The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for defenses with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1999 (15) 2000-2002 (17) 2003-2004 (28) 2005 (29) 2006 (32) 2007 (18) 2008 (41) 2009 (22) 2010 (15) 2011 (16) 2012 (45) 2013 (44) 2014 (55) 2015 (59) 2016 (41) 2017 (65) 2018 (97) 2019 (110) 2020 (145) 2021 (132) 2022 (177) 2023 (204) 2024 (33)
Publication types (Num. hits)
article(516) book(2) data(1) incollection(23) inproceedings(855) phdthesis(28) proceedings(15)
Venues (Conferences, Journals, ...)
RAID(374) CoRR(262) SCORED@CCS(28) CCS(23) USENIX Security Symposium(20) IEEE Access(16) IEEE Secur. Priv.(15) IEEE Trans. Dependable Secur. ...(13) MTD@CCS(13) NeurIPS(13) ACSAC(12) ADIoT(11) ICLR(10) AsiaCCS(9) Comput. Secur.(9) ICML(8) More (+10 of total 380)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 281 occurrences of 202 keywords

Results
Found 1440 publication records. Showing 1440 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
63David M. Nicol, Michael Liljenstam Models and Analysis of Active Worm Defense. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Michael Liljenstam, David M. Nicol Comparing Passive and Active Worm Defenses. Search on Bibsonomy QEST The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic Combining Speak-Up with DefCOM for Improved DDoS Defense. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Bruce Hartpence Teaching wireless security for results. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack/defend, teaching, wireless security
40Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, pervasive computing, implantable medical devices, medical safety
40Úlfar Erlingsson Low-Level Software Security: Attacks and Defenses. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Ji Wu 0006, Chaoqun Ye, Shiyao Jin Adversarial Organization Modeling for Network Attack/Defense. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Seung Ho Na, Kwanwoo Kim, Seungwon Shin Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Xhelal Likaj, Soheil Khodayari, Giancarlo Pellegrino Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks. Search on Bibsonomy RAID The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash On Design Inference from Binaries Compiled using Modern C++ Defenses. Search on Bibsonomy RAID The full citation details ... 2019 DBLP  BibTeX  RDF
30Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis Evaluating control-flow restricting defenses. Search on Bibsonomy The Continuing Arms Race The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Warren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
30Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz Evaluating the Effectiveness of Current Anti-ROP Defenses. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Nan Jiang 0017, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein Systematic Analysis of Defenses against Return-Oriented Programming. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Katerina J. Argyraki, David R. Cheriton Scalable network-layer defense against internet bandwidth-flooding attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF denial-of-service defenses, traffic filtering, network-level security and protection
28Spyros Antonatos, Quang Hieu Vu Harnessing the Power of P2P Systems for Fast Attack Signature Validation. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signature validation, P2P defenses, indexing
28Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis A Network Game with Attackers and a Defender. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria
28Frédéric Vanderhaegen, Sébastien Chalmé, Françoise Anceaux, Patrick Millot Principles of cooperation and competition: application to car driver behavior analysis. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF BCD model, Car driver, Human factors, Cooperation, Competition, Defenses, Risk control
28Paul Schmehl Barbarians at the gateway, defeating viruses in EDU. Search on Bibsonomy SIGUCCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF malicious programs, security, strategies, blocking, viruses, anti-virus, defenses
28Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove An analysis of social network-based Sybil defenses. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social network-based Sybil defense, communities, social networks, sybil attacks
28Martin R. Stytz The Shape of Crimeware to Come (review of Crimeware: Understanding New Attacks and Defenses by M. Jacobsson and Z. Ramzan) [Book reviews]. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Zheng Zhang 0009, Ying Zhang 0022, Y. Charlie Hu, Zhuoqing Morley Mao Practical defenses against BGP prefix hijacking. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Vitaly Shmatikov, Ming-Hsiu Wang Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Nikita Borisov Computational Puzzles as Sybil Defenses. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jeffrey P. Ridder, Jason C. HandUber Mission planning for joint suppression of enemy air defenses using a genetic algorithm. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genetic algorithms, mission planning
