Although many studies have examined adversarial examples in the real wor...
Mass surveillance systems for voice over IP (VoIP) conversations pose a ...
In recent years, machine learning has become prevalent in numerous tasks...
Recent work on adversarial learning has focused mainly on neural network...
For years, attack graphs have been an important tool for security assess...
The proliferation of IoT devices which can be more easily compromised th...