Machine Learning–based Cyber Attacks Targeting on Controlled Information
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Machine Learning–based Cyber Attacks Targeting on Controlled Information
Authors
Keywords
-
Journal
ACM COMPUTING SURVEYS
Volume 54, Issue 7, Pages 1-36
Publisher
Association for Computing Machinery (ACM)
Online
2021-07-19
DOI
10.1145/3465171
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- When Machine Learning Meets Privacy
- (2021) Bo Liu et al. ACM COMPUTING SURVEYS
- Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis
- (2019) Rory Coulter et al. IEEE Transactions on Cybernetics
- Bridgeware
- (2018) Mordechai Guri et al. COMMUNICATIONS OF THE ACM
- Detecting and Preventing Cyber Insider Threats: A Survey
- (2018) Liu Liu et al. IEEE Communications Surveys and Tutorials
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
- (2018) Guanjun Lin et al. IEEE Transactions on Industrial Informatics
- Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
- (2017) Mohamed Amine Ferrag et al. IEEE Communications Surveys and Tutorials
- Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels
- (2017) Zheng Yan et al. IEEE Systems Journal
- Anonymous Authentication for Wireless Body Area Networks With Provable Security
- (2017) Debiao He et al. IEEE Systems Journal
- Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning
- (2017) Shigang Liu et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- Statistical Features-Based Real-Time Detection of Drifted Twitter Spam
- (2017) Chao Chen et al. IEEE Transactions on Information Forensics and Security
- Utilizing overt and latent linguistic structure to improve keystroke-based authentication
- (2017) Adam Goodkind et al. IMAGE AND VISION COMPUTING
- Enterprise data breach: causes, challenges, prevention, and future directions
- (2017) Long Cheng et al. Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- Cost-Effective Kernel Ridge Regression Implementation for Keystroke-Based Active Authentication System
- (2017) Pei-Yuan Wu et al. IEEE Transactions on Cybernetics
- A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
- (2017) Dennis Kiwia et al. Journal of Computational Science
- Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
- (2017) Qi Jiang et al. IEEE Access
- A survey on data leakage prevention systems
- (2016) Sultan Alneyadi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Participatory Cultural Mapping Based on Collective Behavior Data in Location-Based Social Networks
- (2016) Dingqi Yang et al. ACM Transactions on Intelligent Systems and Technology
- Wireless physical layer authentication via fingerprint embedding
- (2015) Paul L. Yu et al. IEEE COMMUNICATIONS MAGAZINE
- Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
- (2015) Rongmao Chen et al. IEEE Transactions on Information Forensics and Security
- Robust Network Traffic Classification
- (2015) Jun Zhang et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Mobile Sensing Systems
- (2013) Elsa Macias et al. SENSORS
- The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]
- (2012) Li Deng IEEE SIGNAL PROCESSING MAGAZINE
- Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
- (2012) Jun Zhang et al. IEEE Transactions on Information Forensics and Security
- Network Traffic Classification Using Correlation Information
- (2012) Jun Zhang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition
- (2012) J. Stallkamp et al. NEURAL NETWORKS
- A survey of mobile phone sensing
- (2010) Nicholas Lane et al. IEEE COMMUNICATIONS MAGAZINE
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now