Academic literature on the topic 'SVM and poisoning attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SVM and poisoning attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SVM and poisoning attack"
Karvannan L and Dr. V S Thiyagarajan. "Data Poisoning Attacks on Federated Using Machine Learning." International Journal of Scientific Research in Science and Technology 12, no. 4 (2025): 85–90. https://doi.org/10.32628/ijsrst251257.
Full textMahalle, Sheetal Anil, and Kaushal Kumar Dr. "Optimised curie pre-filter defending technique for SVM against poisoning attack." International Journal of Advance Research in Multidisciplinary 1, no. 2 (2023): 447–51. https://doi.org/10.5281/zenodo.14617570.
Full textJiao, Shuobo. "Impact of SVM-based Poisoning on the Semantic Recognition of Sounds." Applied and Computational Engineering 109, no. 1 (2024): 103–8. http://dx.doi.org/10.54254/2755-2721/109/20241412.
Full textUpreti, Deepak, Hyunil Kim, Eunmok Yang, and Changho Seo. "Defending against label-flipping attacks in federated learning systems using uniform manifold approximation and projection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 459. http://dx.doi.org/10.11591/ijai.v13.i1.pp459-466.
Full textUpreti, Deepak, Hyunil Kim, Eunmok Yang, and Changho Seo. "Defending against label-flipping attacks in federated learning systems using uniform manifold approximation and projection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 459–66. https://doi.org/10.11591/ijai.v13.i1.pp459-466.
Full textRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, et al. "AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure." Sensors 23, no. 21 (2023): 8928. http://dx.doi.org/10.3390/s23218928.
Full textSajid, Maimoona Bint E., Sameeh Ullah, Nadeem Javaid, Ibrar Ullah, Ali Mustafa Qamar, and Fawad Zaman. "Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain." Wireless Communications and Mobile Computing 2022 (January 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/7386049.
Full textRawat, Romil, and Shailendra Kumar Shrivastav. "SQL injection attack Detection using SVM." International Journal of Computer Applications 42, no. 13 (2012): 1–4. http://dx.doi.org/10.5120/5749-7043.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textZhao, Puning, and Zhiguo Wan. "Robust Nonparametric Regression under Poisoning Attack." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 15 (2024): 17007–15. http://dx.doi.org/10.1609/aaai.v38i15.29644.
Full textDissertations / Theses on the topic "SVM and poisoning attack"
Thanh, Bui Tien. "Analysis of Topology Poisoning Attacks in Software-Defined Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172353.
Full textNazari, Mahmood, and Kun Zhou. "Campus Network Design and Man-In-The-Middle Attack." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25683.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textRuegg, Evonne Teresa Nicole. "Investigating the porphyrias through analysis of biochemical pathways." Thesis, University of Canterbury. Biochemistry, 2014. http://hdl.handle.net/10092/10257.
Full textYu-HongLi and 李昱宏. "New Light-Weight Approach to Mitigate DNS Cache Poisoning Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58809500201660231784.
Full textJeng, Jian-Ming, and 鄭健明. "A Probabilistic Model Against DNS Cache Poisoning Attack Under Multiple Resolvers." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/59364904777778432906.
Full textLin, Ya-Ching, and 林亞菁. "A Study of Cache Poisoning Attack on Wireless Networks and Its Countermeasure." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/17226249635367404772.
Full text(6636224), Seunghee Lee. "Incremental Support Vector Machine Approach for DoS and DDoS Attack Detection." Thesis, 2019.
Find full textBooks on the topic "SVM and poisoning attack"
Dirty Politics: How Attack Politics Is Poisoning New Zealand's Political Environment. Craig Potton Publishing, 2014.
Find full textFurst, John. The Complete First Aid Pocket Guide: Step-by-Step Treatment for All of Your Medical Emergencies Including • Heart Attack • Stroke • Food Poisoning ... • Shock • Anaphylaxis • Minor Wounds • Burns. Adams Media, 2018.
Find full textFurst, John. Complete First Aid Pocket Guide: Step-By-Step Treatment for All of Your Medical Emergencies Including * Heart Attack * Stroke * Food Poisoning * Choking * Head Injuries * Shock * Anaphylaxis * Minor Wounds * Burns. Adams Media Corporation, 2018.
Find full text(Editor), Christophor Dishovsky, Alexander Pivovarov (Editor), and Hendrik Benschop (Editor), eds. Medical Treatment of Intoxications and Decontamination of Chemical Agents in the Area of Terrorist Attack (NATO Science for Peace and Security Series / ... Security Series A: Chemistry and Biology). Springer, 2006.
Find full textHerring, Jonathan. 6. Non-Fatal Non-Sexual Offences Against the Person. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198811817.003.0006.