28Jeff S. L. Cheng, Victor K. Wei Defenses against the Truncation of Computation Results of Free-Roaming Agents. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent route protection, cryptographic protocols, mobile agent security, malicious host, truncation attack
28John P. McDermott, R. Gelinas, S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare
25Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from DNS rebinding attacks. Search on Bibsonomy ACM Trans. Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spam, firewall, DNS, Same-origin policy, click fraud
25Adam Barth, Juan Caballero, Dawn Song Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 On the Limits of Information Flow Techniques for Malware Analysis and Containment. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Sandeep Bhatkar, R. Sekar 0001 Data Space Randomization. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF address space randomization, buffer overflow, memory error
25Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Thomas Banton, Dennis Proffitt, Greg Humphreys Quantifying usability in secure graphics: assessing the user costs of protecting 3D content. Search on Bibsonomy APGV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure graphics, usability, perception, 3D reconstruction
25Reiko Ann Miura-Ko, Nicholas Bambos Dynamic Risk Mitigation in Computing Infrastructures. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
25Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan Proteus: virtualization for diversified tamper-resistance. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance
25George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson A Framework for a Collaborative DDoS Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
25Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis gore: Routing-Assisted Defense Against DDoS Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Jelena Mirkovic, Peter L. Reiher A taxonomy of DDoS attack and DDoS defense mechanisms. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Haidong Xia, José Carlos Brustoloni Detecting and Blocking Unauthorized Access in Wi-Fi Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
25Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker Impeding attrition attacks in P2P systems. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld DoS protection for UDP-based protocols. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE
15Mayra Alexandra Macas Carrasco, Chun-Ming Wu 0001, Walter Fuertes Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Caelin Kaplan, Chuan Xu 0002, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jaewoo Park, Leo Hyun Park, Hong Eun Ahn, Taekyoung Kwon 0002 Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Chuang Wang 0005, Zidong Wang, Qinyuan Liu, Hongli Dong, Weiguo Sheng Support-Sample-Assisted Domain Generalization via Attacks and Defenses: Concepts, Algorithms, and Applications to Pipeline Fault Diagnosis. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li 0001, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao 0001, Chunyi Peng 0001 Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ren-Yi Huang, G. Dumindu Samaraweera, J. Morris Chang Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. Search on Bibsonomy Computer The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Gongxi Zhu, Donghao Li, Hanlin Gu, Yuxing Han 0001, Yuan Yao, Lixin Fan, Qiang Yang 0001 Evaluating Membership Inference Attacks and Defenses in Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ziyao Liu, Huanyi Ye, Chen Chen 0037, Kwok-Yan Lam Threats, Attacks, and Defenses in Machine Unlearning: A Survey. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Arijit Ghosh Chowdhury, Md Mofijul Islam, Vaibhav Kumar, Faysal Hossain Shezan, Vinija Jain, Aman Chadha Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Jon Egaña Zubia, Raul Orduna Urrutia Understanding Deep Learning defenses Against Adversarial Examples Through Visualizations for Dynamic Risk Assessment. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi 0001, Mérouane Debbah Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov Adversarial Attacks and Defenses in Automated Control Systems: A Comprehensive Benchmark. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zhichen Dong, Zhanhui Zhou, Chao Yang, Jing Shao, Yu Qiao Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hao Fang, Yixiang Qiu, Hongyao Yu, Wenbo Yu, Jiawei Kong, Baoli Chong, Bin Chen 0011, Xuan Wang, Shu-Tao Xia Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Abdullah Giray Yaglikçi, Yahya Can Tugrul, Geraldo F. Oliveira, Ismail Emir Yüksel, Ataberk Olgun, Haocong Luo, Onur Mutlu Spatial Variation-Aware Read Disturbance Defenses: Experimental Analysis of Real DRAM Chips and Implications on Future Solutions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ghazaleh Shirvani, Saeid Ghasemshirazi, Behzad Beigzadeh Federated Learning: Attacks, Defenses, Opportunities, and Challenges. