-
From trust to trickery: Brand impersonation over the email attack vector
Brand impersonation over the email attack vector
-
Let the model talk
A summary of methods for machine learning interpretability
-
Adversarial machine learning
A summary of current attacks against machine learning-based systems
-
Android app triage and malware detection
Identifying malicious Android applications in the presence of adversaries: A cat-and-mouse game