Full textBook chapters on the topic "SVM and poisoning attack"
Chen, Jinyin, Haibin Zheng, Mengmeng Su, Tianyu Du, Changting Lin, and Shouling Ji. "Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack." In Information Security and Cryptology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42921-8_10.
Full textHuynh, Tran, Anh Tran, Khoa D. Doan, and Tung Pham. "Data Poisoning Quantization Backdoor Attack." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-72907-2_3.
Full textTang, Yuhan, Zhiyuan Wu, Bo Gao, Tian Wen, Yuwei Wang, and Sheng Sun. "Logits Poisoning Attack in Federated Distillation." In Knowledge Science, Engineering and Management. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5498-4_22.
Full textAhmed, Mohiuddin, Jinpeng Wei, Yongge Wang, and Ehab Al-Shaer. "A Poisoning Attack Against Cryptocurrency Mining Pools." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00305-0_11.
Full textCheng, Zelei, and Zuotian Li. "Poisoning Attack for Inter-agent Transfer Learning." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90022-9_21.
Full textZhong, Junyan, Chang Liu, Huibin Wang, Lele Tian, Han Zhu, and Chan-Tong Lam. "Robust Graph Embedding Recommendation Against Data Poisoning Attack." In Lecture Notes in Computer Science. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2233-8_8.
Full textChen, Jinyin, Ximin Zhang, and Haibin Zheng. "Feature Transfer-Based Stealthy Poisoning Attack for DNNs." In Attacks, Defenses and Testing for Deep Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0425-5_2.
Full textSato, Teppei, Mitsuyoshi Imamura, and Kazumasa Omote. "Threat Analysis of Poisoning Attack Against Ethereum Blockchain." In Information Security Theory and Practice. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41702-4_9.
Full textGajbhiye, Saurabh, Priyanka Singh, and Shaifu Gupta. "Data Poisoning Attack by Label Flipping on SplitFed Learning." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-23599-3_30.
Full textNabavirazavi, Seyedsina, Rahim Taheri, Mani Ghahremani, and Sundararaja Sitharama Iyengar. "Model Poisoning Attack Against Federated Learning with Adaptive Aggregation." In Adversarial Multimedia Forensics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49803-9_1.
Full textConference papers on the topic "SVM and poisoning attack"
Xiujin, Shi, Sun Naiwen, Gong Jiawei, and Yu Shoujian. "FedGSDW:Enhancing Federated Learning Robustness against Model Poisoning Attack." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825224.
Full textSharma, Anshika, and Himanshi Babbar. "Innovative Approaches to Poisoning Attack Detection with Boosting Algorithms." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862074.
Full textLiao, Fenggui, Yongli Wang, and Dongmei Liu. "Poisoning Attack Detection Method Based on Adaptive Statistical Features." In 2024 4th International Conference on Digital Society and Intelligent Systems (DSInS). IEEE, 2024. https://doi.org/10.1109/dsins64146.2024.10992065.
Full textDe Santis, Marco, and Christian Esposito. "Federated Learning under Attack: Game-Theoretic Mitigation of Data Poisoning." In 2025 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2025. https://doi.org/10.1109/icstw64639.2025.10962524.
Full textSinha, Indrajeet Kumar, Avadhoot Bangal, Krishna Pratap Singh, and Shekhar Verma. "MDMFL: Monitored Defence Mechanism for Federated Learning against Data Poisoning Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725046.
Full textAristodemou, Marios, Xiaolan Liu, and Sangarapillai Lambotharan. "Bayesian Optimisation-Driven Poisoning Attack Against Personalised Federated Learning in Metaverse." In 2024 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/iccworkshops59551.2024.10615551.
Full textAlsharidah, Ahmad A., Devki Nandan Jha, Bo Wei, Ellis Solaiman, and Rajiv Ranjan. "SecureFed: Blockchain-Based Defence for Data Poisoning Attack in Federated Learning." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00064.
Full textChen, Yu-Chun, Hui-Nien Hung, Shun-Ren Yang, Yu-Chen Chou, and Phone Lin. "On Defending against Label Flipping Poisoning Attack for Personalized Federated Learning." In 2025 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2025. https://doi.org/10.1109/iwcmc65282.2025.11059648.
Full textWang, Ziyi, and Liyuan Liu. "Manipulation and Destruction: A Novel Hybrid Poisoning Attack Against Federated Recommender Systems." In 2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC). IEEE, 2024. https://doi.org/10.1109/icceic64099.2024.10775988.
Full textZhang, Lu, Reginald Cushing, and Paola Grosso. "Defending OC-SVM based IDS from poisoning attacks." In 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2022. http://dx.doi.org/10.1109/dsc54232.2022.9888908.
Full text