Journal of Innovative Computing and Applications 9, no. 3 (2018): 142. http://dx.doi.org/10.1504/ijica.2018.093732.
Full textZhang, Hongbin, Junshe Wang, Ning Cao, Yuyan Shen, Guofu Li, and Yingying Wang. "Improve the robustness of data mining algorithm against adversarial evasion attack." International Journal of Innovative Computing and Applications 9, no. 3 (2018): 142. http://dx.doi.org/10.1504/ijica.2018.10014854.
Full text