Journal articles on the topic 'SVM and poisoning attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SVM and poisoning attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mahalle, Sheetal Anil, and Kaushal Kumar Dr. "Optimised curie pre-filter defending technique for SVM against poisoning attack." International Journal of Advance Research in Multidisciplinary 1, no. 2 (2023): 447–51. https://doi.org/10.5281/zenodo.14617570.
Full textJiao, Shuobo. "Impact of SVM-based Poisoning on the Semantic Recognition of Sounds." Applied and Computational Engineering 109, no. 1 (2024): 103–8. http://dx.doi.org/10.54254/2755-2721/109/20241412.
Full textUpreti, Deepak, Hyunil Kim, Eunmok Yang, and Changho Seo. "Defending against label-flipping attacks in federated learning systems using uniform manifold approximation and projection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 459. http://dx.doi.org/10.11591/ijai.v13.i1.pp459-466.
Full textUpreti, Deepak, Hyunil Kim, Eunmok Yang, and Changho Seo. "Defending against label-flipping attacks in federated learning systems using uniform manifold approximation and projection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 459–66. https://doi.org/10.11591/ijai.v13.i1.pp459-466.
Full textRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, et al. "AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure." Sensors 23, no. 21 (2023): 8928. http://dx.doi.org/10.3390/s23218928.
Full textSajid, Maimoona Bint E., Sameeh Ullah, Nadeem Javaid, Ibrar Ullah, Ali Mustafa Qamar, and Fawad Zaman. "Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain." Wireless Communications and Mobile Computing 2022 (January 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/7386049.
Full textRawat, Romil, and Shailendra Kumar Shrivastav. "SQL injection attack Detection using SVM." International Journal of Computer Applications 42, no. 13 (2012): 1–4. http://dx.doi.org/10.5120/5749-7043.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textZhao, Puning, and Zhiguo Wan. "Robust Nonparametric Regression under Poisoning Attack." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 15 (2024): 17007–15. http://dx.doi.org/10.1609/aaai.v38i15.29644.
Full textChen, Hongyi, Jinshu Su, Linbo Qiao, and Qin Xin. "Malware Collusion Attack against SVM: Issues and Countermeasures." Applied Sciences 8, no. 10 (2018): 1718. http://dx.doi.org/10.3390/app8101718.
Full textGodinho, António, José Rosado, Filipe Sá, Filipe Caldeira, and Filipe Cardoso. "Torrent Poisoning Protection with a Reverse Proxy Server." Electronics 12, no. 1 (2022): 165. http://dx.doi.org/10.3390/electronics12010165.
Full textParadise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Full textIoannou, Christiana, and Vasos Vassiliou. "Network Attack Classification in IoT Using Support Vector Machines." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 58. http://dx.doi.org/10.3390/jsan10030058.
Full textZhang, Ruo, and Guiqin Yang. "Research on DDoS Attack Detection Based on GBDT-SVM Model in SDN Architecture." Journal of Computers 36, no. 1 (2025): 15–28. https://doi.org/10.63367/199115992025023601002.
Full textSong, Xuan, Huibin Li, Kailang Hu, and Guangjun Zai. "Backdoor Federated Learning by Poisoning Key Parameters." Electronics 14, no. 1 (2024): 129. https://doi.org/10.3390/electronics14010129.
Full textErmilova, A., E. Kovtun, D. Berestnev, and A. Zaytsev. "Hiding Backdoors within Event Sequence Data via Poisoning Attacks." Doklady Mathematics 110, S1 (2024): S288—S298. https://doi.org/10.1134/s1064562424602221.
Full textZhu, Yanxu, Hong Wen, Runhui Zhao, Yixin Jiang, Qiang Liu, and Peng Zhang. "Research on Data Poisoning Attack against Smart Grid Cyber–Physical System Based on Edge Computing." Sensors 23, no. 9 (2023): 4509. http://dx.doi.org/10.3390/s23094509.
Full textH.K., Madhu, and D. Ramesh. "Heart Attack Analysis and Prediction using SVM." International Journal of Computer Applications 183, no. 27 (2021): 35–39. http://dx.doi.org/10.5120/ijca2021921658.
