2021
DOI: 10.1145/3465171
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning–based Cyber Attacks Targeting on Controlled Information

Abstract: Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 75 publications
(24 citation statements)
references
References 82 publications
0
19
0
Order By: Relevance
“…Then, inspired by Wang et al, 18 in GCN 1 , that is, the first GCN layer, we generate an aggregation feature ai for each f i by utilizing the following aggregation function (1cqi): aiscript=scriptH(Fi)=fciFiReLUboldW1truef~ci+boldb1Jtruef~ci,fi,where boldf̃ci is the initial feature of fci, rectified linear unit (ReLU) 37 is a nonlinear activation function, and W1 and b1 are the two trained parameters. J)(boldf̃ci,fi is the graph Laplacian norm 18,38 : Jboldf~ci,fi=dfci·d(fi)1/2,where scriptdscript(fi) is the degree of node fi. We consider ai and boldf̃i (the initial feature of fi) as an input and use an FC layer (FC 1 ) to generate fi's derivation feature di: …”
Section: Proposed Tkdmmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, inspired by Wang et al, 18 in GCN 1 , that is, the first GCN layer, we generate an aggregation feature ai for each f i by utilizing the following aggregation function (1cqi): aiscript=scriptH(Fi)=fciFiReLUboldW1truef~ci+boldb1Jtruef~ci,fi,where boldf̃ci is the initial feature of fci, rectified linear unit (ReLU) 37 is a nonlinear activation function, and W1 and b1 are the two trained parameters. J)(boldf̃ci,fi is the graph Laplacian norm 18,38 : Jboldf~ci,fi=dfci·d(fi)1/2,where scriptdscript(fi) is the degree of node fi. We consider ai and boldf̃i (the initial feature of fi) as an input and use an FC layer (FC 1 ) to generate fi's derivation feature di: …”
Section: Proposed Tkdmmentioning
confidence: 99%
“…(1) where f ̃c i is the initial feature of f c i , rectified linear unit (ReLU) 37 is a nonlinear activation function, and W 1 and b 1 are the two trained parameters. J f f ( ̃, ) c i i is the graph Laplacian norm 18,38 :…”
Section: Feature Representation Learningmentioning
confidence: 99%
“…The popularization of network use also increases the risk of a network attack, bringing many security risks. 1,2 Network security situation assessment (NSSA) can build an appropriate model according to related security incidents, and then assess the threat degree of the entire network system. 3 Since Bass 4 proposed the concept of NSSA, it has been the main topic in situation awareness research.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in 2020, multiple popular Android apps, such as Baidu Maps, were found leaking users' location data. Thus, data leakage has become one of the most representative security incidents in the past few years [160] [121] [85] [35] [90] [135] [46] [95]. And it poses a significant threat on user's identity security, financial security, or even life security.…”
Section: Introductionmentioning
confidence: 99%