Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

benign sample

biblio

Visible to the public Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems

Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
  • privacy
  • invasive software
  • IoT malware samples
  • learning (artificial intelligence)
  • malware
  • Malware Analysis
  • malware detection
  • Metrics
  • off-the-shelf adversarial attack methods
  • Internet of Things
  • pubcrawl
  • resilience
  • Resiliency
  • robust detection tools
  • security
  • static analysis
  • tools
  • adversarial learning
  • Human behavior
  • graph-based IoT malware detection systems
  • graph theory
  • graph embedding
  • graph analysis
  • generated adversarial sample
  • GEA approach
  • feature extraction
  • deep learning networks
  • deep learning
  • craft adversarial IoT software
  • control flow graph-based features
  • CFG-based features
  • benign sample
  • augmentation method

Terms of Use  |  ©2023. CPS-VO