Full textZhang, Jintao, Chao Zhang, Guoliang Li, and Chengliang Chai. "PACE: Poisoning Attacks on Learned Cardinality Estimation." Proceedings of the ACM on Management of Data 2, no. 1 (2024): 1–27. http://dx.doi.org/10.1145/3639292.
Full textFan, Jiaxin, Mohan Li, Yanbin Sun, and Peng Chen. "DRLAttack: A Deep Reinforcement Learning-Based Framework for Data Poisoning Attack on Collaborative Filtering Algorithms." Applied Sciences 15, no. 10 (2025): 5461. https://doi.org/10.3390/app15105461.
Full textYu, Fangchao, Bo Zeng, Kai Zhao, Zhi Pang, and Lina Wang. "Chronic Poisoning: Backdoor Attack against Split Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 15 (2024): 16531–38. http://dx.doi.org/10.1609/aaai.v38i15.29591.
Full textZhou, Xingchen, Ming Xu, Yiming Wu, and Ning Zheng. "Deep Model Poisoning Attack on Federated Learning." Future Internet 13, no. 3 (2021): 73. http://dx.doi.org/10.3390/fi13030073.
Full textSHIN, Youngjoo. "DCUIP Poisoning Attack in Intel x86 Processors." IEICE Transactions on Information and Systems E104.D, no. 8 (2021): 1386–90. http://dx.doi.org/10.1587/transinf.2020edl8148.
Full textKwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (2019): 892. http://dx.doi.org/10.3390/sym11070892.
Full textRasha Thamer Shawe, Kawther Thabt Saleh, and Farah Neamah Abbas. "Building attack detection system base on machine learning." Global Journal of Engineering and Technology Advances 6, no. 2 (2021): 018–32. http://dx.doi.org/10.30574/gjeta.2021.6.2.0010.
Full textRasha, Thamer Shawe, Thabt Saleh Kawther, and Neamah Abbas Farah. "Building attack detection system base on machine learning." Global Journal of Engineering and Technology Advances 6, no. 2 (2021): 018–32. https://doi.org/10.5281/zenodo.4616048.
Full textAissaoui, Sihem, and Sofiane Boukli Hacene. "Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 16–31. http://dx.doi.org/10.4018/ijwnbt.2021070102.
Full textLONG, JUN, WENTAO ZHAO, FANGZHOU ZHU, and ZHIPING CAI. "ACTIVE LEARNING TO DEFEND POISONING ATTACK AGAINST SEMI-SUPERVISED INTRUSION DETECTION CLASSIFIER." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 19, supp01 (2011): 93–106. http://dx.doi.org/10.1142/s0218488511007362.
Full textLiu, Fengchun, Sen Zhang, Weining Ma, and Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine." Mathematics 10, no. 15 (2022): 2713. http://dx.doi.org/10.3390/math10152713.
Full textLee, Jaehyun, Youngho Cho, Ryungeon Lee, et al. "A Novel Data Sanitization Method Based on Dynamic Dataset Partition and Inspection Against Data Poisoning Attacks." Electronics 14, no. 2 (2025): 374. https://doi.org/10.3390/electronics14020374.
Full textV. Punitha and C. Mala. "SVM based Traffic Classification for Mitigating HTTP Attack." Research Briefs on Information and Communication Technology Evolution 4 (August 15, 2018): 37–45. http://dx.doi.org/10.56801/rebicte.v4i.64.
Full textBehnoush, B., E. Bazmi, SH Nazari, S. Khodakarim, MA Looha, and H. Soori. "Machine learning algorithms to predict seizure due to acute tramadol poisoning." Human & Experimental Toxicology 40, no. 8 (2021): 1225–33. http://dx.doi.org/10.1177/0960327121991910.
Full textWu, Young, Jeremy McMahan, Xiaojin Zhu, and Qiaomin Xie. "Reward Poisoning Attacks on Offline Multi-Agent Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 9 (2023): 10426–34. http://dx.doi.org/10.1609/aaai.v37i9.26240.
Full textLyu, Xiaoting, Yufei Han, Wei Wang, et al. "Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 7 (2023): 9020–28. http://dx.doi.org/10.1609/aaai.v37i7.26083.