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15R. Spencer Hallyburton, David Hunt, Shaocheng Luo, Miroslav Pajic A Multi-Agent Security Testbed for the Analysis of Attacks and Defenses in Collaborative Sensor Fusion. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Lei Xu 0040, Sarah Alnegheimish, Laure Berti-Équille, Alfredo Cuesta-Infante, Kalyan Veeramachaneni Single Word Change is All You Need: Designing Attacks and Defenses for Text Classifiers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Sheng Liu, Zihan Wang, Qi Lei Data Reconstruction Attacks and Defenses: A Systematic Evaluation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Satwik Kundu, Debarshi Kundu, Swaroop Ghosh Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang, Changyu Dong, Chunsheng Yang Defenses to Membership Inference Attacks: A Survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yunrui Yu, Xitong Gao, Cheng-Zhong Xu 0001 LAFIT: Efficient and Reliable Evaluation of Adversarial Defenses With Latent Features. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jiajun Gong, Wuqi Zhang, Charles Zhang 0001, Tao Wang 0012 WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham 0001, Khoa D. Doan, Kok-Seng Wong Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu 0002, Bin Zhang, Qixu Liu, Xiapu Luo A comprehensive analysis of website fingerprinting defenses on Tor. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Search on Bibsonomy Proc. IEEE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Abdullah Giray Yaglikçi, Yahya Can Tugrul, Geraldo F. Oliveira, Ismail Emir Yüksel, Ataberk Olgun, Haocong Luo, Onur Mutlu Spatial Variation-Aware Read Disturbance Defenses: Experimental Analysis of Real DRAM Chips and Implications on Future Solutions. Search on Bibsonomy HPCA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Erik Scheurer, Jenny Schmalfuss, Alexander Lis, Andrés Bruhn Detection Defenses: An Empty Promise against Adversarial Patch Attacks on Optical Flow. Search on Bibsonomy WACV The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shiliang Zuo Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
15Zhengli Zhai, Penghui Li, Shu Feng State of the art on adversarial attacks and defenses in graphs. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay, Mohit Sewak Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Suzan Almutairi, Ahmed Barnawi Federated learning vulnerabilities, threats and defenses: A systematic review and future directions. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Haya Brama, Lihi Dery, Tal Grinshpoun Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2023 DBLP  BibTeX  RDF
15Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes 0001, Ben Stock, Robert Künnemann Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yaman Kumar 0001, Swapnil Parekh, Somesh Singh 0003, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen Automatic Essay Scoring Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses. Search on Bibsonomy Dialogue Discourse The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yuxi Zhao, Xiaowen Gong, Fuhong Lin, Xu Chen 0004 Data Poisoning Attacks and Defenses in Dynamic Crowdsourcing With Online Data Quality Learning. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Belal M. Amro, Saeed Salah, Mohammed Moreb A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Alexander Veicht, Cédric Renggli, Diogo Barradas DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sandra Siby, Ludovic Barman, Christopher A. Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso Evaluating practical QUIC website fingerprinting defenses for the masses. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. Search on Bibsonomy SoftwareX The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hanieh Naderi, Ivan V. Bajic Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Peidong Liu, Longtao He, Zhoujun Li 0001 A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xin Yang 0019, Abla Smahi, Hui Li 0022, Ping Lu 0008, Huayu Zhang, Shuo-Yen Robert Li Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). Search on Bibsonomy Ad Hoc Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). Search on Bibsonomy Dagstuhl Reports The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Johannes C. Pol, Paulina Kindermann, Mark G. van der Krogt, Vera M. van Bergeijk, Guido Remmerswaal, Willem Kanning, Sebastiaan N. Jonkman, Matthijs Kok The effect of interactions between failure mechanisms on the reliability of flood defenses. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Dezhang Kong, Yi Shen 0012, Xiang Chen, Qiumei Cheng, Hongyan Liu 0001, Dong Zhang, Xuan Liu 0006, Shuangxi Chen, Chunming Wu 0001 Combination Attacks and Defenses on SDN Topology Discovery. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Charles Meyers, Tommy Löfstedt, Erik Elmroth Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xiaoyu Zhang, Chao Chen 0015, Yi Xie 0002, Xiaofeng Chen 0001, Jun Zhang 0010, Yang Xiang 0001 A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1440 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license