ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2308.06819
  4. Cited By
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

13 August 2023
João Vitorino
Isabel Praça
Eva Maia
    AAML
ArXivPDFHTML

Papers citing "SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection"

24 / 24 papers shown
Title
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
55
7
0
08 Jun 2023
Towards Adversarial Realism and Robust Learning for IoT Intrusion
  Detection and Classification
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
João Vitorino
Isabel Praça
Eva Maia
AAML
63
28
0
30 Jan 2023
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
AAML
62
106
0
17 Jun 2021
Launching Adversarial Attacks against Network Intrusion Detection
  Systems for IoT
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Pavlos Papadopoulos
Oliver Thornewill von Essen
Nikolaos Pitropakis
C. Chrysoulas
Alexios Mylonas
William J. Buchanan
AAML
65
50
0
26 Apr 2021
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
76
595
0
17 Jul 2020
Adversarial Attacks on Machine Learning Cybersecurity Defences in
  Industrial Control Systems
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Eirini Anthi
Lowri Williams
Matilda Rhode
Pete Burnap
Adam Wedgbury
AAML
16
123
0
10 Apr 2020
Adversarial Machine Learning -- Industry Perspectives
Adversarial Machine Learning -- Industry Perspectives
Ramnath Kumar
Magnus Nyström
J. Lambert
Andrew Marshall
Mario Goertzel
Andi Comissoneru
Matt Swann
Sharon Xia
AAML
SILM
53
235
0
04 Feb 2020
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
43
105
0
13 Nov 2019
Analyzing Adversarial Attacks Against Deep Learning for Intrusion
  Detection in IoT Networks
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Olakunle Ibitoye
Omair Shafiq
Ashraf Matrawy
26
163
0
13 May 2019
Adversarial Training for Free!
Adversarial Training for Free!
Ali Shafahi
Mahyar Najibi
Amin Ghiasi
Zheng Xu
John P. Dickerson
Christoph Studer
L. Davis
Gavin Taylor
Tom Goldstein
AAML
105
1,238
0
29 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
56
661
0
03 Apr 2019
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAML
OOD
230
279
0
03 Dec 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
47
233
0
13 Sep 2018
IDSGAN: Generative Adversarial Networks for Attack Generation against
  Intrusion Detection
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Zilong Lin
Yong-yu Shi
Zhi Xue
AAML
43
262
0
06 Sep 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
87
160
0
05 Aug 2018
Adversarial Patch
Adversarial Patch
Tom B. Brown
Dandelion Mané
Aurko Roy
Martín Abadi
Justin Gilmer
AAML
57
1,093
0
27 Dec 2017
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
D. Song
AAML
SILM
80
1,822
0
15 Dec 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
72
1,758
0
22 Aug 2017
Detecting Adversarial Samples from Artifacts
Detecting Adversarial Samples from Artifacts
Reuben Feinman
Ryan R. Curtin
S. Shintre
Andrew B. Gardner
AAML
74
892
0
01 Mar 2017
Deep Models Under the GAN: Information Leakage from Collaborative Deep
  Learning
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj
G. Ateniese
Fernando Perez-Cruz
FedML
107
1,385
0
24 Feb 2017
Universal adversarial perturbations
Universal adversarial perturbations
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
AAML
113
2,520
0
26 Oct 2016
Membership Inference Attacks against Machine Learning Models
Membership Inference Attacks against Machine Learning Models
Reza Shokri
M. Stronati
Congzheng Song
Vitaly Shmatikov
SLR
MIALM
MIACV
203
4,075
0
18 Oct 2016
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OOD
AAML
168
8,513
0
16 Aug 2016
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
166
14,831
1
21 Dec 2013
1