Full textManguling, Inez sri wahyuningsi, and Jumadi Mabe Parenreng. "Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks." Internet of Things and Artificial Intelligence Journal 3, no. 4 (2023): 325–40. http://dx.doi.org/10.31763/iota.v3i4.612.
Full textShi, Tianyu. "The Research about Heart Attack Prediction Model." Highlights in Science, Engineering and Technology 99 (June 18, 2024): 28–33. http://dx.doi.org/10.54097/xzaanz17.
Full textJingyuan Fan, Jingyuan Fan, Guiqin Yang Jingyuan Fan, and Jiyang Gai Guiqin Yang. "DDoS Attack Detection System Based on RF-SVM-IL Model Under SDN." 電腦學刊 32, no. 5 (2021): 031–43. http://dx.doi.org/10.53106/199115992021103205003.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of TCP-Based DDoS Attacks with SVM Classification with Different Kernel Functions Using Common Uncorrelated Feature Subsets." International Journal of Safety and Security Engineering 12, no. 2 (2022): 239–49. http://dx.doi.org/10.18280/ijsse.120213.
Full textCui, Jing, Yufei Han, Yuzhe Ma, Jianbin Jiao, and Junge Zhang. "BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 10 (2024): 11687–94. http://dx.doi.org/10.1609/aaai.v38i10.29052.
Full textShi, Siping, Chuang Hu, Dan Wang, Yifei Zhu, and Zhu Han. "Federated Anomaly Analytics for Local Model Poisoning Attack." IEEE Journal on Selected Areas in Communications 40, no. 2 (2022): 596–610. http://dx.doi.org/10.1109/jsac.2021.3118347.
Full textYoshikura, Hiroshi. "Attack Rate in Food Poisoning: Order in Chaos." Japanese Journal of Infectious Diseases 68, no. 5 (2015): 394–406. http://dx.doi.org/10.7883/yoken.jjid.2014.374.
Full textKWON, Hyun, and Sunghwan CHO. "Multi-Targeted Poisoning Attack in Deep Neural Networks." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1916–20. http://dx.doi.org/10.1587/transinf.2022ngl0006.
Full textSourav, Kumar Bhoi, and Prasad K. Krishna. "A Cloud Based Machine Intelligent Framework to Identify DDoS Botnet Attack in Internet of Things." International Journal of Innovative Research in Engineering & Management (IJIREM) 9, no. 4 (2022): 1–5. https://doi.org/10.5281/zenodo.7276342.
Full textBanodha1, Bhavna. "A Machine Learning Based Approach for Identifying Adversarial Poisoning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43093.
Full textWu, Young, Jeremy McMahan, Xiaojin Zhu, and Qiaomin Xie. "Data Poisoning to Fake a Nash Equilibria for Markov Games." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 14 (2024): 15979–87. http://dx.doi.org/10.1609/aaai.v38i14.29529.
Full textWu, Jianping, Jiahe Jin, and Chunming Wu. "Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction." Mathematics 12, no. 6 (2024): 901. http://dx.doi.org/10.3390/math12060901.
Full textMehta, Suma B., and A. Rengarajan. "A Survey on ARP Poisoning." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 02 (2024): 1031–37. http://dx.doi.org/10.15680/ijircce.2024.1202051.
Full textGregori, Gabriella Silva de, Elisângela de Souza Loureiro, Luis Gustavo Amorim Pessoa, et al. "Machine Learning in the Hyperspectral Classification of Glycaspis brimblecombei (Hemiptera Psyllidae) Attack Severity in Eucalyptus." Remote Sensing 15, no. 24 (2023): 5657. http://dx.doi.org/10.3390/rs15245657.
Full textN, Kalaiarasi, Kadirvel A, Geethamahalakshmi G, Nageswari D, Hariharan N, and Senthil Kumar S. "Mitigation of Attacks via Improved Network Security in IoT Network using Machine Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (2023): 541–47. http://dx.doi.org/10.17762/ijritcc.v11i10s.7692.
Full textShalabi, Eman, Walid Khedr, Ehab Rushdy, and Ahmad Salah. "A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis." Information 16, no. 3 (2025): 244. https://doi.org/10.3390/info16030244.
Full text