However, to the best of our knowledge, there are no works which propose a means for ranking the transferability of an adversarial example in the perspective of a blackbox attacker.
Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives.
In this paper, we present DANTE: a framework and algorithm for mining darknet traffic.
In this paper, we present the Vernam Physical Signal Cipher (VPSC): a novel cipher which can encrypt the harmonic composition of any analog waveform.
Cryptography and Security
In online learning, the challenge is to find the optimum set of features to be acquired from each instance upon arrival from a data stream.
In this paper, we show how an attacker can use deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical scans.
The proliferation of IoT devices which can be more easily compromised than desktop computers has led to an increase in the occurrence of IoT based botnet attacks.
In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner.